WO2021174859A1 - 通信方法、装置及系统 - Google Patents

通信方法、装置及系统 Download PDF

Info

Publication number
WO2021174859A1
WO2021174859A1 PCT/CN2020/120680 CN2020120680W WO2021174859A1 WO 2021174859 A1 WO2021174859 A1 WO 2021174859A1 CN 2020120680 W CN2020120680 W CN 2020120680W WO 2021174859 A1 WO2021174859 A1 WO 2021174859A1
Authority
WO
WIPO (PCT)
Prior art keywords
slice
network element
policy control
usage
terminal device
Prior art date
Application number
PCT/CN2020/120680
Other languages
English (en)
French (fr)
Inventor
丁辉
陆长奇
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP20922817.0A priority Critical patent/EP4099632A4/en
Publication of WO2021174859A1 publication Critical patent/WO2021174859A1/zh
Priority to US17/902,623 priority patent/US12021695B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/20Arrangements for monitoring or testing data switching networks the monitoring system or the monitored elements being virtualised, abstracted or software-defined entities, e.g. SDN or NFV
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0894Policy-based network configuration management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/08Load balancing or load distribution
    • H04W28/09Management thereof
    • H04W28/0925Management thereof using policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0811Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Definitions

  • This application relates to the field of communication technology, and in particular to communication methods, devices and systems.
  • the terminal's quota can be restricted to be equal to the slice's quota, or equal to the slice's quota multiplied by a percentage.
  • the present application provides a communication method, device, and system for realizing the correct configuration of slices for terminal devices to realize normal communication.
  • the present application provides a communication method.
  • the method includes: a first policy control network element sends a subscription message to a usage monitoring network element, where the subscription message includes the identification information of the first slice and the identification information of the terminal device, The subscription message is used to subscribe to the usage status information of the terminal device in the first slice; the first policy control network element receives first indication information from the usage monitoring network element, the first indication information Used to indicate that the usage of the terminal device in the first slice is exhausted; the first policy control network element sends the availability status information of the first slice to the mobility management network element, the availability status Information is used to indicate that the first slice is not available; or, the first policy control network element sends a user routing policy to the terminal device, and the user routing policy does not include the identifier of the first slice information.
  • the terminal device when the usage of the terminal device in the first slice is exhausted, the terminal device can be prevented from continuing to use the service of the first slice, which helps to realize correct communication.
  • the first policy control network element before the first policy control network element sends a subscription message to the usage monitoring network element, the first policy control network element receives permission from the mobility management network element to allow the terminal device to access
  • the identification information of the slice of which is allowed to be accessed by the terminal device includes the first slice.
  • the first policy control network element determines the first slice among the slices that the terminal device is allowed to access.
  • the first policy control network element determines the first slice that needs to be monitored for usage, which can save the overhead of the mobility management network element.
  • the policy control network element before the first policy control network element sends a subscription message to the usage monitoring network element, the policy control network element receives the identification information of the first slice from the mobility management network element And second indication information, where the second indication information is used to indicate to monitor the usage status of the terminal device in the first slice.
  • the mobility management network element determines the first slice that needs to perform usage monitoring, which can save the overhead of the first policy control network element.
  • the present application provides a communication method, the method includes: a first policy control network element sends a subscription message to a usage monitoring network element, the subscription message includes identification information of the first slice, and the subscription message is used for Subscribe to the usage status information of the first slice; the first policy control network element receives first indication information from the usage monitoring network element, where the first indication information is used to indicate the usage of the first slice Exhausted; the first policy control network element sends the availability status information of the first slice to the mobility management network element, where the availability status information is used to indicate that the first slice is unavailable; or, the The first policy control network element sends a user routing policy to the terminal device that is allowed to access the first slice, where the user routing policy does not include the identification information of the first slice.
  • the first policy control network element before the first policy control network element sends a subscription message to the usage monitoring network element, the first policy control network element receives the first slice from the mobility management network element. Identification information and second indication information, where the second indication information is used to indicate to monitor the usage status of the first slice.
  • the mobility management network element determines the first slice that needs to perform usage monitoring, which can save the overhead of the first policy control network element.
  • the first policy control network element receiving first indication information from the usage monitoring network element specifically includes: the first policy control network element receiving slice usage from the usage monitoring network element A status event report, where the slice usage status event report includes identification information of the first slice and the first indication information.
  • the usage monitoring network element is a second policy control network element, and the second policy control network element provides services for the session management network element; or, the usage monitoring network element is a unified database; Alternatively, the usage monitoring network element is a network data analysis network element.
  • the present application provides a communication method, the method includes: a mobility management network element receives availability status information of a first slice from a policy control network element, where the availability status information is used to indicate the first slice Unavailable, the availability status information is sent by the terminal device when the usage in the first slice is exhausted; the mobility management network element sends to the terminal device that the terminal device is allowed to access The identification information of the incoming slice, and the identification information of the slice that the terminal device is allowed to access does not include the identification information of the first slice.
  • the terminal device when the usage of the terminal device in the first slice is exhausted, the terminal device can be prevented from continuing to use the service of the first slice, which helps to realize correct communication.
  • the mobility management network element before the mobility management network element receives the availability status information of the first slice from the policy control network element, the mobility management network element sends permission for the terminal to the policy control network element
  • the identification information of the slice to which the terminal device is allowed to access includes the first slice; or, the mobility management network element determines that all of the slices to which the terminal device is allowed to access are allowed to access.
  • the present application provides a communication method, the method includes: a mobility management network element receives availability status information of a first slice from a policy control network element, where the availability status information is used to indicate the first slice Unavailable, the availability status information is sent when the usage of the first slice is exhausted; the mobility management network element sends updated information to the terminal devices that are allowed to access the first slice
  • the identification information of the slice that is allowed to be accessed by the terminal device, and the updated identification information of the slice that is allowed to be accessed by the terminal device does not include the identification information of the first slice.
  • the mobility management network element determines among the slices supported by the mobility management network element The first slice; the mobility management network element sends the identification information and indication information of the first slice to the policy control network element, where the indication information is used to indicate that the first slice is The status of usage is monitored.
  • the present application provides a communication method.
  • the method includes: a first policy control network element sends a subscription message to a usage monitoring network element, where the subscription message includes the identification information of the first network and the identification information of the terminal device, so The subscription message is used for subscribing to the usage status information of the terminal device in the first network; the first policy control network element receives first indication information from the usage monitoring network element, and the first indication information is used for Indicating that the usage of the terminal device in the first network is exhausted; the first policy control network element sends the availability status information of the first network to the mobility management network element, and the availability status information is used to indicate The first network is not available; or, the first policy control network element sends a user routing policy to the terminal device, and the user routing policy does not include the identification information of the first network.
  • the terminal device when the usage of the terminal device on the first network is exhausted, the terminal device can be prevented from continuing to use the service of the first network, which helps to achieve correct communication.
  • the identification information of the first network is a first data network name DNN
  • the first DNN is used to identify the first data network
  • the subscription message is used to subscribe to the terminal device in the The usage status information of the first data network
  • the first indication information is used to indicate that the usage of the terminal device in the first data network is exhausted.
  • the method before the first policy control network element sends the subscription message to the usage monitoring network element, the method further includes: the first policy control network element receives the contracted DNN from the mobility management network element, The contracted DNN includes the first DNN.
  • the first policy control network element determines the first DNN among the contracted DNNs.
  • the method before the first policy control network element sends the subscription message to the usage monitoring network element, the method further includes: the first policy control network element receives the first policy control network element from the mobility management network element. DNN and second indication information, where the second indication information is used to indicate to monitor the usage status of the terminal device on the first data network.
  • the first policy control network element receiving first indication information from the usage monitoring network element includes: the first policy control network element receiving a usage status event from the usage monitoring network element Report, the usage status event report includes the first DNN and the first indication information.
  • the identification information of the first network is the first data network name DNN and the identification information of the first slice
  • the first DNN is used to identify the first data network
  • the first The identification information of the slice is used to identify the first slice
  • the subscription message is used to subscribe to the usage status information of the terminal device in the first data network and the first slice
  • the first indication information is used to Instruct the terminal device to run out of usage in the first data network and the first slice.
  • the method before the first policy control network element sends a subscription message to the usage monitoring network element, the method further includes: the first policy control network element receives from the mobility management network element the contracted DNN and Identification information of the slice that is allowed to be accessed by the terminal device, the subscribed DNN includes the first DNN, and the slice that is allowed to be accessed by the terminal device includes the first slice.
  • the first policy control network element determines the first DNN in the subscribed DNN and the first slice in the slices that the terminal device is allowed to access.
  • the method before the first policy control network element sends the subscription message to the usage monitoring network element, the method further includes: the first policy control network element receives the first policy control network element from the mobility management network element. DNN, identification information of the first slice, and second indication information, where the second indication information is used to indicate to monitor the usage status of the terminal device on the first data network and the first slice .
  • the first policy control network element receiving first indication information from the usage monitoring network element includes: the first policy control network element receiving a usage status event from the usage monitoring network element Report, the usage status event report includes the first DNN, the identification information of the first slice, and the first indication information.
  • an embodiment of the present application provides a communication method, including: a mobility management network element receives availability status information of a first network from a policy control network element, where the availability status information is used to indicate that the first network is unavailable , The availability status information is sent by the terminal device when the usage in the first network is exhausted; the mobility management network element sends the identification of the second network to the terminal device, and the first network
  • the second network is a network that allows the terminal device to access, and the identification of the second network does not include the identification information of the first network.
  • the terminal device when the usage of the terminal device on the first network is exhausted, the terminal device can be prevented from continuing to use the service of the first network, which helps to achieve correct communication.
  • the identification information of the first network is a first data network name DNN, and the first DNN is used to identify the first data network;
  • the mobility management network element receives from the policy control network element Before the availability status information of the first network, it further includes: the mobility management network element sends a contracted DNN to the policy control network element, and the contracted DNN includes the first DNN; or, the mobility management The network element determines the first DNN in the contracted DNN, and sends the first DNN and indication information to the policy control network element, where the indication information is used to indicate that the terminal device is in the first data The network usage status is monitored.
  • the identification information of the first network is the first data network name DNN and the identification information of the first slice, the first DNN is used to identify the first data network; the mobility management Before the network element receives the availability status information of the first network from the policy control network element, the method further includes: the mobility management network element sends to the policy control network element the contracted DNN and the identifier of the slice to which the terminal device is allowed to access Information, the subscribed DNN includes the first DNN, and the slice allowed to be accessed by the terminal device includes the first slice; or, the mobility management network element determines the subscribed DNN A first DNN, determining the first slice among the slices that the terminal device is allowed to access; and sending identification information of the first DNN, the first slice, and the policy control network element Indication information, where the indication information is used to indicate to monitor the usage status of the terminal device on the first data network and the first slice.
  • an embodiment of the present application provides a communication method, including: a first policy control network element receives first indication information from a usage monitoring network element, where the first indication information is used to indicate that the terminal device is in the first slice The usage of is exhausted; the first policy control network element sends the availability status information of the first slice to the mobility management network element, where the availability status information is used to indicate that the first slice is unavailable; or, The first policy control network element sends a user routing policy to the terminal device, and the user routing policy does not include the identification information of the first slice.
  • the terminal device when the usage of the terminal device in the first slice is exhausted, the terminal device can be prevented from continuing to use the service of the first slice, which helps to realize correct communication.
  • the first policy control network element sends a subscription message to the usage monitoring network element.
  • the subscription message includes the identification information of the first slice and the identification information of the terminal device.
  • the subscription message is used to subscribe to the network element.
  • the present application provides a communication method, the method includes: a first policy control network element receives first indication information from a usage monitoring network element, the first indication information is used to indicate that the usage of the first slice is exhausted The first policy control network element sends the availability status information of the first slice to the mobility management network element, where the availability status information is used to indicate that the first slice is unavailable; or, the first The policy control network element sends a user routing policy to the terminal device that is allowed to access the first slice, where the user routing policy does not include the identification information of the first slice.
  • the first policy control network element sends a subscription message to the usage monitoring network element, where the subscription message includes the identification information of the first slice, and the subscription message is used to subscribe to the first everything. Tablet usage status information.
  • the present application provides a communication method, the method includes: a first policy control network element receives first indication information from the usage monitoring network element, where the first indication information is used to indicate that the terminal device is in the first network The usage in the network is exhausted; the first policy control network element sends the availability status information of the first network to the mobility management network element, where the availability status information is used to indicate that the first network is unavailable; or The first policy control network element sends a user routing policy to the terminal device, and the user routing policy does not include the identification information of the first network.
  • the terminal device when the usage of the terminal device on the first network is exhausted, the terminal device can be prevented from continuing to use the service of the first network, which helps to achieve correct communication.
  • the first policy control network element sends a subscription message to the usage monitoring network element, where the subscription message includes the identification information of the first network and the identification information of the terminal device, and the subscription message is used to subscribe to the The usage status information of the terminal device in the first network.
  • the present application provides a communication method, the method includes: a usage monitoring network element obtains identification information of a terminal device and identification information of a first slice; the usage monitoring network element determines that the terminal device is in the first slice; The usage in one slice is exhausted; the usage monitoring network element sends first indication information to the first policy control network element, and the first indication information is used to indicate that the terminal device is in the first slice The amount is exhausted.
  • the present application provides a communication method, the method includes: a usage monitoring network element obtains identification information of a first slice; the usage monitoring network element determines that the usage in the first slice is exhausted; The usage monitoring network element sends first indication information to the first policy control network element, where the first indication information is used to indicate that the usage of the first slice is exhausted.
  • the present application provides a communication method, the method includes: a usage monitoring network element obtains identification information of a first network and identification information of a terminal device; the usage monitoring network element determines that the terminal device is in the first network; A usage in the network is exhausted; the usage monitoring network element sends first indication information to the first policy control network element, where the first indication information is used to indicate the consumption consumption of the terminal device in the first network Exhausted.
  • an embodiment of the present application provides a communication device, which may be a policy control network element or a chip for a policy control network element.
  • the device has the implementation methods of the first aspect, or the second aspect, or the fifth aspect, or the seventh aspect, or the eighth aspect, or the ninth aspect, or the first aspect, or the second aspect.
  • This function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • an embodiment of the present application provides a communication device, which may be a mobility management network element, or a chip used for a mobility management network element.
  • the device has the function of implementing the foregoing third aspect, or fourth aspect, or sixth aspect, or each implementation method of the third aspect, or each implementation method of the fourth aspect, or each implementation method of the sixth aspect.
  • This function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • an embodiment of the present application provides a communication device, which may be a usage monitoring network element, or a chip for usage monitoring network element.
  • the device is capable of implementing the tenth aspect, or the eleventh aspect, or the twelfth aspect, or the implementation methods of the tenth aspect, or the implementation methods of the eleventh aspect, or the implementation methods of the twelfth aspect.
  • Function This function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • an embodiment of the present application provides a communication device including a processor and a memory; the memory is used to store computer execution instructions, and when the device is running, the processor executes the computer execution instructions stored in the memory to The device is caused to execute the methods of the first aspect to the twelfth aspect, or each implementation method of the first aspect to the twelfth aspect, or each implementation method of the second aspect, or each implementation method of the third aspect.
  • an embodiment of the present application provides a communication device, including a unit or unit for executing each step of the method from the first aspect to the twelfth aspect, or each implementation method of the first aspect to the twelfth aspect, or Means.
  • an embodiment of the present application provides a communication device, including a processor and a communication interface, the communication interface is configured to receive code instructions and transmit them to the processor, and the processor is configured to run the code instructions to Implement the methods of the first aspect to the twelfth aspect, or the implementation methods of the first aspect to the twelfth aspect.
  • an embodiment of the present application provides a communication device, including a processor, coupled with a memory, and configured to call a program stored in the memory to execute the method or the first aspect of the first aspect to the twelfth aspect.
  • the memory can be located inside the device or outside the device.
  • the processor includes one or more.
  • the embodiments of the present application also provide a computer-readable storage medium that stores instructions in the computer-readable storage medium, which when run on a computer, causes a processor to execute the first to tenth aspects described above.
  • the embodiments of the present application also provide a computer program product.
  • the computer product includes a computer program.
  • the computer program runs, the method of the first aspect to the twelfth aspect, or the first aspect to the first aspect
  • the implementation methods of the twelve aspects are executed.
  • an embodiment of the present application also provides a chip system including a processor and a memory.
  • the memory is used to store a computer program; the processor is used to call and run the computer program from the memory, so that the device installed with the chip system executes the methods of the first aspect to the twelfth aspect, or the first aspect to the first aspect Twelve aspects of each realization method.
  • an embodiment of the present application further provides a communication system, including: a first policy control network element and a usage monitoring network element.
  • the first policy control network element is used to send a subscription message to the usage monitoring network element.
  • the subscription message includes the identification information of the first slice and the identification information of the terminal device.
  • the usage status information of the first slice receiving first indication information from the usage monitoring network element, the first indication information being used to indicate that the usage of the terminal device in the first slice is exhausted; and , Sending the availability status information of the first slice to the mobility management network element, where the availability status information is used to indicate that the first slice is unavailable; or, sending a user routing policy to the terminal device, so
  • the user routing strategy does not include the identification information of the first slice.
  • the usage monitoring network element is configured to receive the subscription message from the first policy control network element; when the usage of the terminal device in the first slice is exhausted, send the first policy control network element to the first policy control network element.
  • One instruction information is configured to receive the subscription message from the first policy control network
  • an embodiment of the present application also provides a communication method, including: the first policy control network element sends a subscription message to the usage monitoring network element, the subscription message including the identification information of the first slice and the terminal device Identification information, the subscription message is used to subscribe to the usage status information of the terminal device in the first slice; the usage monitoring network element receives the subscription message from the first policy control network element; When the usage in the slice is exhausted, the usage monitoring network element sends first indication information to the first policy control network element, where the first indication information is used to indicate that the terminal device is in the first slice The usage of is exhausted; the first policy control network element receives the first indication information from the usage monitoring network element; the first policy control network element sends the availability status information of the first slice to the mobility management network element, The availability status information is used to indicate that the first slice is not available; or, the first policy control network element sends a user routing policy to the terminal device, and the user routing policy does not include the first slice ⁇ identification information.
  • an embodiment of the present application further provides a communication system, including: a first policy control network element and a usage monitoring network element.
  • the first policy control network element is configured to send a subscription message to the usage monitoring network element, where the subscription message includes the identification information of the first slice, and the subscription message is used to subscribe to the usage status information of the first slice;
  • the usage monitoring network element receives first indication information, where the first indication information is used to indicate that the usage of the first slice is exhausted; and sends the availability status of the first slice to the mobility management network element Information, the availability status information is used to indicate that the first slice is unavailable; or, to send a user routing policy to a terminal device that is allowed to access the first slice, and the user routing policy does not include the Identification information of the first slice.
  • the usage monitoring network element is configured to receive the subscription message from the first policy control network element; when the usage of the first slice is exhausted, send the first indication information to the first policy control network element.
  • an embodiment of the present application further provides a communication method, including: a first policy control network element sends a subscription message to a usage monitoring network element, where the subscription message includes identification information of the first slice, and the subscription The message is used to subscribe to the usage status information of the first slice; the usage monitoring network element receives the subscription message from the first policy control network element; when the usage of the first slice is exhausted, the usage monitoring network element sends The first policy control network element sends first indication information, where the first indication information is used to indicate that the usage of the first slice is exhausted; the first policy control network element receives the usage from the usage monitoring network element First indication information; the first policy control network element sends the availability status information of the first slice to the mobility management network element, where the availability status information is used to indicate that the first slice is unavailable; or, first The policy control network element sends a user routing policy to the terminal device that is allowed to access the first slice, where the user routing policy does not include the identification information of the first slice.
  • an embodiment of the present application further provides a communication system, including: a first policy control network element and a usage monitoring network element.
  • the first policy control network element is used to send a subscription message to the usage monitoring network element, where the subscription message includes the identification information of the first network and the identification information of the terminal device, and the subscription message is used to subscribe that the terminal device is in the The usage status information of the first network; receiving first indication information from the usage monitoring network element, the first indication information being used to indicate that the usage of the terminal device in the first network is exhausted; and, moving to The sexual management network element sends the availability status information of the first network, where the availability status information is used to indicate that the first network is unavailable; or, sends a user routing policy to the terminal device, the user routing policy Does not include the identification information of the first network.
  • the usage monitoring network element is configured to receive the subscription message from the first policy control network element; when the usage of the terminal device in the first network is exhausted, send the first policy control network element to the first policy control network element.
  • an embodiment of the present application further provides a communication method, including: the first policy control network element sends a subscription message to the usage monitoring network element, the subscription message including the identification information of the first network and the identification of the terminal device Information, the subscription message is used to subscribe to the usage status information of the terminal device in the first network; the usage monitoring network element receives the subscription message from the first policy control network element; when the terminal device is in the first network When the usage is exhausted, the usage monitoring network element sends first indication information to the first policy control network element, where the first indication information is used to indicate that the usage of the terminal device in the first network is exhausted The first policy control network element receives the first indication information from the usage monitoring network element; the first policy control network element sends the availability status information of the first network to the mobility management network element, the availability status information It is used to indicate that the first network is not available; or, the first policy control network element sends a user routing policy to the terminal device, and the user routing policy does not include the identification information of the first network.
  • Figure 1 is a schematic diagram of a communication system provided by this application.
  • Figure 2(a) is a schematic diagram of a 5G network architecture based on a service-oriented architecture
  • Figure 2(b) is a schematic diagram of a 5G network architecture based on a point-to-point interface
  • Figure 3(a) is a schematic flow diagram of a communication method provided by this application.
  • Figure 3(b) is a schematic flow diagram of another communication method provided by this application.
  • Figure 3(c) is a schematic flow diagram of another communication method provided by this application.
  • FIG. 4 is a schematic flow diagram of another communication method provided by this application.
  • FIG. 5 is a schematic flowchart of another communication method provided by this application.
  • FIG. 6 is a schematic flowchart of another communication method provided by this application.
  • FIG. 7 is a schematic flowchart of another communication method provided by this application.
  • FIG. 8 is a schematic flowchart of another communication method provided by this application.
  • FIG. 9 is a schematic flowchart of another communication method provided by this application.
  • FIG. 10 is a schematic diagram of a communication device provided by this application.
  • FIG. 11 is a schematic diagram of another communication device provided by this application.
  • the present application provides a communication system, which includes a first policy control network element and a usage monitoring network element.
  • the system also includes a mobility management network element.
  • the usage monitoring network element may be a second policy control network element, and the second policy control network element provides a service for the session management network element.
  • the usage monitoring network element may be a unified database.
  • the usage monitoring network element may be a network data analysis network element.
  • the first policy control network element is used to send a subscription message to the usage monitoring network element.
  • the subscription message includes the identification information of the first slice and the identification information of the terminal device.
  • the usage status information of the first slice receiving first indication information from the usage monitoring network element, the first indication information being used to indicate that the usage of the terminal device in the first slice is exhausted; and , Sending the availability status information of the first slice to the mobility management network element, where the availability status information is used to indicate that the first slice is unavailable; or, sending a user routing policy to the terminal device, so The user routing strategy does not include the identification information of the first slice.
  • the usage monitoring network element is configured to receive the subscription message from the first policy control network element; when the usage of the terminal device in the first slice is exhausted, send the first policy control network element to the first policy control network element.
  • One instruction information is configured to receive the subscription message from the first policy control network element; when the usage of the terminal device in the first slice is exhausted, send the first policy control network element to the first policy control network element.
  • the first policy control network element is also used to receive from the mobility management network element the identification information of the slice that the terminal device is allowed to access before sending a subscription message to the usage monitoring network element ,
  • the slice allowed to be accessed by the terminal device includes the first slice.
  • the first policy control network element is also used to determine the first slice among the slices that the terminal device is allowed to access.
  • the first policy control network element is also used to receive the identification information of the first slice and the second slice from the mobility management network element before sending a subscription message to the usage monitoring network element.
  • Indication information where the second indication information is used to indicate to monitor the usage status of the terminal device in the first slice.
  • the first policy control network element is configured to receive first indication information from the usage monitoring network element, which specifically includes: being configured to receive a slice usage status event report from the usage monitoring network element ,
  • the slice usage status event report includes the identification information of the first slice and the first indication information.
  • the mobility management network element is configured to send to the terminal device the identification information of the slice that is allowed to be accessed by the terminal device, and the identification of the slice that is allowed to be accessed by the terminal device The information does not include the identification information of the first slice.
  • the first policy control network element is configured to send a subscription message to the usage monitoring network element, where the subscription message includes the identification information of the first slice, and the subscription message is used to subscribe to the usage status information of the first slice;
  • the usage monitoring network element receives first indication information, where the first indication information is used to indicate that the usage of the first slice is exhausted; and sends the availability status of the first slice to the mobility management network element Information, the availability status information is used to indicate that the first slice is unavailable; or, to send a user routing policy to a terminal device that is allowed to access the first slice, and the user routing policy does not include the Identification information of the first slice.
  • the usage monitoring network element is configured to receive the subscription message from the first policy control network element; when the usage of the first slice is exhausted, send the first indication information to the first policy control network element.
  • a terminal device that is allowed to access the first slice can also be understood as a terminal device that supports access to the first slice. Specifically, it can be understood as the allowed slice identifier (Allowed NSSAI) received by the terminal device. Or its subscribed slice identifier (Subscribed NSSAI) contains the identification information of the first slice.
  • Allowed NSSAI allowed slice identifier
  • Subscribed slice identifier Subscribed NSSAI
  • the first policy control network element is further configured to receive the identification information and the identification information of the first slice from the mobility management network element before sending a subscription message to the usage monitoring network element Second indication information, where the second indication information is used to indicate to monitor the usage status of the first slice.
  • the first policy control network element is configured to receive first indication information from the usage monitoring network element, which specifically includes: being configured to receive a slice usage status event report from the usage monitoring network element ,
  • the slice usage status event report includes the identification information of the first slice and the first indication information.
  • the mobility management network element is configured to send updated identification information of the slice that is allowed to be accessed by the terminal device to the terminal device that is allowed to access the first slice.
  • the updated identification information of the slice to which the terminal device is allowed to access does not include the identification information of the first slice.
  • the first policy control network element is used to send a subscription message to the usage monitoring network element, where the subscription message includes the identification information of the first network and the identification information of the terminal device, and the subscription message is used to subscribe that the terminal device is in the The usage status information of the first network; receiving first indication information from the usage monitoring network element, the first indication information being used to indicate that the usage of the terminal device in the first network is exhausted; and, moving to The sexual management network element sends the availability status information of the first network, where the availability status information is used to indicate that the first network is unavailable; or, sends a user routing policy to the terminal device, the user routing policy Does not include the identification information of the first network.
  • the usage monitoring network element is configured to receive the subscription message from the first policy control network element; when the usage of the terminal device in the first network is exhausted, send the first policy control network element to the first policy control network element. Instructions.
  • the identification information of the first network is a first data network name DNN
  • the first DNN is used to identify the first data network
  • the subscription message is used to subscribe to the terminal device in the The usage status information of the first data network
  • the first indication information is used to indicate that the usage of the terminal device in the first data network is exhausted.
  • the first policy control network element is further configured to receive a subscribed DNN from the mobility management network element before sending a subscription message to the usage monitoring network element, where the subscribed DNN includes The first DNN.
  • the first policy control network element is also used to determine the first DNN among the contracted DNNs.
  • the first policy control network element is further configured to receive the first DNN and second indication information from the mobility management network element before sending a subscription message to the usage monitoring network element
  • the second indication information is used to indicate to monitor the usage status of the terminal device on the first data network.
  • the first policy control network element is configured to receive first indication information from the usage monitoring network element, which specifically includes: being configured to receive a usage status event report from the usage monitoring network element,
  • the usage status event report includes the first DNN and the first indication information.
  • the identification information of the first network is the first data network name DNN and the identification information of the first slice
  • the first DNN is used to identify the first data network
  • the first The identification information of the slice is used to identify the first slice
  • the subscription message is used to subscribe to the usage status information of the terminal device in the first data network and the first slice
  • the first indication information is used to Instruct the terminal device to run out of usage in the first data network and the first slice.
  • the first policy control network element is also used to receive the subscribed DNN from the mobility management network element and allow the terminal device to access it before sending a subscription message to the usage monitoring network element.
  • the identification information of the incoming slice, the subscribed DNN includes the first DNN, and the slice allowed to be accessed by the terminal device includes the first slice.
  • the first policy control network element is also used to determine the first DNN in the subscribed DNN and the first DNN in the slice that the terminal device is allowed to access.
  • the first policy control network element is further configured to receive the first DNN and the first DNN from the mobility management network element before sending a subscription message to the usage monitoring network element.
  • the first policy control network element is configured to receive first indication information from the usage monitoring network element, which specifically includes: being configured to receive a usage status event report from the usage monitoring network element,
  • the usage status event report includes the first DNN, identification information of the first slice, and the first indication information.
  • the mobility management network element is used to send an identifier of a second network to the terminal device, the second network is a network that allows the terminal device to access, and the second network The identification of the network does not include identification information of the first network.
  • the identification information of the first network is the first data network name DNN, and the first DNN is used to identify the first data network; the mobility management network element is used to follow the policy Before the control network element receives the availability status information of the first network, it sends a contracted DNN to the policy control network element, where the contracted DNN includes the first DNN; or, determines the first DNN among the contracted DNNs , And sending the first DNN and indication information to the policy control network element, where the indication information is used to indicate to monitor the usage status of the terminal device on the first data network.
  • the identification information of the first network is the first data network name DNN and the identification information of the first slice, the first DNN is used to identify the first data network;
  • the mobility management The network element is configured to send to the policy control network element the contracted DNN and the identification information of the slice to which the terminal device is allowed to access, before receiving the availability status information of the first network from the policy control network element, the contracted DNN
  • the first DNN is included, and the slice that the terminal device is allowed to access includes the first slice; or, the first DNN in the subscribed DNN is determined, and it is determined that the terminal device is allowed to access
  • the device monitors the usage status of the first data network and the first slice.
  • the usage monitoring network element is used to obtain the identification information of the terminal device and the identification information of the first slice; determine that the usage of the terminal device in the first slice is exhausted; and send the first policy control network element to the first policy control network element. Indication information, where the first indication information is used to indicate that the usage of the terminal device in the first slice is exhausted.
  • the first policy control network element is configured to receive the first indication information from the usage monitoring network element; and, send the availability status information of the first slice to the mobility management network element, where the availability status information is used to indicate The first slice is not available; or, sending a user routing policy to the terminal device, and the user routing policy does not include the identification information of the first slice.
  • the usage monitoring network element is used to obtain the identification information of the terminal device and the identification information of the first slice, including: being used to receive a subscription message from the first policy control network element, the subscription message including The identification information of the first slice and the identification information of the terminal device, and the subscription message is used to subscribe to the usage status information of the terminal device in the first slice.
  • the usage monitoring network element is used to obtain identification information of the first slice; to determine that the usage of the first slice is exhausted; to send first indication information to the first policy control network element, where the first indication information is used to indicate the The amount of the first slice is exhausted.
  • the first policy control network element is configured to receive the first indication information from the usage monitoring network element; and, send the availability status information of the first slice to the mobility management network element, where the availability status information is used to indicate The first slice is not available; or, sending a user routing policy to a terminal device that is allowed to access the first slice, where the user routing policy does not include the identification information of the first slice.
  • the usage monitoring network element is used to obtain the identification information of the first slice, including: receiving a subscription message from the first policy control network element, the subscription message including the identification of the first slice Information, the subscription message is used to subscribe to the usage status information of the first slice.
  • the usage monitoring network element is used to obtain the identification information of the terminal device and the identification information of the first network; determine that the usage of the terminal device in the first network is exhausted; send first indication information to the first policy control network element The first indication information is used to indicate that the usage of the terminal device in the first network is exhausted.
  • the first policy control network element is configured to receive the first indication information from the usage monitoring network element; and, send the availability status information of the first network to the mobility management network element, where the availability status information is used to indicate all The first network is not available; or, sending a user routing policy to the terminal device, where the user routing policy does not include the identification information of the first network.
  • the usage monitoring network element is used to obtain the identification information of the terminal device and the identification information of the first network, including: being used to receive a subscription message from the first policy control network element, the subscription message includes the Identification information of a network and identification information of a terminal device, and the subscription message is used to subscribe to the usage status information of the terminal device in the first network.
  • the system shown in Figure 1 can be used in the fifth generation (5G) network architecture shown in Figure 2(a) or Figure 2(b). Of course, it can also be used in future network architectures, such as the sixth generation. (6th generation, 6G) network architecture, etc. This application is not limited.
  • the network element or entity corresponding to the first policy control network element in Fig. 1 may be a policy control function (PCF) network element in the 5G network architecture shown in Fig. 2(a), and the usage in Fig. 1
  • the network element or entity corresponding to the monitoring network element can be a PCF network element, a unified data repository (UDR), or a network data analysis function (NetWork Data Analysis Function) in the 5G network architecture shown in Figure 2(a).
  • NWDAF network element (not shown in the figure).
  • the network element or entity corresponding to the mobility management network element in Fig. 1 may be an access and mobility management function (AMF) network element in the 5G network architecture shown in Fig. 2(a).
  • AMF access and mobility management function
  • the 5G network architecture shown in Figure 2(a) may include three parts, namely a terminal equipment part, a data network (DN) and an operator network part.
  • DN data network
  • operator network part The functions of some of the network elements are briefly introduced below.
  • the operator network may include one or more of the following network elements: Authentication Server Function (AUSF) network elements, network exposure function (NEF) network elements, PCF network elements, unified data Management (unified data management, UDM) network element, UDR, network storage function (Network Repository Function, NRF) network element, application function (AF) network element, AMF network element, session management function (session management function, SMF) ) Network elements, radio access network (RAN) and user plane function (UPF) network elements, etc.
  • AUSF Authentication Server Function
  • NEF network exposure function
  • PCF PCF network elements
  • unified data Management unified data management
  • UDR network storage function
  • NRF Network Repository Function
  • AF application function
  • AMF application function
  • SMF session management function
  • RAN radio access network
  • UPF user plane function
  • the terminal device in the embodiment of the present application may be a device for implementing wireless communication functions.
  • the terminal equipment can be a user equipment (UE), an access terminal, a terminal unit, a terminal station, a mobile station, a mobile station in a 5G network or a public land mobile network (PLMN) that will evolve in the future.
  • UE user equipment
  • PLMN public land mobile network
  • Remote stations, remote terminals, mobile equipment, wireless communication equipment, terminal agents or terminal devices etc.
  • the access terminal can be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), with wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices or wearable devices, virtual reality (VR) terminal devices, augmented reality (AR) terminal devices, industrial control (industrial) Wireless terminal in control), wireless terminal in self-driving (self-driving), wireless terminal in remote medical (remote medical), wireless terminal in smart grid, wireless terminal in transportation safety (transportation safety) Terminals, wireless terminals in smart cities, wireless terminals in smart homes, etc.
  • the terminal can be mobile or fixed.
  • the above-mentioned terminal device may establish a connection with the operator's network through an interface (such as N1, etc.) provided by the operator's network, and use services such as data and/or voice provided by the operator's network.
  • the terminal device can also access the DN through the operator's network, and use the operator's service deployed on the DN and/or the service provided by a third party.
  • the above-mentioned third party may be a service party other than the operator's network and terminal equipment, and may provide other services such as data and/or voice for the terminal equipment.
  • the specific form of expression of the above-mentioned third party can be determined according to actual application scenarios, and is not limited here.
  • RAN is a sub-network of an operator's network, and an implementation system between service nodes and terminal equipment in the operator's network.
  • the terminal device To access the operator's network, the terminal device first passes through the RAN, and then can be connected to the service node of the operator's network through the RAN.
  • the RAN device in this application is a device that provides wireless communication functions for terminal devices, and the RAN device is also called an access network device.
  • the RAN equipment in this application includes but is not limited to: next-generation base stations (gnodeB, gNB), evolved node B (evolved node B, eNB), radio network controller (RNC), node B in 5G (node B, NB), base station controller (BSC), base transceiver station (BTS), home base station (for example, home evolved nodeB, or home node B, HNB), baseband unit (baseBand) unit, BBU), transmission point (transmitting and receiving point, TRP), transmission point (transmitting point, TP), mobile switching center, etc.
  • next-generation base stations gnodeB, gNB
  • evolved node B evolved node B
  • RNC radio network controller
  • node B in 5G node B, NB
  • BSC base station controller
  • BTS base transceiver station
  • home base station for example, home evolved nodeB, or home node B, HNB
  • TRP transmission point
  • the AMF network element mainly performs functions such as mobility management and access authentication/authorization. In addition, it is also responsible for transferring user policies between UE and PCF.
  • the SMF network element mainly performs functions such as session management, execution of control policies issued by PCF, selection of UPF, and UE Internet Protocol (IP) address allocation.
  • functions such as session management, execution of control policies issued by PCF, selection of UPF, and UE Internet Protocol (IP) address allocation.
  • IP Internet Protocol
  • the UPF network element as the interface UPF with the data network, completes functions such as user plane data forwarding, session/stream-based billing statistics, and bandwidth limitation.
  • the UDM network element is mainly responsible for functions such as management of contract data and user access authorization.
  • UDR is mainly responsible for the access function of contract data, strategy data, application data and other types of data.
  • NEF network elements are mainly used to support the opening of capabilities and events.
  • the AF network element mainly conveys the requirements of the application side to the network side, for example, quality of service (QoS) requirements or user status event subscriptions.
  • QoS quality of service
  • the AF can be a third-party functional entity, or an application service deployed by an operator, such as an IP Multimedia Subsystem (IMS) voice call service.
  • IMS IP Multimedia Subsystem
  • the PCF network element is mainly responsible for policy control functions such as charging, QoS bandwidth guarantee and mobility management, and UE policy decision-making for the session and service flow level.
  • the PCF connected to the AMF can provide access and mobility control (PCF for Access and Mobility Control), and can provide UE policy control (PCF for UE Policy Control), or it can be understood that the PCF connected to the AMF includes AM PCF and UE PCF.
  • the PCF connected to the SMF can provide session management (PCF for Session Management), or it is understood that the PCF connected to the SMF is called SM PCF.
  • the PCF connected by the AMF and the PCF connected by the SMF may be the same PCF or different PCFs.
  • the NRF network element can be used to provide the network element discovery function, and provide the network element information corresponding to the network element type based on the request of other network elements.
  • NRF also provides network element management services, such as network element registration, update, de-registration, and network element status subscription and push.
  • AUSF network element Mainly responsible for authenticating users to determine whether users or devices are allowed to access the network.
  • a DN is a network located outside the operator's network.
  • the operator's network can access multiple DNs.
  • a variety of services can be deployed on the DN to provide terminal equipment with services such as data and/or voice.
  • DN is the private network of a smart factory.
  • the sensors installed in the workshop of the smart factory can be terminal devices.
  • a control server for the sensors is deployed in the DN, and the control server can provide services for the sensors.
  • the sensor can communicate with the control server, obtain instructions from the control server, and transmit the collected sensor data to the control server according to the instructions.
  • the DN is the internal office network of a company.
  • the mobile phones or computers of the employees of the company can be terminal devices, and the mobile phones or computers of the employees can access the information and data resources on the internal office network of the company.
  • Nausf, Nnef, Npcf, Nudm, Naf, Namf, Nsmf, N1, N2, N3, N4, and N6 are interface serial numbers.
  • the meaning of these interface serial numbers can refer to the meaning defined in the 3GPP standard protocol, which is not limited here.
  • the network element or entity corresponding to the first policy control network element in Figure 1 may be the PCF network element in the 5G network architecture shown in Figure 2(b), the network element corresponding to the usage monitoring network element in Figure 1 or
  • the entity may be a PCF network element, UDR, or NWDAF network element (not shown in the figure) in the 5G network architecture shown in FIG. 2(b).
  • the network element or entity corresponding to the mobility management network element in Fig. 1 may be the AMF network element in the 5G network architecture shown in Fig. 2(b).
  • Fig. 2(b) For the introduction of the function of the network element in Fig. 2(b), reference may be made to the introduction of the function of the corresponding network element in Fig. 2(a), which will not be repeated.
  • the main difference between Fig. 2(b) and Fig. 2(a) is that the interface between the various network elements in Fig. 2(b) is a point-to-point interface, not a service-oriented interface.
  • N7 The interface between PCF and SMF, used to issue protocol data unit (protocol data unit, PDU) session granularity and service data flow granularity control strategy.
  • protocol data unit protocol data unit
  • N15 The interface between PCF and AMF, used to issue UE policies and access control related policies.
  • N5 Interface between AF and PCF, used for application service request issuance and network event reporting.
  • N4 The interface between SMF and UPF, used to transfer information between the control plane and the user plane, including controlling the issuance of user-oriented forwarding rules, QoS control rules, traffic statistics rules, etc., and user-plane information Reported.
  • N11 Interface between SMF and AMF, used to transfer PDU session tunnel information between RAN and UPF, transfer control messages sent to UE, transfer radio resource control information sent to RAN, etc.
  • N2 The interface between AMF and RAN, used to transfer radio bearer control information from the core network side to the RAN.
  • N1 The interface between the AMF and the UE, which has nothing to do with access, and is used to deliver QoS control rules to the UE.
  • N8 The interface between AMF and UDM, used for AMF to obtain access and mobility management related subscription data and authentication data from UDM, and AMF to register UE current mobility management related information with UDM, etc.
  • N10 Interface between SMF and UDM, used for SMF to obtain session management related subscription data from UDM, and SMF to register UE current session related information with UDM, etc.
  • N35 The interface between UDM and UDR, used for UDM to obtain user subscription data information from UDR.
  • N36 Interface between PCF and UDR, used for PCF to obtain policy-related contract data and application data-related information from UDR.
  • N12 The interface between AMF and AUSF, used for AMF to initiate an authentication process to AUSF, which can carry SUCI as a contract identifier;
  • N13 The interface between UDM and AUSF, used for AUSF to obtain user authentication vector from UDM to execute the authentication process.
  • the aforementioned network elements or functions may be network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform).
  • a platform for example, a cloud platform.
  • the foregoing network element or function may be implemented by one device, or jointly implemented by multiple devices, or may be a functional module in one device, which is not specifically limited in the embodiment of the present application.
  • the mobility management network element, session management network element, policy control network element, application function network element, access network device, and user plane network element in this application may be those in Figure 2(a) or Figure 2(b), respectively.
  • AMF, SMF, PCF, AF, RAN, UPF can also be network elements with the above-mentioned AMF, SMF, PCF, AF, RAN, UPF functions in future communications such as the 6th generation (6G) network.
  • 6G 6th generation
  • This application There is no restriction on this.
  • this application uses mobility management network elements, session management network elements, policy control network elements, application function network elements, access network equipment, and user plane network elements as the aforementioned AMF, SMF, PCF, AF, RAN, and RAN, respectively. Take UPF as an example. Further, the terminal device is referred to as UE for short in this application.
  • the general user registration process can be simply described as: UE sends a registration request to AMF through RAN, and AMF obtains subscription data from a specific UDM according to the Subscription Permanent Identifier (SUPI), and UDM can obtain the actual subscription from UDR after receiving the request. data.
  • the AMF can also initiate a user policy association establishment request (UEPolicyControl_Create Request) and an access management policy association establishment request (AMPolicyControl_Create Request) to the PCF, which are used to obtain UE policies and access control policies, respectively.
  • the PCF returns the access control policy to the AMF in this process, and provides the UE policy to the UE via the AMF.
  • the general session establishment process can be simply described as follows: UE sends a session establishment request to AMF through RAN, AMF selects SMF to provide services for the session, saves the correspondence between SMF and PDU session, and sends the session establishment request to SMF, SMF Select the corresponding UPF for the UE and establish a user plane transmission path, and assign an IP address to it.
  • the SMF will also initiate a policy control session establishment request to the PCF for establishing a policy control session between the SMF and the PCF.
  • the SMF will save the corresponding relationship between the policy control session and the PDU session.
  • the AF can also establish an AF session with the PCF, and the PCF binds the AF session with the policy control session.
  • AMF can decide to generate Allowed based on information such as the requested NSSAI (Requested NSSAI) from the UE, the subscribed NSSAI (Subscribed NSSAI) from the UDM, and the locally configured operator policy.
  • NSSAI as the identifier of the slice that the network side allows the UE to use.
  • the process may also involve the participation of Network Slice Selection Function (NSSF) network elements, that is, the AMF provides the currently received Subscribed NSSAI, Requested NSSAI and other slice-related inputs, and the public land mobile network (Public land mobile network (PLMN) identification (ID), tracking area identification (Tracking Area Identity, TAI) and other information are used for NSSF to decide the Allowed NSSAI of the UE.
  • NSSAI Network Slice Selection Function
  • PLMN Public land mobile network
  • ID tracking area identification
  • TAI Track Area Identity
  • the AMF can also request the NSSF to decide the Allowed NSSAI of the UE by providing the slice information of the UE under the home network.
  • the Requested NSSAI of the UE may be a combination of the UE according to the default configured NSSAI (Default Configured NSSAI) and the Allowed NSSAI in the current access mode, which is not limited in the embodiment of the present application.
  • default configured NSSAI Default Configured NSSAI
  • Allowed NSSAI in the current access mode which is not limited in the embodiment of the present application.
  • the PCF directly connected to the AMF supports the provision of the following strategies to the AMF or to the UE via the AMF:
  • UE Policy The user policy (UE Policy) provided by the UE PCF to the UE via the AMF.
  • User policies mainly include access network discovery and selection policies (Access Network Discovery and Selection Policy, ANDSP) and user routing selection policies (UE Routing Selection Policy, URSP).
  • the user policy is provided to the UE by the UE PCF via the AMF.
  • the ANDSP is mainly used for the UE to perform the selection of the access network during non-3GPP (Non-3GPP) access, and to perform the selection of the access network element.
  • URSP is used to select the policy rules of the corresponding routing parameters when the UE initiates an application or service, such as selecting the data network name (Data Network Name, DNN) required by the application or service, and single network slice selection assistance information (single network slice selection assistance information) , S-NSSAI), session and service continuity mode (Session and Service Continuity mode, SSC mode), etc.
  • Access and mobility management strategies mainly include service area restriction (Service Area Restriction) and radio access technology/frequency selection policy (RAT/Frequency Selection Policy, RFSP).
  • Service Area Restriction Service Area Restriction
  • RAT/Frequency Selection Policy RFSP
  • the service area restrictions mainly include information such as permitted access areas and prohibited access areas. For example, special control areas prohibit users from accessing the operator's network.
  • the main users of RFSP perform access mode and frequency selection. For example, when some cells are congested, the RFSP strategy will be adjusted to guide users in the congested cell to migrate to other cells.
  • the PCF directly connected to the SMF supports the provision of session management policies to the SMF.
  • the session management policy includes service flow or session-level QoS policy, charging control, flow forwarding control and other information, such as service flow-level policy and charging control rule (PCC rule) and session-level PDU Session policy control information (PDU Session Policy Control Information).
  • PCC rule service flow-level policy and charging control rule
  • PDU Session Policy Control Information session-level PDU Session policy control information
  • URSP mainly consists of two parts: flow description information (Traffic descriptor) and routing description information list (List of Route Selection Descriptors, RSD list).
  • the flow description information includes, for example, an operating system ID (OS ID), an application ID (APP ID), IP triples, domain description information, and so on.
  • the routing description information includes S-NSSAI, DNN, SSC mode, etc.
  • the UE performs the URSP matching process: when the UE determines that a specific service or application needs to be initiated, it will match the service or application to be initiated with the flow description information in the received URSP in order according to the priority of the URSP If it matches a specific URSP (the URSP may also be the default URSP, for example, the flow description information is in the form of Match-all), the UE also needs to determine whether the S-NSSAI contained in the RSD in the URSP meets the Allowed NSSAI restriction, If the S-NSSAI in the RSD does not belong to Allowed NSSAI, the UE will continue to determine whether the next RSD meets this condition according to the priority of the RSD. If this condition is met, the UE also needs to determine whether an existing PDU session meets the definition of the RSD:
  • the parameters that can be carried in the PDU session modification request include the current PDU Session ID, N1SM Container (PDU Session Modification Request (PDU Session ID, packet filters, Operation, Requested QoS)); where PDU Session ID is used for
  • PDU Session ID is used for
  • the AMF is associated with the specific session context, and the N1SM Container is transparently transmitted from the AMF to the SMF to indicate the specific service that the UE wants to initiate and the QoS guarantee that the service needs.
  • the UE will initiate a PDU session establishment request for the service/application and carry the newly allocated PDU Session in the request message sent to the AMF ID and RSD parameters such as DNN, S-NSSAI, N1SM Container (SSC mode, PDU Session Type); among them, the newly allocated PDU Session ID is used to identify the PDU session corresponding to the PDU session establishment request, DNN+S- NSSAI is used as a parameter for the AMF to select the SMF entity for the PDU session establishment request, and the N1SM Container is transparently transmitted from the AMF to the selected SMF.
  • RSD parameters such as DNN, S-NSSAI, N1SM Container (SSC mode, PDU Session Type
  • scenario 1 the UE subscribes to the operator a certain or certain high-priority slice services in the form of user-granular value-added services, and is allowed to use specific slices in the slice. Quota services, such as traffic, usage time, etc. In the case that the quota of the UE in the slice is exhausted, according to the contract, the UE will only be allowed to use the ordinary slice to access the corresponding service. That is, the UE is no longer allowed to use the ordered high-priority slices.
  • scenario 2 slice tenants (such as enterprises) order slice services that meet specific indicators from the operator at slice granularity, and the network side performs the slice granularity usage control, such as UDR or NWDAF
  • the network element performs usage control on the slice according to the usage information reported by the surrounding network elements. In the case that the usage quota in the slice is exhausted, according to the subscription, the UE in the slice will not be allowed to access the corresponding service through the slice.
  • scenario 3 in some operator network deployments, there is also a data-based network granularity (also known as DNN granularity). Or implement usage monitoring based on data network + slice granularity (also known as DNN+S-NSSAI granularity), and perform URSP policy adjustment based on the result of usage monitoring to avoid the UE from continuing to request access to the corresponding DNN or DNN+S-NSSAI .
  • the present application provides a communication method.
  • This method can be applied to the handover process (such as 4G to 5G, or 5G to 5G, etc.), or the initial registration process.
  • This embodiment is a solution for the above scenario one.
  • the slice that the UE is allowed to access is adjusted in time, so as to prevent the UE from guiding the UE to the second slice when the quota for the first slice is exhausted.
  • a slice causes an error.
  • the method includes the following steps:
  • Step 301a The first PCF sends a subscription message to the usage monitoring network element.
  • the usage monitoring network element can receive the subscription message.
  • the subscription message includes the identification information of the first slice and the identification information of the UE, and the subscription message is used to subscribe to the usage status information of the UE in the first slice.
  • the first slice here may be one or more slices.
  • the UE has quota restrictions in the first slice.
  • the quota of the UE in the first slice is equal to the quota of the first slice multiplied by a preset ratio.
  • the quota here can be traffic, or duration, etc.
  • the traffic quota of the first slice is 100G
  • the quota of UE 1 in the first slice is 1G
  • the quota of UE 2 in the first slice is 1.5G, and so on.
  • the first PCF here provides services for AMF, and the first PCF includes AM PCF and UE PCF. Or it can be understood that the first PCF has the function of AM PCF and the function of UE PCF.
  • the usage monitoring network element here may be the second PCF, and the second PCF provides services for the SMF, and the second PCF may also be referred to as SM PCF.
  • the usage monitoring network element here may be UDR.
  • the usage monitoring network element here may also be an NWDAF network element.
  • Step 302a The usage monitoring network element sends first indication information to the first PCF.
  • the first PCF can receive the first indication information.
  • the usage monitoring network element After receiving the subscription message, the usage monitoring network element monitors the usage of the UE in the first slice, and when it finds that the usage of the UE in the first slice is exhausted, it sends the first indication information to the first PCF. To indicate that the UE's usage in the first slice is exhausted.
  • this step 302a may be: the first PCF receives a slice usage status event report from the usage monitoring network element, where the slice usage status event report includes the identification information of the first slice and the first indication information.
  • the first PCF may notify the AMF that the first slice is unavailable, and then the AMF notifies the UE not to use the first slice (corresponding to the following steps 303a to 304a).
  • the first PCF informs the UE not to use the first slice through a user routing policy (corresponding to the following step 305a). In actual applications, you can choose one of the ways to execute.
  • Step 303a The first PCF sends the availability status information of the first slice to the AMF.
  • the AMF can receive the availability status information of the first slice.
  • the availability status information is used to indicate that the first slice is unavailable. Or it can be understood that the availability status is used to indicate that the UE cannot use the first slice.
  • Step 304a The AMF sends the identification information of the slice that the UE is allowed to access to the UE.
  • the UE can receive the identification information of the slice that the UE is allowed to access.
  • the identification information of the slice that the UE is allowed to access does not include the identification information of the first slice.
  • the identification information of the slice that the UE is allowed to access can be represented by Allowed NSSAI, and the Allowed NSSAI of the UE does not include the identification information of the first slice. Therefore, the UE will not access the first slice.
  • the subsequent UE Since the identification information of the slice that the UE is allowed to access does not include the identification information of the first slice, the subsequent UE will not use the service of the first slice, so that when the usage of the UE in the first slice is exhausted, it can be avoided The UE continues to use the service of the first slice, which helps to achieve correct communication.
  • step 305a is also included.
  • Step 305a The first PCF sends the user routing policy to the UE.
  • the UE can receive the user routing policy.
  • the user routing policy of the UE does not include the identification information of the first slice.
  • the UE’s user routing strategy does not include the identification information of the first slice, subsequent UEs will not use the services of the first slice, so that when the usage of the UE in the first slice is exhausted, the UE can be avoided Continuing to use the first slice of service will help to achieve correct communication.
  • the first PCF before step 301a, the first PCF also determines that it needs to monitor the usage of the UE in the first slice, including but not limited to the following implementation methods.
  • Implementation method 1 The AMF sends the identification information of the slice that the UE is allowed to access to the first PCF, where the identification information of the slice that the UE is allowed to access includes the identification information of the first slice described above. After the first PCF receives the identification information of the slice that the UE is allowed to access, it can determine that the UE has a useful amount limit in the first slice according to the operator's policy, and then it is determined that the usage of the UE in the first slice needs to be monitored.
  • the subscription message in step 301a above may include the identification information of the slice that the UE is allowed to access.
  • the usage monitoring network element After the usage monitoring network element receives the identification information of the slice that the UE is allowed to access, it determines that the UE needs to be The usage monitoring is performed in the first slice.
  • the subscription message in step 301a above includes the identification information of the first slice, and does not include other identifiers except the identification information of the first slice in the identification information of the slice that the UE is allowed to access. information.
  • Implementation method 2 The AMF determines the identification information of the slice that the UE is allowed to access, where the identification information of the slice that the UE is allowed to access includes the identification information of the first slice described above. Then, according to the operator’s policy, the AMF determines that the UE has a useful amount limit in the first slice, and then sends the identification information of the first slice and second indication information to the first PCF. The second indication information is used to indicate the The UE monitors the usage status of the first slice.
  • the present application provides yet another communication method.
  • This method can be applied to the handover process (such as 4G to 5G, or 5G to 5G, etc.), or the initial registration process.
  • This embodiment is a solution for the second scenario described above.
  • the slices that can be accessed by the UE in the first slice are adjusted in time, so as to avoid that the first slice is exhausted when the quota of the first slice is exhausted.
  • the UE in the slice continues to use the first slice, causing an error to occur.
  • the method includes the following steps:
  • Step 301b The first PCF sends a subscription message to the usage monitoring network element.
  • the usage monitoring network element can receive the subscription message.
  • the subscription message includes identification information of the first slice, and the subscription message is used to subscribe to the usage status information of the first slice.
  • the first slice here may be one or more slices.
  • the first slice is quota limited.
  • the quota here can be traffic, or duration, etc.
  • the traffic quota of the first slice is 100G.
  • all UEs allowed to access the first slice can use the quota of the first slice, and the quota of each UE is the quota of the first slice. For example, if the traffic quota of the first slice is 100G, the traffic quota that can be used by all UEs that are allowed to access the slice is also 100G.
  • the first PCF here provides services for AMF, and the first PCF includes AM PCF and UE PCF. Or it can be understood that the first PCF has the function of AM PCF and the function of UE PCF.
  • the usage monitoring network element here may be UDR.
  • the usage monitoring network element here may also be an NWDAF network element.
  • Step 302b The usage monitoring network element sends first indication information to the first PCF.
  • the first PCF can receive the first indication information.
  • the usage monitoring network element After receiving the subscription message, the usage monitoring network element monitors the usage in the first slice, and when it finds that the usage of the first slice is exhausted, it sends first indication information to the first PCF to indicate the first everything The amount of tablets is exhausted.
  • this step 302b may be: the first PCF receives a slice usage status event report from the usage monitoring network element, where the slice usage status event report includes the identification information of the first slice and the first indication information.
  • the first PCF can notify the AMF that the first slice is unavailable, and then the AMF informs the UE that is allowed to access the first slice not to use the first slice (corresponding to the following steps 303b to step 304b).
  • the first PCF informs the UE that is allowed to access the first slice through a user routing policy to not use the first slice (corresponding to the following step 305b). In actual applications, you can choose one of the ways to execute.
  • Step 303b The first PCF sends the availability status information of the first slice to the AMF.
  • the AMF can receive the availability status information of the first slice.
  • the availability status information is used to indicate that the first slice is unavailable. Or it can be understood that the availability status is used to indicate that a UE that is allowed to access the first slice cannot use the first slice.
  • Step 304b The AMF sends the updated identification information of the slice to which the UE is allowed to access to the UE.
  • the UE can receive the updated identification information of the slice that the UE is allowed to access.
  • the UE here refers to a UE that is allowed to access the first slice.
  • the UEs allowed to access the first slice may be one or more UEs.
  • the slice identifier (Allowed NSSAI) or the subscribed slice identifier (Subscribed NSSAI) received by the UE here includes the identification information of the first slice. That is, in any step or other process before step 304b, the UE may receive the Allowed NSSAI, which includes the identification information of the first slice, and/or, the Subscribed NSSAI of the UE includes the first slice Identification information. This indicates that the UE can access the first slice.
  • step 303b since the AMF receives the availability status information of the first slice, indicating that the first slice is not available, in this step 304b, the AMF will need to notify the UE that is allowed to access the first slice, The first slice is no longer available or temporarily unavailable. Therefore, in step 304b, the AMF may send to the UE updated identification information of the slice that the UE is allowed to access (or called new Allowed NSSAI), which does not include the first slice. The identification information of the slice.
  • the UE Since the updated identification information of the slice that the UE is allowed to access does not include the identification information of the first slice, the UE will not use the service of the first slice subsequently, so that when the usage of the first slice is exhausted, Preventing the corresponding UE from continuing to use the service of the first slice helps to achieve correct communication.
  • Step 305b The first PCF sends the user routing policy to the UE.
  • the UE can receive the user routing policy.
  • the UE here refers to a UE that is allowed to access the first slice.
  • the UEs allowed to access the first slice may be one or more UEs.
  • the user routing policy of the UE does not include the identification information of the first slice.
  • the user routing policy of the UE that allows access to the first slice does not include the identification information of the first slice, subsequent UEs will not use the services of the first slice, so when the usage of the first slice is exhausted, It can avoid allowing UEs that access the first slice to continue to use the service of the first slice, which helps to achieve correct communication.
  • the first PCF before step 301b, the first PCF also determines that it needs to monitor the usage of the UE in the first slice. For example, it can be achieved by the following method: AMF can determine the slices supported by AMF according to the operator’s policy The first slice that needs to perform usage monitoring, and then the AMF sends the identification information and indication information of the first slice to the PCF, and the indication information is used to indicate the monitoring of the usage status of the first slice.
  • the present application provides a communication method.
  • This method can be applied to the handover process (such as 4G to 5G, or 5G to 5G, etc.), or the initial registration process.
  • This embodiment is a solution for the above scenario three.
  • the UE is notified in time when the quota of the first network is exhausted, so as to prevent the UE from still guiding the UE to the first network when the quota of the first network is exhausted, which may cause an error.
  • the method includes the following steps:
  • Step 301c The first PCF sends a subscription message to the usage monitoring network element.
  • the usage monitoring network element can receive the subscription message.
  • the subscription message includes the identification information of the first network and the identification information of the UE, and the subscription message is used to subscribe to the usage status information of the UE in the first network.
  • the first network is the first data network
  • the identification information of the first network is the first DNN
  • the first network is a combination of the first data network and the first slice
  • the identification information of the first network is the identification information of the first DNN and the first slice.
  • the first network here may be one or more networks.
  • the UE has quota restrictions in the first network.
  • the quota of the UE in the first network is equal to the quota of the first network multiplied by a preset ratio.
  • the quota here can be traffic, or duration, etc.
  • the traffic quota of the first network is 100G
  • the quota of UE 1 in the first network is 1G
  • the quota of UE 2 in the first network is 1.5G, and so on.
  • the first PCF here provides services for AMF, and the first PCF includes AM PCF and UE PCF. Or it can be understood that the first PCF has the function of AM PCF and the function of UE PCF.
  • the usage monitoring network element here may be the second PCF, and the second PCF provides services for the SMF, and the second PCF may also be referred to as SM PCF.
  • the usage monitoring network element here may be UDR.
  • the usage monitoring network element here may also be an NWDAF network element.
  • Step 302c The usage monitoring network element sends first indication information to the first PCF.
  • the first PCF can receive the first indication information.
  • the usage monitoring network element After receiving the subscription message, the usage monitoring network element monitors the usage of the UE in the first network. When it is found that the usage of the UE in the first network is exhausted, it sends first indication information to the first PCF to indicate The UE's usage in the first network is exhausted.
  • step 302c may be: the first PCF receives a usage status event report from the usage monitoring network element, the usage status event report including the identification information of the first network and the first indication information.
  • the first PCF may notify the AMF that the first network is unavailable, and then the AMF notifies the UE not to use the first network (corresponding to the following steps 303c to 304c).
  • the first PCF informs the UE not to use the first network through a user routing policy (corresponding to the following step 305c. In actual applications, one of these methods can be selected for execution.
  • Step 303c The first PCF sends the availability status information of the first network to the AMF.
  • the AMF can receive the availability status information of the first network.
  • the availability status information is used to indicate that the first network is unavailable. Or it can be understood that the availability status is used to indicate that the UE cannot use the first network.
  • Step 304c The AMF sends the identification information of the second network to the UE.
  • the UE can receive the identification information of the second network.
  • the identification information of the second network may also be understood as the identification information of the network that the UE is allowed to access.
  • the identification information of the second network does not include the identification information of the first network.
  • the subsequent UE Since the identification information of the second network does not include the identification information of the first network, the subsequent UE will not use the services of the first network, so that when the UE's usage in the first network is exhausted, the UE can be prevented from continuing to use the first network.
  • a network service helps to achieve correct communication.
  • step 305c is also included.
  • Step 305c The first PCF sends the user routing policy to the UE.
  • the UE can receive the user routing policy.
  • the user routing policy of the UE does not include the identification information of the first network.
  • the UE’s user routing strategy does not include the identification information of the first network, subsequent UEs will not use the services of the first network, so that when the UE's usage in the first network is exhausted, the UE can be prevented from continuing to use the first network.
  • the services of the first network help to achieve correct communication.
  • the first PCF before step 301c, the first PCF also determines that it needs to monitor the usage of the UE in the first network, including but not limited to the following implementation methods.
  • Scenario 1 The identification information of the first network is the first DNN.
  • the first PCF also determines that it needs to monitor the usage of the UE on the first network, including but not limited to the following implementation methods 1 and 2.
  • Implementation method 1 The AMF sends the contracted DNN to the first PCF, where the contracted DNN includes the above-mentioned first DNN.
  • the first PCF receives the subscribed DNN, it can determine that the UE is in the first data network identified by the first DNN in the subscribed DNN as a useful amount limit according to the operator’s policy, and then it is determined that the UE’s access to the first data network needs to be limited. The usage is monitored.
  • the subscription message in step 301c may include the contracted DNN.
  • the usage monitoring network element determines that the UE needs to perform usage monitoring in the first data network.
  • the subscription message in the foregoing step 301c includes the first DNN, and does not include other DNNs other than the first DNN among the subscribed DNNs.
  • Implementation method two AMF determines the contracted DNN, where the contracted DNN includes the above-mentioned first DNN. Then, according to the operator’s policy, the AMF determines that the UE has a useful amount limit in the first data network identified by the first DNN, and then sends the first DNN and second indication information to the first PCF. The second indication information is used to indicate the The usage status of the UE on the first data network is monitored.
  • the identification information of the first network is the identification information of the first DNN and the first slice.
  • the first PCF also determines that it needs to monitor the usage of the UE in the first DNN and the first slice, including but not limited to the following implementation methods 3 and 4.
  • AMF sends to the first PCF the identification information of the subscribed DNN and the slice that the UE is allowed to access, where the subscribed DNN includes the first DNN, and the identification information of the slice that the UE is allowed to access includes the first slice. ⁇ identification information.
  • the first PCF After the first PCF receives the identification information of the subscribed DNN and the slice that the UE is allowed to access, it can determine that the UE has a useful amount limit in the first data network and the first slice identified by the first DNN according to the operator’s policy. It is determined that it is necessary to monitor the usage of the UE on the first data network and the first slice.
  • the subscription message in step 301c may include the identification information of the subscribed DNN and the slice that the UE is allowed to access.
  • the usage monitoring network element receives the subscribed DNN and the slice that the UE is allowed to access. After the identification information, it is determined that the UE needs to perform usage monitoring in the first network identified by the first DNN in the contracted DNN and the first slice in the slice accessed by the UE.
  • the subscription message in step 301c includes the identification information of the first DNN and the first slice, does not include other DNNs other than the first DNN in the contracted DNN, and does not include the allowed UE The identification information of other slices except the identification information of the first slice in the identification information of the accessed slice.
  • Implementation method 4 AMF determines the identification information of the subscribed DNN and the slice that the UE is allowed to access, where the subscribed DNN includes the first DNN, and the identification information of the slice that the UE is allowed to access includes the identification information of the first slice. Then, the AMF determines that the first data network and the first slice identified by the first DNN are the useful amount limit according to the operator’s policy, and then sends the first DNN, the identification information of the first slice, and the first slice to the first PCF. Two indication information, where the second indication information is used to indicate to monitor the usage status of the UE in the first data network and the first slice.
  • FIG. 4 and FIG. 5 are specific examples of the embodiment corresponding to FIG. 3(a).
  • the embodiment corresponding to FIG. 6 and FIG. 7 is a specific example of the embodiment corresponding to FIG. 3(b).
  • the embodiments corresponding to FIG. 8 and FIG. 9 are specific examples of the embodiment corresponding to FIG. 3(c).
  • the PCF connected to the AMF is called the first PCF
  • the first PCF includes the UE PCF and the AMF PCF, that is, the first PCF has the functions of providing policies for the UE and providing policies for the AMF.
  • the PCF connected by the SMF is called the second PCF or SM PCF.
  • FIG. 4 it is a schematic flowchart of another communication method provided by this application. This method can be applied to the handover process (such as 4G to 5G, or 5G to 5G, etc.), or the initial registration process.
  • This method can be applied to the handover process (such as 4G to 5G, or 5G to 5G, etc.), or the initial registration process.
  • the first PCF determines the slice that needs to monitor the usage status of the UE according to the Allowed NSSAI from the AMF, so as to determine that the UE adjusts the Allowed NSSAI of the UE in time when the quota of the first slice is exhausted, so as to avoid When the quota of the first slice is exhausted, the UE is still guided to the first slice, resulting in an error.
  • the method includes the following steps:
  • Step 401 The AMF sends a policy control request message to the first PCF.
  • the first PCF can receive the policy control request message.
  • the policy control request message carries the identification information of the slice that the UE is allowed to access.
  • the identification information of the slice that the UE is allowed to access can be represented by Allowed NSSAI.
  • the Allowed NSSAI includes one or more S-NSSAIs, and each S-NSSAI is used to identify a slice that the network side decides to allow the UE to access. Therefore, Allowed NSSAI is used to identify one or more slices that the UE is allowed to access.
  • Step 402 The first PCF determines the first slice among the slices that are allowed to access, and the first slice is a slice that needs to perform UE usage status monitoring.
  • the UE has a quota restriction in the first slice, for example, the quota of the UE is 20% of the total amount of the first slice.
  • the first PCF may determine that the usage of the UE in the first slice is subject to a quota limit according to the operator's policy, and then it is determined that the first slice needs to monitor the usage status of the UE.
  • first slice here may be one or more slices.
  • Step 403 The first PCF sends a subscription message to the usage monitoring network element.
  • the usage monitoring network element can receive the subscription message.
  • the subscription message includes identification information of the UE (such as SUPI) and identification information of the first slice, and the subscription message is used to subscribe to the usage status information of the UE in the first slice.
  • the subscription message may also include a usage status event, which is used to indicate that the subscribed event is a usage status monitoring event.
  • the usage monitoring network element here may be the second PCF (ie SM PCF), or UDR, or NWDAF network element.
  • the subscription message sent by the first PCF to the second PCF is an internal message.
  • the first PCF module sends the subscription message to the second PCF module via an internal interface to request the above-mentioned usage status information.
  • Step 404 The first PCF sends a policy control response message to the AMF.
  • the AMF can receive the policy control response message.
  • the policy control response message includes an access and mobility management policy (AM Policy), such as RFSP index, service area restriction, and so on.
  • AM Policy access and mobility management policy
  • This step 404 is an optional step.
  • Step 405 The usage monitoring network element sends a slice usage status event report to the first PCF.
  • the first PCF may receive the slice usage status event report.
  • the slice usage status event report includes identification information and indication information of the first slice.
  • the indication information is used to indicate that the UE's usage in the first slice is exhausted, or the indication information is used to indicate that the UE is in the first slice. The usage reaches the quota.
  • the second PCF can determine that the usage of the UE in the first slice has been calculated based on the usage statistics performed by the SMF and the slice quota of the UE from the UDR. Exhausted.
  • Step 406 The first PCF sends a policy control update request message to the AMF according to the slice usage status event report.
  • the AMF can receive the policy control update request message.
  • the policy control update request message includes identification information of the first slice and availability status information of the first slice, and the availability status information is used to indicate that the first slice is unavailable.
  • Step 407 The AMF sends a policy control update response message to the first PCF.
  • the first PCF may receive the policy control update response message.
  • This step 407 is optional.
  • Step 408 The AMF determines the updated identification information of the slice to which the UE is allowed to access, and the updated identification information of the slice to which the UE is allowed to access does not include the identification information of the first slice described above.
  • Step 409 The AMF sends a configuration update message to the UE.
  • the UE can receive the configuration update message.
  • the configuration update message contains the updated identification information of the slice to which the UE is allowed to access.
  • the UE After the UE obtains the updated identification information of the slice that the UE is allowed to access, it may send a session establishment procedure according to the updated identification information of the slice that the UE is allowed to access.
  • the subsequent UE since the updated identification information of the slice that the UE is allowed to access does not include the identification information of the first slice, the subsequent UE will not use the service of the first slice, so when the UE consumes a certain slice in a certain slice. After the expiration, the UE can be prevented from continuing to use the sliced service, which helps to achieve correct communication.
  • the above step 402 may also be executed by AMF, and it is executed before step 401.
  • the AMF first executes the above step 402, and then executes the above step 401, and the policy control request message in step 401 does not carry the identification information of the slice that the UE is allowed to access, but the identification information and indication information of the first slice.
  • the indication information is used to indicate to monitor the usage status of the UE in the first slice. Subsequent steps are still executed in the order of step 403 to step 409 described above.
  • the policy control request message in step 401 is Npcf_AMPolicyControl_Create Request message
  • the policy control response message in step 404 is Npcf_AMPolicyControl_Create Response message
  • the policy control update request message in step 406 is Npcf_AMPolicyControl_UpdateNotify Request message
  • the above step 407 The policy control update response message is Npcf_AMPolicyControl_UpdateNotify Response message.
  • the policy control request message in step 401 is Npcf_AMPolicyControl_Update Request message
  • the policy control response message in step 404 is Npcf_AMPolicyControl_Update Response message
  • the policy control update request message in step 406 is Npcf_AMPolicyControl_UpdateNotify Request message.
  • the policy control update response message of 407 is the Npcf_AMPolicyControl_UpdateNotify Response message.
  • the policy control request message in step 401 is Npcf_UEPolicyControl_Create Request message
  • the policy control response message in step 404 is Npcf_UEPolicyControl_Create Response message
  • the policy control update request message in step 406 is Npcf_UEPolicyControl_UpdateNotify Request message.
  • the policy control update response message of 407 is the Npcf_UEPolicyControl_UpdateNotify Response message.
  • the policy control request message in step 401 is Npcf_UEPolicyControl_Update Request message
  • the policy control response message in step 404 is Npcf_UEPolicyControl_Update Response message
  • the policy control update request message in step 406 is Npcf_UEPolicyControl_UpdateNotify Request message.
  • the policy control update response message of 407 is the Npcf_UEPolicyControl_UpdateNotify Response message.
  • FIG. 5 it is a schematic flowchart of another communication method provided by this application. This method can be applied to the handover process (such as 4G to 5G, or 5G to 5G, etc.), or the initial registration process.
  • This method can be applied to the handover process (such as 4G to 5G, or 5G to 5G, etc.), or the initial registration process.
  • the first PCF determines the first slice that needs to monitor the usage status of the UE according to the Allowed NSSAI from the AMF, so as to determine that the Allowed NSSAI of the UE is adjusted in time when the UE's quota for the first slice is exhausted. In this way, it is avoided that when the quota of the first slice is exhausted, the UE still guides the UE to the first slice, which may cause an error.
  • the URSP policy is updated to prevent the UE from initiating a service request in the slice where the usage is exhausted.
  • the method includes the following steps:
  • Steps 501 to 505 are the same as steps 401 to 405 in the embodiment of FIG. 4, and reference may be made to the foregoing description.
  • Step 506 The first PCF determines the updated URSP of the UE, and the URSP does not include the identification information of the first slice.
  • the URSP includes one or more RSDs, and each RSD includes information such as S-NSSAI, DNN, and SSC mode.
  • the URSP may be updated so that each RSD of the updated URSP does not include the identification information of the first slice.
  • the UE cannot match the RSD containing the identification information of the first slice, and therefore the UE cannot use the first slice.
  • Step 507 The first PCF sends a user policy update request message to the AMF.
  • the AMF can receive the user policy update request message.
  • the policy control update message contains the updated URSP.
  • Step 508 The AMF sends a user policy update response message to the first PCF.
  • the first PCF may receive the user policy update response message.
  • This step 508 is an optional step.
  • Step 509 The AMF sends a configuration update message to the UE.
  • the UE can receive the configuration update message.
  • the configuration update message contains the updated URSP.
  • the updated URSP does not include the identification information of the first slice
  • subsequent UEs will not use the services of the first slice, so that when the usage of the UE in a certain slice is exhausted, the UE can be prevented from continuing Using the sliced service helps to achieve correct communication.
  • the above step 502 may also be executed by AMF, and it is executed before step 501.
  • the AMF first executes the above step 502, and then executes the above step 501, and the policy control request message in step 501 does not carry the identification information of the slice that the UE is allowed to access, but the identification information and indication information of the first slice.
  • the indication information is used to indicate to monitor the usage status of the UE in the first slice. Subsequent steps are still executed in the order of step 503 to step 509 described above.
  • the user policy update request message in step 507 is a Namf_N1N2MessageTransfer Request message
  • the user policy update response message in step 508 is a Namf_N1N2MessageTransfer Response message.
  • FIG. 6 a schematic flow diagram of another communication method provided by this application. This method can be applied to the handover process (such as 4G to 5G, or 5G to 5G, etc.), or the initial registration process.
  • the handover process such as 4G to 5G, or 5G to 5G, etc.
  • the initial registration process such as 4G to 5G, or 5G to 5G, etc.
  • the AMF determines the slices that need to be monitored for usage status among the slices ordered by the tenant, and then sends the slice information to the first PCF so that the first PCF can determine that when the quota of the slice is exhausted, the AMF will be notified of the quota in time
  • the exhaustion event is used to trigger the AMF to adjust the Allowed NSSAI of the UE under the slice, so as to avoid errors caused by still providing services for UEs allowed to access the slice when the quota of the slice is exhausted.
  • the method includes the following steps:
  • step 601 the AMF determines a first slice, which is a slice that needs to perform usage status monitoring among slices supported by the AMF.
  • the first slice is subject to quota restrictions.
  • the quota of the first slice includes traffic quota and/or duration quota.
  • the process quota for the first slice is 100 megabytes, and the duration quota is 1 hour.
  • the AMF can determine that the usage of the first slice in the slices supported by the AMF is subject to quota restriction according to the operator's policy, and then it is determined that the usage status monitoring of the first slice is required.
  • first slice here may be one or more slices.
  • Step 602 The AMF sends a policy control request message to the first PCF.
  • the first PCF can receive the policy control request message.
  • the policy control request message carries identification information and indication information of the first slice, and the indication information is used to indicate to monitor the usage status information of the first slice.
  • Step 603 The first PCF sends a subscription message to the usage monitoring network element.
  • the usage monitoring network element can receive the subscription message.
  • the subscription message includes identification information of the first slice, and the subscription message is used to subscribe to the usage status information of the first slice.
  • the subscription message may also include a usage status event, which is used to indicate that the subscribed event is a usage status monitoring event.
  • the usage monitoring network element here can be a UDR or NWDAF network element.
  • Step 604 The first PCF sends a policy control response message to the AMF.
  • the AMF can receive the policy control response message.
  • the policy control response message includes an access and mobility management policy (AM Policy), such as RFSP index, service area restriction, and so on.
  • AM Policy access and mobility management policy
  • This step 604 is optional.
  • Step 605 The usage monitoring network element sends a slice usage status event report to the first PCF.
  • the first PCF may receive the slice usage status event report.
  • the slice usage status event report includes identification information and indication information of the first slice, and the indication information is used to indicate that the usage of the first slice is exhausted, or the indication information is used to indicate that the usage in the first slice reaches the quota.
  • Step 606 The first PCF sends a policy control update request message to the AMF according to the slice usage status event report.
  • the AMF can receive the policy control update request message.
  • the policy control update request message includes identification information of the first slice and availability status information of the first slice, and the availability status information is used to indicate that the first slice is unavailable.
  • Step 607 The AMF sends a policy control update response message to the first PCF.
  • the first PCF may receive the policy control update response message.
  • This step 607 is optional.
  • Step 608 The AMF determines the updated identification information of the slice to which the UE is allowed to access, and the updated identification information of the slice to which the UE is allowed to access does not include the identification information of the first slice described above.
  • the UE here refers to the UE that is allowed to use the service of the first slice.
  • the Allowed NSSAI or Subscribed NSSAI received by the UE before the update contains the first slice, or is called the first slice. UE.
  • the updated identification information of the slice to which the UE is allowed to access in step 608 may be expressed as new Allowed NSSAI (that is, updated Allowed NSSAI).
  • Step 609 The AMF sends a configuration update message to the UE.
  • the UE can receive the configuration update message.
  • the configuration update message contains the updated identification information of the slice to which the UE is allowed to access.
  • the UE may send a session establishment procedure according to the updated identification information of the slice that the UE is allowed to access.
  • the updated identification information of the slice that the UE is allowed to access does not include the identification information of the first slice, subsequent UEs will not use the service of the first slice, so when the usage in a certain slice is exhausted This can prevent UEs in the slice from continuing to use the services of the slice, which helps to achieve correct communication.
  • the policy control request message in step 602 is Npcf_AMPolicyControl_Create Request message
  • the policy control response message in step 604 is Npcf_AMPolicyControl_Create Response message
  • the policy control update request message in step 606 is Npcf_AMPolicyControl_UpdateNotify Request message
  • the above step 607 The policy control update response message is Npcf_AMPolicyControl_UpdateNotify Response message.
  • the policy control request message in step 602 is Npcf_AMPolicyControl_Update Request message
  • the policy control response message in step 604 is Npcf_AMPolicyControl_Update Response message
  • the policy control update request message in step 606 is Npcf_AMPolicyControl_UpdateNotify Request message
  • the policy control update response message of 607 is the Npcf_AMPolicyControl_UpdateNotify Response message.
  • the policy control request message in step 602 is Npcf_UEPolicyControl_Create Request message
  • the policy control response message in step 604 is Npcf_UEPolicyControl_Create Response message
  • the policy control update request message in step 606 is Npcf_UEPolicyControl_UpdateNotify Request message.
  • the policy control update response message of 607 is the Npcf_UEPolicyControl_UpdateNotify Response message.
  • the policy control request message in step 602 is Npcf_UEPolicyControl_Update Request message
  • the policy control response message in step 604 is Npcf_UEPolicyControl_Update Response message
  • the policy control update request message in step 606 is Npcf_UEPolicyControl_UpdateNotify Request message
  • the policy control update response message of 607 is the Npcf_UEPolicyControl_UpdateNotify Response message.
  • FIG. 7 a schematic flowchart of another communication method provided by this application. This method can be applied to the handover process (such as 4G to 5G, or 5G to 5G, etc.), or the initial registration process.
  • This method can be applied to the handover process (such as 4G to 5G, or 5G to 5G, etc.), or the initial registration process.
  • the AMF determines the slices that need to be monitored for usage status among the slices ordered by the tenant, and then sends the slice information to the first PCF so that the first PCF can determine in time to adjust the slice under the condition that the quota of the slice is exhausted.
  • the URSP of the UE avoids errors caused by still providing services for the UE under the slice when the quota of the slice is exhausted.
  • the URSP policy is updated to prevent the UE from initiating a service request in the slice where the usage is exhausted.
  • the method includes the following steps:
  • Step 701 to step 705 are the same as step 601 to step 605 in the embodiment of FIG. 6, and reference may be made to the foregoing description.
  • Step 706 The first PCF determines the updated URSP of the UE, and the URSP does not include the identification information of the first slice.
  • the UE here refers to a UE that is allowed to use the service of the first slice, for example, the Allowed NSSAI received by the UE or the subscribed NSSAI includes the first slice, or is referred to as the UE under the first slice.
  • the URSP includes one or more RSDs, and each RSD includes information such as S-NSSAI, DNN, and SSC mode.
  • the URSP may be updated so that each RSD of the updated URSP does not include the identification information of the first slice.
  • the UE cannot match the RSD containing the identification information of the first slice, and therefore the UE cannot use the first slice.
  • Step 707 The first PCF sends a user policy update request message to the AMF.
  • the AMF can receive the user policy update request message.
  • the policy control update request message contains the updated URSP.
  • Step 708 The AMF sends a user policy update response message to the first PCF.
  • the first PCF may receive the user policy update response message.
  • This step 708 is optional.
  • Step 709 The AMF sends a configuration update message to the UE.
  • the UE can receive the configuration update message.
  • the UE here refers to the UE that uses the service of the first slice, or is referred to as the UE under the first slice.
  • the configuration update message contains the updated URSP.
  • the updated URSP does not include the identification information of the first slice
  • subsequent UEs will not use the services of the first slice, so that when the usage of a certain slice is exhausted, it can avoid allowing access to the slice.
  • the UE continues to use the sliced service, which helps to achieve correct communication.
  • the user policy update request message in step 707 is Namf_N1N2MessageTransfer Request message
  • the user policy update response message in step 708 is Namf_N1N2MessageTransfer Response message.
  • FIG. 8 it is a schematic flowchart of another communication method provided by this application. This method can be applied to the handover process (such as 4G to 5G, or 5G to 5G, etc.), or the initial registration process.
  • This method can be applied to the handover process (such as 4G to 5G, or 5G to 5G, etc.), or the initial registration process.
  • the first PCF determines the network that needs to monitor the usage status of the UE, so as to determine that when the quota of the first network is exhausted, the UE still guides the UE to the first network and an error occurs.
  • the method includes the following steps:
  • Step 801 The AMF sends a policy control request message to the first PCF.
  • the first PCF can receive the policy control request message.
  • the policy control request message carries a subscribed DNN, and the subscribed DNN includes one or more DNN subscribed by the UE.
  • the policy control request message carries the identification information of the subscribed DNN and the slice that the UE is allowed to access.
  • the subscribed DNN includes one or more DNNs subscribed by the UE and the identification information of the slice that the UE is allowed to access. It can be represented by Allowed NSSAI.
  • the Allowed NSSAI includes one or more S-NSSAIs, and each S-NSSAI is used to identify a slice that the network side decides to allow the UE to access. Therefore, Allowed NSSAI is used to identify one or more slices that the UE is allowed to access.
  • Step 802 The first PCF determines the identification information of the first network, and the first network is a network that needs to monitor the usage status of the UE.
  • the above policy control request message carries the contracted DNN, and the identification information of the first network determined by the first PCF in step 802 is the first DNN in the contracted DNN.
  • the above policy control request message carries the identification information of the subscribed DNN and the slice that the UE is allowed to access, and then the identification information of the first network determined by the first PCF in step 802 is the first in the subscribed DNN.
  • the identification information of the first slice in the identification information of the DNN and the slice that the UE is allowed to access, that is, the identification information of the first network is the identification information of the first DNN and the first slice.
  • the UE has a quota restriction in the first network, for example, the quota of the UE is 20% of the total amount of the first network.
  • the first PCF may determine that the usage of the UE in the first network is subject to quota restrictions according to the operator's policy, and then it is determined that the first network needs to monitor the usage status of the UE.
  • the first network here may be one or more networks.
  • Step 803 The first PCF sends a subscription message to the usage monitoring network element.
  • the usage monitoring network element can receive the subscription message.
  • the subscription message includes identification information of the UE (such as SUPI) and identification information of the first network, and the subscription message is used to subscribe to the usage status information of the UE in the first network.
  • the subscription message may also include a usage status event, which is used to indicate that the subscription event is a usage status monitoring event.
  • the usage monitoring network element here may be the second PCF (ie SM PCF), or UDR, or NWDAF network element.
  • the subscription message sent by the first PCF to the second PCF is an internal message.
  • the first PCF module sends the subscription message to the second PCF module via an internal interface to request the above-mentioned usage status information.
  • Step 804 The first PCF sends a policy control response message to the AMF.
  • the AMF can receive the policy control response message.
  • the policy control response message includes an access and mobility management policy (AM Policy), such as RFSP index, service area restriction, and so on.
  • AM Policy access and mobility management policy
  • This step 804 is an optional step.
  • Step 805 The usage monitoring network element sends a usage status event report to the first PCF.
  • the first PCF can receive the usage status event report.
  • the usage status event report includes identification information and indication information of the first network.
  • the indication information is used to indicate that the UE's usage in the first network is exhausted, or the indication information is used to indicate that the UE's usage in the first network reaches the quota. .
  • the second PCF can determine that the UE's usage in the first network has been consumed based on the usage statistics performed by the SMF and the UE's network quota from the UDR Exhausted.
  • Step 806 The first PCF sends a policy control update request message to the AMF according to the usage status event report.
  • the AMF can receive the policy control update request message.
  • the policy control update request message includes identification information of the first network and availability status information of the first network, and the availability status information is used to indicate that the first network is unavailable.
  • Step 807 The AMF sends a policy control update response message to the first PCF.
  • the first PCF may receive the policy control update response message.
  • This step 807 is optional.
  • Step 808 The AMF determines the identification information of the second network, and the identification information of the second network does not include the identification information of the first network.
  • the identification information of the second network may also be understood as the identification information of the network that the UE is allowed to access.
  • Step 809 The AMF sends a configuration update message to the UE.
  • the UE can receive the configuration update message.
  • the configuration update message includes identification information of the second network.
  • the UE may send a session establishment procedure according to the identification information of the second network.
  • the identification information of the second network does not include the identification information of the first network
  • subsequent UEs will not use the services of the first network, so that when the UE's usage in a certain network is exhausted, the UE can be avoided Continuing to use the services of the network will help to achieve correct communication.
  • the above step 802 may also be executed by AMF, and it is executed before step 801. Specifically, the AMF first executes the above step 802, and then executes the above step 801, and the policy control request message in step 801 does not carry the subscribed DNN, or the subscribed DNN and the identification information of the slice that the UE is allowed to access, but the first Identification information and indication information of a network, where the indication information is used to indicate to monitor the usage status of the UE on the first network. Subsequent steps are still executed in the order from step 803 to step 809 described above.
  • the policy control request message in step 801 is Npcf_AMPolicyControl_Create Request message
  • the policy control response message in step 804 is Npcf_AMPolicyControl_Create Response message
  • the policy control update request message in step 806 is Npcf_AMPolicyControl_UpdateNotify Request message
  • the above step 807 The policy control update response message is Npcf_AMPolicyControl_UpdateNotify Response message.
  • the policy control request message in step 801 is Npcf_AMPolicyControl_Update Request message
  • the policy control response message in step 804 is Npcf_AMPolicyControl_Update Response message
  • the policy control update request message in step 806 is Npcf_AMPolicyControl_UpdateNotify Request message
  • the policy control update response message of 807 is the Npcf_AMPolicyControl_UpdateNotify Response message.
  • the policy control request message in step 801 is Npcf_UEPolicyControl_Create Request message
  • the policy control response message in step 804 is Npcf_UEPolicyControl_Create Response message
  • the policy control update request message in step 806 is Npcf_UEPolicyControl_UpdateNotify Request message.
  • the policy control update response message of 807 is the Npcf_UEPolicyControl_UpdateNotify Response message.
  • the policy control request message in step 801 is Npcf_UEPolicyControl_Update Request message
  • the policy control response message in step 804 is Npcf_UEPolicyControl_Update Response message
  • the policy control update request message in step 806 is Npcf_UEPolicyControl_UpdateNotify Request message.
  • the policy control update response message of 807 is the Npcf_UEPolicyControl_UpdateNotify Response message.
  • FIG. 9 it is a schematic flowchart of another communication method provided by this application. This method can be applied to the handover process (such as 4G to 5G, or 5G to 5G, etc.), or the initial registration process.
  • This method can be applied to the handover process (such as 4G to 5G, or 5G to 5G, etc.), or the initial registration process.
  • the first PCF determines the first network that needs to monitor the usage status of the UE, so as to determine that when the UE's quota of the first network is exhausted, the UE is still guided to the first network to avoid an error.
  • This method avoids the UE from initiating service requests in the exhausted network by updating the URSP strategy.
  • the method includes the following steps:
  • Steps 901 to 905 are the same as steps 801 to 805 in the embodiment of FIG. 8, and reference may be made to the foregoing description.
  • Step 906 The first PCF determines the updated URSP of the UE, and the URSP does not include the identification information of the first network.
  • the URSP includes one or more RSDs, and each RSD includes information such as S-NSSAI, DNN, and SSC mode.
  • the URSP may be updated so that each RSD of the updated URSP does not include the identification information of the first network.
  • the UE cannot match the RSD containing the identification information of the first network, and therefore the UE cannot use the first network.
  • Step 907 The first PCF sends a user policy update request message to the AMF.
  • the AMF can receive the user policy update request message.
  • the policy control update message contains the updated URSP.
  • step 908 the AMF sends a user policy update response message to the first PCF.
  • the first PCF may receive the user policy update response message.
  • This step 908 is an optional step.
  • Step 909 The AMF sends a configuration update message to the UE.
  • the UE can receive the configuration update message.
  • the configuration update message contains the updated URSP.
  • the above step 902 may also be executed by AMF, and it is executed before step 901. Specifically, the AMF first executes the above step 902, and then executes the above step 901, and the policy control request message in step 901 does not carry the subscribed DNN, or the subscribed DNN and the identification information of the slice that the UE is allowed to access, but the first Identification information and indication information of a network, where the indication information is used to indicate to monitor the usage status of the UE on the first network. Subsequent steps are still executed in the order from step 903 to step 909 described above.
  • the user policy update request message in step 907 is a Namf_N1N2MessageTransfer Request message
  • the user policy update response message in step 908 is a Namf_N1N2MessageTransferResponse message.
  • the first PCF sends a subscription message to the usage monitoring network, thereby triggering the usage monitoring network element to give the UE in the first
  • the usage of one slice, the usage of the first slice, or the usage of the UE in the first network is monitored, and then when the usage monitoring network element detects that the usage of the UE in the first slice is exhausted, or the first slice is exhausted
  • the UE sends the first indication information to the first PCF.
  • the usage monitoring network element may also obtain the UE identification information and the first The identification information of the slice (or the identification information of the first network), for example, may be the identification information of the UE and the identification information of the first slice (or the identification information of the first network) obtained from the SMF or other network elements, and then the usage monitoring The network element determines that the usage of the UE in the first slice is exhausted, or the usage of the first slice is exhausted, or the usage of the UE in the first network is exhausted, and then sends first indication information to the first PCF, the first indication information It is used to indicate that the usage of the UE in the first slice is exhausted, or the usage of the first slice is exhausted, or the usage of the UE in the first network is exhausted.
  • each network element described above includes hardware structures and/or software modules corresponding to each function.
  • the present invention can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered as going beyond the scope of the present invention.
  • the steps or operations implemented by the first policy control network element can also be implemented by components (such as chips or circuits) configured in the first policy control network element, corresponding to the amount of
  • the steps or operations implemented by the monitoring network element can also be implemented by components (such as chips or circuits) configured on the usage monitoring network element.
  • the steps or operations implemented by the mobility management network element they can also be implemented by the mobility management network element. Elemental components (such as chips or circuits) are implemented.
  • the device 1000 includes a receiving unit 1010 and a sending unit 1020.
  • the device 1000 further includes a determining unit 1030.
  • the communication device is used to implement the steps performed by the corresponding first policy control network element in the foregoing method embodiment, then:
  • the sending unit 1020 is configured to send a subscription message to the usage monitoring network element, where the subscription message includes the identification information of the first slice and the identification information of the terminal device, and the subscription message is used to subscribe to the terminal device in the first slice.
  • the usage status information of the slice and sending the availability status information of the first slice to the mobility management network element, where the availability status information is used to indicate that the first slice is unavailable; or, to the terminal
  • the device sends a user routing policy, and the user routing policy does not include the identification information of the first slice.
  • the receiving unit 1010 is configured to receive first indication information from the usage monitoring network element, where the first indication information is used to indicate that the usage of the terminal device in the first slice is exhausted.
  • the receiving unit 1010 is further configured to receive from the mobility management network element that allows the terminal device to access before the sending unit 1020 sends a subscription message to the usage monitoring network element Identification information of a slice, and the slice allowed to be accessed by the terminal device includes the first slice.
  • the determining unit 1030 is configured to determine the first slice among the slices that are allowed to be accessed by the terminal device.
  • the receiving unit 1010 is further configured to receive the identifier of the first slice from the mobility management network element before the sending unit 1020 sends a subscription message to the usage monitoring network element Information and second indication information, where the second indication information is used to indicate to monitor the usage status of the terminal device in the first slice.
  • the receiving unit 1010 is configured to receive first indication information from the usage monitoring network element, which specifically includes: being configured to receive a slice usage status event report from the usage monitoring network element,
  • the slice usage status event report includes the identification information of the first slice and the first indication information.
  • the usage monitoring network element is a policy control network element, and the policy control network element provides services for the session management network element; or, the usage monitoring network element is a unified database; or, the The usage monitoring network element is a network data analysis network element.
  • the communication device is used to implement the steps performed by the corresponding first policy control network element in the foregoing method embodiment, then:
  • the sending unit 1020 is configured to send a subscription message to a usage monitoring network element, where the subscription message includes identification information of the first slice, and the subscription message is used to subscribe to the usage status information of the first slice; and, mobility
  • the management network element sends the availability status information of the first slice, where the availability status information is used to indicate that the first slice is unavailable; or, the first policy controls the network element to allow access to the first slice.
  • the sliced terminal device sends a user routing policy, the user routing policy does not include the identification information of the first slice; the receiving unit 1010 is configured to receive first indication information from the usage monitoring network element, The first indication information is used to indicate that the usage of the first slice is exhausted.
  • the receiving unit 1010 is further configured to receive the identifier of the first slice from the mobility management network element before the sending unit 1020 sends a subscription message to the usage monitoring network element Information and second indication information, where the second indication information is used to indicate to monitor the usage status of the first slice.
  • the receiving unit 1010 is configured to receive first indication information from the usage monitoring network element, which specifically includes: receiving a slice usage status event report from the usage monitoring network element, and the slice usage The status event report includes the identification information of the first slice and the first indication information.
  • the usage monitoring network element is a policy control network element, and the policy control network element provides services for the session management network element; or, the usage monitoring network element is a unified database; or, the The usage monitoring network element is a network data analysis network element.
  • the communication device is used to implement the steps performed by the corresponding mobility management network element in the foregoing method embodiment, then:
  • the receiving unit 1010 is configured to receive the availability status information of the first slice from the policy control network element, where the availability status information is used to indicate that the first slice is unavailable, and the availability status information indicates that the terminal device is at all
  • the first slice is sent when the usage is exhausted;
  • the sending unit 1020 is configured to send to the terminal device the identification information of the slice that the terminal device is allowed to access, and the terminal device is allowed to access
  • the identification information of the slice does not include the identification information of the first slice.
  • the sending unit 1020 is further configured to send permission to the terminal to the policy control network element before the receiving unit receives the availability status information of the first slice from the policy control network element
  • the identification information of the slice to which the terminal device is allowed to access includes the first slice; or, the determining unit 1030 is configured to determine the slice in which the terminal device is allowed to access.
  • the first slice; the sending unit 1020 is further configured to send identification information and indication information of the first slice to the policy control network element, where the indication information is used to indicate that the terminal device is in the The usage status of the first slice is monitored.
  • the communication device is used to implement the steps performed by the corresponding mobility management network element in the foregoing method embodiment, then:
  • the receiving unit 1010 is configured to receive the availability status information of the first slice from the policy control network element, where the availability status information is used to indicate that the first slice is unavailable, and the availability status information is when the first slice is unavailable.
  • the sending unit 1020 is configured to send the updated identification information of the slice that the terminal device is allowed to access to the terminal device that is allowed to access the first slice, and the updated The subsequent identification information of the slice to which the terminal device is allowed to access does not include the identification information of the first slice.
  • the determining unit 1030 is configured to determine the slice in the slice supported by the mobility management network element before the receiving unit receives the availability status information of the first slice from the policy control network element The first slice; the sending unit 1020 is further configured to send identification information and indication information of the first slice to the policy control network element, where the indication information is used to indicate the The usage status is monitored.
  • the communication device is used to implement the steps performed by the corresponding first policy control network element in the foregoing method embodiment, then:
  • the sending unit 1020 is configured to send a subscription message to the usage monitoring network element, the subscription message including the identification information of the first network and the identification information of the terminal device, and the subscription message is used to subscribe to the terminal device in the first network. Sending the availability status information of the first network to the mobility management network element, where the availability status information is used to indicate that the first network is unavailable; or, sending a user routing policy to the terminal device , The user routing policy does not include the identification information of the first network.
  • the receiving unit 1010 is configured to receive first indication information from the usage monitoring network element, where the first indication information is used to indicate that the usage of the terminal device in the first network is exhausted.
  • the identification information of the first network is a first data network name DNN
  • the first DNN is used to identify the first data network
  • the subscription message is used to subscribe to the terminal device in the The usage status information of the first data network
  • the first indication information is used to indicate that the usage of the terminal device in the first data network is exhausted.
  • the receiving unit 1010 is configured to receive the subscribed DNN from the mobility management network element before the sending unit 1020 sends a subscription message to the usage monitoring network element, and the subscribed DNN
  • the DNN includes the first DNN.
  • the determining unit 1030 is configured to determine the first DNN among the contracted DNNs.
  • the receiving unit 1010 is configured to receive the first DNN and second indication information from the mobility management network element before the sending unit 1020 sends a subscription message to the usage monitoring network element.
  • the second indication information is used to indicate to monitor the usage status of the terminal device on the first data network.
  • the receiving unit 1010 is configured to receive first indication information from the usage monitoring network element, specifically including: being configured to receive a usage status event report from the usage monitoring network element, the usage status event The report includes the first DNN and the first indication information.
  • the identification information of the first network is the first data network name DNN and the identification information of the first slice
  • the first DNN is used to identify the first data network
  • the first The identification information of the slice is used to identify the first slice
  • the subscription message is used to subscribe to the usage status information of the terminal device in the first data network and the first slice
  • the first indication information is used to Instruct the terminal device to run out of usage in the first data network and the first slice.
  • the receiving unit 1010 is configured to receive the contracted DNN from the mobility management network element and allow the terminal device to access before the sending unit 1020 sends a subscription message to the usage monitoring network element
  • the identification information of the slice of the subscribed DNN includes the first DNN, and the slice allowed to be accessed by the terminal device includes the first slice.
  • the determining unit 1030 is configured to determine the first DNN in the subscribed DNN and the first slice in the slices that are allowed to be accessed by the terminal device.
  • the receiving unit 1010 is configured to receive the first DNN and the first slice from the mobility management network element before the sending unit 1020 sends a subscription message to the usage monitoring network element.
  • Identification information and second indication information where the second indication information is used to indicate to monitor the usage status of the terminal device on the first data network and the first slice.
  • the receiving unit 1010 is configured to receive first indication information from the usage monitoring network element, specifically including: being configured to receive a usage status event report from the usage monitoring network element, the usage status event The report includes the first DNN, the identification information of the first slice, and the first indication information.
  • the communication device is used to implement the steps performed by the corresponding mobility management network element in the foregoing method embodiment, then:
  • the receiving unit 1010 is configured to receive the availability status information of the first network from the policy control network element, where the availability status information is used to indicate that the first network is unavailable, and the availability status information indicates that the terminal device is in the first network. Is sent when the usage in a network is exhausted; the sending unit 1020 is configured to send the identification of the second network to the terminal device, the second network is a network that allows the terminal device to access, and the first The identification of the second network does not include the identification information of the first network.
  • the identification information of the first network is the first data network name DNN, and the first DNN is used to identify the first data network;
  • the sending unit 1020 is used to control the policy from the receiving unit 1010 Before the network element receives the availability status information of the first network, it sends a contracted DNN to the policy control network element, where the contracted DNN includes the first DNN; or, the determining unit 1030 is configured to determine the contracted DNN
  • the first DNN, and the sending unit 1020 are configured to send the first DNN and instruction information to the policy control network element, where the instruction information is used to instruct the terminal device to connect to the first data network The usage status is monitored.
  • the identification information of the first network is the first data network name DNN and the identification information of the first slice, the first DNN is used to identify the first data network; the sending unit 1020 uses Before the receiving unit 1010 receives the availability status information of the first network from the policy control network element, it sends the contracted DNN and the identification information of the slice that the terminal device is allowed to access to the policy control network element, and the contracted DNN The first DNN is included, and the slice that the terminal device is allowed to access includes the first slice; or, the determining unit 1030 is configured to determine the first DNN among the subscribed DNNs, and determine the allowed The first slice in the slice accessed by the terminal device; and a sending unit 1020, configured to send the first DNN, identification information and indication information of the first slice to the policy control network element The indication information is used to indicate to monitor the usage status of the terminal device on the first data network and the first slice.
  • the communication device is used to implement the steps performed by the corresponding first policy control network element in the foregoing method embodiment, then:
  • the receiving unit 1010 is configured to receive first indication information from the usage monitoring network element, where the first indication information is used to indicate that the usage of the terminal device in the first slice is exhausted.
  • the sending unit 1020 is configured to send availability status information of the first slice to a mobility management network element, where the availability status information is used to indicate that the first slice is unavailable; or, to send a user to the terminal device A routing strategy, where the user routing strategy does not include the identification information of the first slice.
  • the sending unit 1020 is further configured to send a subscription message to the usage monitoring network element.
  • the subscription message includes the identification information of the first slice and the identification information of the terminal device, and the subscription message is used for subscription.
  • the usage status information of the terminal device in the first slice is further configured to send a subscription message to the usage monitoring network element.
  • the communication device is used to implement the steps performed by the corresponding first policy control network element in the foregoing method embodiment, then:
  • the receiving unit 1010 is configured to receive first indication information from the usage monitoring network element, where the first indication information is used to indicate that the usage of the first slice is exhausted.
  • the sending unit 1020 is configured to send availability status information of the first slice to a mobility management network element, where the availability status information is used to indicate that the first slice is unavailable; or, to allow access to the first slice;
  • the terminal device of a slice sends a user routing policy, and the user routing policy does not include the identification information of the first slice.
  • the sending unit 1020 is further configured to send a subscription message to the usage monitoring network element, where the subscription message includes the identification information of the first slice, and the subscription message is used to subscribe to the first slice.
  • the usage status information of the slice is further configured to send a subscription message to the usage monitoring network element, where the subscription message includes the identification information of the first slice, and the subscription message is used to subscribe to the first slice. The usage status information of the slice.
  • the communication device is used to implement the steps performed by the corresponding first policy control network element in the foregoing method embodiment, then:
  • the receiving unit 1010 is configured to receive first indication information from the usage monitoring network element, where the first indication information is used to indicate that the usage of the terminal device in the first network is exhausted.
  • the sending unit 1020 is configured to send availability status information of the first network to a mobility management network element, where the availability status information is used to indicate that the first network is unavailable; or, to send user routing options to the terminal device Policy, the user routing policy does not include the identification information of the first network.
  • the sending unit 1020 is further configured to send a subscription message to the usage monitoring network element.
  • the subscription message includes the identification information of the first network and the identification information of the terminal device, and the subscription message is used to subscribe to the network element.
  • the usage status information of the terminal device in the first network is further configured to send a subscription message to the usage monitoring network element.
  • the communication device is used to implement the steps performed by the corresponding usage monitoring network element in the foregoing method embodiment, then:
  • the receiving unit 1010 is configured to obtain the identification information of the terminal device and the identification information of the first slice; the determining unit 1030 is configured to determine that the usage of the terminal device in the first slice is exhausted; the sending unit 1020 is configured to use Sending first indication information to a first policy control network element, where the first indication information is used to indicate that the usage of the terminal device in the first slice is exhausted.
  • the communication device is used to implement the steps performed by the corresponding usage monitoring network element in the foregoing method embodiment, then:
  • the receiving unit 1010 is configured to obtain identification information of the first slice; the determining unit 1030 is configured to determine that the usage in the first slice is exhausted; and the sending unit 1020 is configured to send the first policy control network element to the first policy control network element. Indication information, where the first indication information is used to indicate that the usage of the first slice is exhausted.
  • the communication device is used to implement the steps performed by the corresponding usage monitoring network element in the foregoing method embodiment, then:
  • the receiving unit 1010 is configured to obtain the identification information of the first network and the identification information of the terminal device; the determining unit 1030 is configured to determine that the usage of the terminal device in the first network is exhausted; the sending unit 1020 is configured to send The first policy control network element sends first indication information, where the first indication information is used to indicate that the usage of the terminal device in the first network is exhausted.
  • the above-mentioned communication device 1000 may further include a storage unit for storing data or instructions (also referred to as codes or programs), and each of the above-mentioned units may interact or couple with the storage unit to implement the corresponding method or Function.
  • the processing unit may read data or instructions in the storage unit, so that the communication device implements the method in the foregoing embodiment.
  • each unit in the device can be all implemented in the form of software called by processing elements; they can also be all implemented in the form of hardware; part of the units can also be implemented in the form of software called by the processing elements, and some of the units can be implemented in the form of hardware.
  • each unit can be a separate processing element, or it can be integrated in a certain chip of the device for implementation.
  • it can also be stored in the memory in the form of a program, which is called and executed by a certain processing element of the device. Function.
  • each step of the above method or each of the above units may be implemented by an integrated logic circuit of hardware in a processor element or implemented in a form of being called by software through a processing element.
  • the unit in any of the above devices may be one or more integrated circuits configured to implement the above methods, for example: one or more application specific integrated circuits (ASICs), or, one or Multiple microprocessors (digital singnal processors, DSPs), or, one or more field programmable gate arrays (Field Programmable Gate Arrays, FPGAs), or a combination of at least two of these integrated circuits.
  • ASICs application specific integrated circuits
  • DSPs digital singnal processors
  • FPGAs Field Programmable Gate Arrays
  • the unit in the device can be implemented in the form of a processing element scheduler
  • the processing element can be a general-purpose processor, such as a central processing unit (CPU) or other processors that can call programs.
  • CPU central processing unit
  • these units can be integrated together and implemented in the form of a system-on-a-chip (SOC).
  • the above receiving unit is an interface circuit of the device for receiving signals from other devices.
  • the receiving unit is an interface circuit used by the chip to receive signals from other chips or devices.
  • the above unit for sending is an interface circuit of the device for sending signals to other devices.
  • the sending unit is an interface circuit used by the chip to send signals to other chips or devices.
  • FIG. 11 another schematic diagram of a communication device provided by an embodiment of this application is used to implement the operations of the first policy control network element, or the mobility management network element, or the usage monitoring network element in the above embodiments.
  • the communication device includes a processor 1110 and an interface 1130.
  • the communication device further includes a memory 1120.
  • the interface 1130 is used to implement communication with other devices.
  • the method executed by the first policy control network element, or the mobility management network element, or the usage monitoring network element can call the memory through the processor 1110 (it can be the first policy control network element, or the mobility management network element, Or the memory 1120 in the usage monitoring network element may also be a program stored in an external memory). That is, the device used for the first policy control network element, or the mobility management network element, or the usage monitoring network element may include a processor 1110, and the processor 1110 executes the above method embodiments by calling a program in the memory.
  • the first strategy controls the execution method of the network element, or the mobility management network element, or the usage monitoring network element.
  • the processor here may be an integrated circuit with signal processing capability, such as a CPU.
  • the device for the first policy control network element, or the mobility management network element, or the usage monitoring network element may be implemented by one or more integrated circuits configured to implement the above method.
  • the above implementations can be combined.
  • the functions/implementation processes of the receiving unit 1010, the sending unit 1020, and the determining unit 1030 in FIG. 10 can be implemented by the processor 1110 in the communication device 1100 shown in FIG. 11 calling the computer executable instructions stored in the memory 1120.
  • the function/implementation process of the determining unit 1030 in FIG. 10 can be implemented by the processor 1110 in the communication device 1100 shown in FIG.
  • the function/implementation process of the unit 1020 can be implemented through the interface 1130 in the communication device 1100 shown in FIG. 11.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).
  • the various illustrative logic units and circuits described in the embodiments of this application can be implemented by general-purpose processors, digital signal processors, application-specific integrated circuits (ASIC), field programmable gate arrays (FPGA) or other programmable logic devices, Discrete gates or transistor logic, discrete hardware components, or any combination of the above are designed to implement or operate the described functions.
  • the general-purpose processor may be a microprocessor.
  • the general-purpose processor may also be any traditional processor, controller, microcontroller, or state machine.
  • the processor can also be implemented by a combination of computing devices, such as a digital signal processor and a microprocessor, multiple microprocessors, one or more microprocessors combined with a digital signal processor core, or any other similar configuration. accomplish.
  • the steps of the method or algorithm described in the embodiments of the present application can be directly embedded in hardware, a software unit executed by a processor, or a combination of the two.
  • the software unit can be stored in random access memory (Random Access Memory, RAM), flash memory, read-only memory (Read-Only Memory, ROM), EPROM memory, EEPROM memory, registers, hard disks, removable disks, CD-ROM or notebooks. Any other storage media in the field.
  • the storage medium may be connected to the processor, so that the processor can read information from the storage medium, and can store and write information to the storage medium.
  • the storage medium may also be integrated into the processor.
  • the processor and the storage medium can be arranged in the ASIC.
  • These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
  • the instructions provide steps for implementing the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • the aforementioned functions described in this application can be implemented in hardware, software, firmware, or any combination of the three. If implemented in software, these functions can be stored on a computer-readable medium, or transmitted on the computer-readable medium in the form of one or more instructions or codes.
  • Computer-readable media include computer storage media and communication media that facilitate the transfer of computer programs from one place to another. The storage medium can be any available medium that can be accessed by a general-purpose or special computer.
  • Such computer-readable media may include, but are not limited to, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other device that can be used to carry or store instructions or data structures and Other program code media that can be read by general-purpose or special computers, or general-purpose or special processors.
  • any connection can be appropriately defined as a computer-readable medium, for example, if the software is from a website, server, or other remote source through a coaxial cable, fiber optic computer, twisted pair, or digital subscriber line (DSL) Or transmitted by wireless means such as infrared, wireless and microwave are also included in the definition of computer-readable media.
  • DSL digital subscriber line
  • the said disks and discs include compressed disks, laser disks, optical discs, digital versatile discs (English: Digital Versatile Disc, abbreviated as: DVD), floppy disks and Blu-ray discs.
  • Disks usually copy data with magnetism.
  • Discs usually use lasers to copy data optically.
  • the combination of the above can also be contained in a computer readable medium.
  • the functions described in this application can be implemented by hardware, software, firmware, or any combination thereof. When implemented by software, these functions can be stored in a computer-readable medium or transmitted as one or more instructions or codes on the computer-readable medium.
  • the computer-readable medium includes a computer storage medium and a communication medium, where the communication medium includes any medium that facilitates the transfer of a computer program from one place to another.
  • the storage medium may be any available medium that can be accessed by a general-purpose or special-purpose computer.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供通信方法、装置及系统。该方法包括:第一策略控制网元向用量监控网元发送订阅消息,订阅消息包括第一切片的标识信息和终端设备的标识信息,订阅消息用于订阅终端设备在所述第一切片的用量状态信息;第一策略控制网元从用量监控网元接收第一指示信息,第一指示信息用于指示终端设备在第一切片内的用量耗尽;第一策略控制网元向移动性管理网元发送第一切片的可用性状态信息,可用性状态信息用于指示第一切片不可用;或者,第一策略控制网元向终端设备发送用户路由选择策略,用户路由选择策略不包括所述第一切片的标识信息。基于该方案,当终端设备在第一切片的用量耗尽后,可以避免终端设备继续使用第一切片的服务,有助于实现正确通信。

Description

通信方法、装置及系统
相关申请的交叉引用
本申请要求在2020年03月04日提交中国专利局、申请号为202010143072.7、申请名称为“通信方法、装置及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中;本申请要求在2020年08月07日提交中国专利局、申请号为202010789827.0、申请名称为“通信方法、装置及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及通信方法、装置及系统。
背景技术
在现有技术中,终端设备在使用切片时,可能是有配额限制的,例如可以限制终端的配额等于切片的配额,或者等于切片的配额乘以一个百分比。
当终端设备的用量达到配额时,如果该终端设备仍然继续使用该切片,将可能导致发生错误。
发明内容
本申请提供通信方法、装置及系统,用以实现为终端设备正确配置切片,以实现正常通信。
第一方面,本申请提供一种通信方法,该方法包括:第一策略控制网元向用量监控网元发送订阅消息,所述订阅消息包括第一切片的标识信息和终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一切片的用量状态信息;所述第一策略控制网元从所述用量监控网元接收第一指示信息,所述第一指示信息用于指示所述终端设备在所述第一切片内的用量耗尽;所述第一策略控制网元向移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,所述第一策略控制网元向所述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息。
基于上述方案,当终端设备在第一切片的用量耗尽后,可以避免该终端设备继续使用第一切片的服务,有助于实现正确通信。
作为一种可能的实现方法,所述第一策略控制网元向用量监控网元发送订阅消息之前,所述第一策略控制网元从所述移动性管理网元接收允许所述终端设备接入的切片的标识信息,所述允许所述终端设备接入的切片包括所述第一切片。
作为一种可能的实现方法,所述第一策略控制网元确定所述允许所述终端设备接入的切片中的所述第一切片。
基于该方案,由第一策略控制网元确定需要执行用量监控的第一切片,可以节约移动 性管理网元的开销。
作为一种可能的实现方法,所述第一策略控制网元向用量监控网元发送订阅消息之前,所述策略控制网元从所述移动性管理网元接收所述第一切片的标识信息和第二指示信息,所述第二指示信息用于指示对所述终端设备在所述第一切片的用量状态进行监控。
基于该方案,由移动性管理网元确定需要执行用量监控的第一切片,可以节约第一策略控制网元的开销。
第二方面,本申请提供一种通信方法,该方法包括:第一策略控制网元向用量监控网元发送订阅消息,所述订阅消息包括第一切片的标识信息,所述订阅消息用于订阅所述第一切片的用量状态信息;所述第一策略控制网元从所述用量监控网元接收第一指示信息,所述第一指示信息用于指示所述第一切片的用量耗尽;所述第一策略控制网元向移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,所述第一策略控制网元向允许接入所述第一切片的终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息。
基于上述方案,当第一切片的用量耗尽后,可以避免允许接入该第一切片的终端设备继续使用第一切片的服务,有助于实现正确通信。
作为一种可能的实现方法,所述第一策略控制网元向用量监控网元发送订阅消息之前,所述第一策略控制网元从所述移动性管理网元接收所述第一切片的标识信息和第二指示信息,所述第二指示信息用于指示对所述第一切片的用量状态进行监控。
基于该方案,由移动性管理网元确定需要执行用量监控的第一切片,可以节约第一策略控制网元的开销。
基于上述第一方面、或第二方面、或第一方面任意可能的实现方法、或第二方面任意可能的实现方法:
作为一种可能的实现方法,所述第一策略控制网元从所述用量监控网元接收第一指示信息,具体包括:所述第一策略控制网元从所述用量监控网元接收切片用量状态事件报告,所述切片用量状态事件报告包括所述第一切片的标识信息和所述第一指示信息。
作为一种可能的实现方法,所述用量监控网元为第二策略控制网元,所述第二策略控制网元为会话管理网元提供服务;或者,所述用量监控网元为统一数据库;或者,所述用量监控网元为网络数据分析网元。
第三方面,本申请提供一种通信方法,该方法包括:移动性管理网元从策略控制网元接收第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用,所述可用性状态信息是所述终端设备在所述第一切片内的用量耗尽的情况下发送的;所述移动性管理网元向所述终端设备发送允许所述终端设备接入的切片的标识信息,所述允许所述终端设备接入的切片的标识信息不包括所述第一切片的标识信息。
基于上述方案,当终端设备在第一切片的用量耗尽后,可以避免该终端设备继续使用第一切片的服务,有助于实现正确通信。
作为一种可能的实现方法,所述移动性管理网元从策略控制网元接收第一切片的可用性状态信息之前,所述移动性管理网元向所述策略控制网元发送允许所述终端设备接入的切片的标识信息,所述允许所述终端设备接入的切片包括所述第一切片;或者,所述移动性管理网元确定允许所述终端设备接入的切片中的所述第一切片,以及向所述策略控制网元发送所述第一切片的标识信息和指示信息,所述指示信息用于指示对所述终端设备在所 述第一切片的用量状态进行监控。
第四方面,本申请提供一种通信方法,该方法包括:移动性管理网元从策略控制网元接收第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用,所述可用性状态信息是当所述第一切片的用量耗尽的情况下发送的;所述移动性管理网元向允许接入所述第一切片的终端设备发送更新后的允许所述终端设备接入的切片的标识信息,所述更新后的允许所述终端设备接入的切片的标识信息不包括所述第一切片的标识信息。
基于上述方案,当第一切片的用量耗尽后,可以避免允许接入该第一切片的终端设备继续使用第一切片的服务,有助于实现正确通信。
作为一种可能的实现方法,所述移动性管理网元从策略控制网元接收第一切片的可用性状态信息之前,所述移动性管理网元确定所述移动性管理网元支持的切片中的所述第一切片;所述移动性管理网元向所述策略控制网元发送所述第一切片的标识信息和指示信息,所述指示信息用于指示对所述第一切片的用量状态进行监控。
第五方面,本申请提供一种通信方法,该方法包括:第一策略控制网元向用量监控网元发送订阅消息,所述订阅消息包括第一网络的标识信息和终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一网络的用量状态信息;所述第一策略控制网元从所述用量监控网元接收第一指示信息,所述第一指示信息用于指示所述终端设备在所述第一网络内的用量耗尽;所述第一策略控制网元向移动性管理网元发送所述第一网络的可用性状态信息,所述可用性状态信息用于指示所述第一网络不可用;或者,所述第一策略控制网元向所述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一网络的标识信息。
基于上述方案,当终端设备在第一网络的用量耗尽后,可以避免该终端设备继续使用第一网络的服务,有助于实现正确通信。
作为一种可能的实现方法,所述第一网络的标识信息为第一数据网络名称DNN,所述第一DNN用于标识第一数据网络,所述订阅消息用于订阅所述终端设备在所述第一数据网络的用量状态信息,所述第一指示信息用于指示所述终端设备在所述第一数据网络内的用量耗尽。
作为一种可能的实现方法,所述第一策略控制网元向用量监控网元发送订阅消息之前,还包括:所述第一策略控制网元从所述移动性管理网元接收签约的DNN,所述签约的DNN包括所述第一DNN。
作为一种可能的实现方法,所述第一策略控制网元确定所述签约的DNN中的所述第一DNN。
作为一种可能的实现方法,所述第一策略控制网元向用量监控网元发送订阅消息之前,还包括:所述第一策略控制网元从所述移动性管理网元接收所述第一DNN和第二指示信息,所述第二指示信息用于指示对所述终端设备在所述第一数据网络的用量状态进行监控。
作为一种可能的实现方法,所述第一策略控制网元从所述用量监控网元接收第一指示信息,包括:所述第一策略控制网元从所述用量监控网元接收用量状态事件报告,所述用量状态事件报告包括所述第一DNN和所述第一指示信息。
作为一种可能的实现方法,所述第一网络的标识信息为第一数据网络名称DNN和第一切片的标识信息,所述第一DNN用于标识第一数据网络,所述第一切片的标识信息用 于标识第一切片,所述订阅消息用于订阅所述终端设备在所述第一数据网络和所述第一切片的用量状态信息,所述第一指示信息用于指示所述终端设备在所述第一数据网络和所述第一切片内的用量耗尽。
作为一种可能的实现方法,所述第一策略控制网元向用量监控网元发送订阅消息之前,还包括:所述第一策略控制网元从所述移动性管理网元接收签约的DNN和允许所述终端设备接入的切片的标识信息,所述签约的DNN包括所述第一DNN,所述允许所述终端设备接入的切片包括所述第一切片。
作为一种可能的实现方法,所述第一策略控制网元确定所述签约的DNN中的所述第一DNN和所述允许所述终端设备接入的切片中的所述第一切片。
作为一种可能的实现方法,所述第一策略控制网元向用量监控网元发送订阅消息之前,还包括:所述第一策略控制网元从所述移动性管理网元接收所述第一DNN、所述第一切片的标识信息和第二指示信息,所述第二指示信息用于指示对所述终端设备在所述第一数据网络和所述第一切片的用量状态进行监控。
作为一种可能的实现方法,所述第一策略控制网元从所述用量监控网元接收第一指示信息,包括:所述第一策略控制网元从所述用量监控网元接收用量状态事件报告,所述用量状态事件报告包括所述第一DNN、所述第一切片的标识信息和所述第一指示信息。
第六方面,本申请实施例提供一种通信方法,包括:移动性管理网元从策略控制网元接收第一网络的可用性状态信息,所述可用性状态信息用于指示所述第一网络不可用,所述可用性状态信息是所述终端设备在所述第一网络内的用量耗尽的情况下发送的;所述移动性管理网元向所述终端设备发送第二网络的标识,所述第二网络为允许所述终端设备接入的网络,所述第二网络的标识不包括所述第一网络的标识信息。
基于上述方案,当终端设备在第一网络的用量耗尽后,可以避免该终端设备继续使用第一网络的服务,有助于实现正确通信。
作为一种可能的实现方法,所述第一网络的标识信息为第一数据网络名称DNN,所述第一DNN用于标识第一数据网络;所述移动性管理网元从策略控制网元接收第一网络的可用性状态信息之前,还包括:所述移动性管理网元向所述策略控制网元发送签约的DNN,所述签约的DNN包括所述第一DNN;或者,所述移动性管理网元确定签约的DNN中的所述第一DNN,以及向所述策略控制网元发送所述第一DNN和指示信息,所述指示信息用于指示对所述终端设备在所述第一数据网络的用量状态进行监控。
作为一种可能的实现方法,所述第一网络的标识信息为第一数据网络名称DNN和第一切片的标识信息,所述第一DNN用于标识第一数据网络;所述移动性管理网元从策略控制网元接收第一网络的可用性状态信息之前,还包括:所述移动性管理网元向所述策略控制网元发送签约的DNN和允许所述终端设备接入的切片的标识信息,所述签约的DNN包括所述第一DNN,所述允许所述终端设备接入的切片包括所述第一切片;或者,所述移动性管理网元确定签约的DNN中的所述第一DNN,确定所述允许所述终端设备接入的切片中的所述第一切片;以及向所述策略控制网元发送所述第一DNN、所述第一切片的标识信息和指示信息,所述指示信息用于指示对所述终端设备在所述第一数据网络和所述到第一切片的用量状态进行监控。
第七方面,本申请实施例提供一种通信方法,包括:第一策略控制网元从用量监控网元接收第一指示信息,所述第一指示信息用于指示终端设备在第一切片内的用量耗尽;所 述第一策略控制网元向移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,所述第一策略控制网元向所述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息。
基于上述方案,当终端设备在第一切片的用量耗尽后,可以避免该终端设备继续使用第一切片的服务,有助于实现正确通信。
作为一种可能的实现方法,第一策略控制网元向用量监控网元发送订阅消息,所述订阅消息包括第一切片的标识信息和终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一切片的用量状态信息。
第八方面,本申请提供一种通信方法,该方法包括:第一策略控制网元从用量监控网元接收第一指示信息,所述第一指示信息用于指示第一切片的用量耗尽;所述第一策略控制网元向移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,所述第一策略控制网元向允许接入所述第一切片的终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息。
基于上述方案,当第一切片的用量耗尽后,可以避免允许接入该第一切片的终端设备继续使用第一切片的服务,有助于实现正确通信。
作为一种可能的实现方法,第一策略控制网元向用量监控网元发送订阅消息,所述订阅消息包括所述第一切片的标识信息,所述订阅消息用于订阅所述第一切片的用量状态信息。
第九方面,本申请提供一种通信方法,该方法包括:第一策略控制网元从所述用量监控网元接收第一指示信息,所述第一指示信息用于指示终端设备在第一网络内的用量耗尽;所述第一策略控制网元向移动性管理网元发送所述第一网络的可用性状态信息,所述可用性状态信息用于指示所述第一网络不可用;或者,所述第一策略控制网元向所述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一网络的标识信息。
基于上述方案,当终端设备在第一网络的用量耗尽后,可以避免该终端设备继续使用第一网络的服务,有助于实现正确通信。
作为一种可能的实现方法,第一策略控制网元向用量监控网元发送订阅消息,所述订阅消息包括第一网络的标识信息和终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一网络的用量状态信息。
第十方面,本申请提供一种通信方法,该方法包括:用量监控网元获取终端设备的标识信息和第一切片的标识信息;所述用量监控网元确定所述终端设备在所述第一切片内的用量耗尽;所述用量监控网元向第一策略控制网元发送第一指示信息,所述第一指示信息用于指示所述终端设备在所述第一切片内的用量耗尽。
第十一方面,本申请提供一种通信方法,该方法包括:用量监控网元获取第一切片的标识信息;所述用量监控网元确定所述第一切片内的用量耗尽;所述用量监控网元向第一策略控制网元发送第一指示信息,所述第一指示信息用于指示所述第一切片的用量耗尽。
第十二方面,本申请提供一种通信方法,该方法包括:用量监控网元获取第一网络的标识信息和终端设备的标识信息;所述用量监控网元确定所述终端设备在所述第一网络内的用量耗尽;所述用量监控网元向第一策略控制网元发送第一指示信息,所述第一指示信息用于指示所述终端设备在所述第一网络内的用量耗尽。
第十三方面,本申请实施例提供一种通信装置,该装置可以是策略控制网元,还可以 是用于策略控制网元的芯片。该装置具有实现上述第一方面、或第二方面、或第五方面、或第七方面、或第八方面、或第九方面、或第一方面的各实现方法、或第二方面的各实现方法、或第五方面的各实现方法、或第七方面的各实现方法、或第八方面的各实现方法、或第九方面的各实现方法的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
第十四方面,本申请实施例提供一种通信装置,该装置可以是移动性管理网元,还可以是用于移动性管理网元的芯片。该装置具有实现上述第三方面、或第四方面、或第六方面、或第三方面的各实现方法、或第四方面的各实现方法、或第六方面的各实现方法的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
第十五方面,本申请实施例提供一种通信装置,该装置可以是用量监控网元,还可以是用于用量监控网元的芯片。该装置具有实现上述第十方面、或第十一方面、或第十二方面、或第十方面的各实现方法、或第十一方面的各实现方法、或第十二方面的各实现方法的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
第十六方面,本申请实施例提供一种通信装置,包括处理器和存储器;该存储器用于存储计算机执行指令,当该装置运行时,该处理器执行该存储器存储的该计算机执行指令,以使该装置执行上述第一方面至第十二方面的方法、或第一方面至第十二方面的各实现方法、或第二方面的各实现方法、或第三方面的各实现方法。
第十七方面,本申请实施例提供一种通信装置,包括用于执行上述第一方面至第十二方面的方法、或第一方面至第十二方面的各实现方法的各个步骤的单元或手段(means)。
第十八方面,本申请实施例提供一种通信装置,包括处理器和通信接口,所述通信接口用于接收代码指令并传输至所述处理器,所述处理器用于运行所述代码指令以执行上述第一方面至第十二方面的方法、或第一方面至第十二方面的各实现方法。
第十九方面,本申请实施例提供一种通信装置,包括处理器,与存储器耦合,用于调用所述存储器中存储的程序,以执行上述第一方面至第十二方面的方法或第一方面至第十二方面的各实现方法。该存储器可以位于该装置之内,也可以位于该装置之外。且该处理器包括一个或多个。
第二十方面,本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得处理器执行上述第一方面至第十二方面的方法、或第一方面至第十二方面的各实现方法。
第二十一方面,本申请实施例还提供一种计算机程序产品,该计算机产品包括计算机程序,当计算机程序运行时,使得上述第一方面至第十二方面的方法、或第一方面至第十二方面的各实现方法被执行。
二十二方面,本申请实施例还提供一种芯片系统,包括处理器和存储器。存储器用于存储计算机程序;处理器用于从所述存储器调用并运行所述计算机程序,使得安装有所述芯片系统的设备执行上述第一方面至第十二方面的方法、或第一方面至第十二方面的各实现方法。
第二十三方面,本申请实施例还提供一种通信系统,包括:第一策略控制网元和用量监控网元。第一策略控制网元,用于向用量监控网元发送订阅消息,所述订阅消息包括第 一切片的标识信息和终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一切片的用量状态信息;从所述用量监控网元接收第一指示信息,所述第一指示信息用于指示所述终端设备在所述第一切片内的用量耗尽;以及,向移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,向所述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息。用量监控网元,用于从第一策略控制网元接收所述订阅消息;在终端设备在第一切片内的用量耗尽的情况下,向所述第一策略控制网元发送所述第一指示信息。
第二十四方面,本申请实施例还提供一种通信方法,包括:第一策略控制网元向用量监控网元发送订阅消息,所述订阅消息包括第一切片的标识信息和终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一切片的用量状态信息;用量监控网元从第一策略控制网元接收所述订阅消息;在终端设备在第一切片内的用量耗尽的情况下,用量监控网元向所述第一策略控制网元发送第一指示信息,所述第一指示信息用于指示所述终端设备在所述第一切片内的用量耗尽;第一策略控制网元从所述用量监控网元接收所述第一指示信息;第一策略控制网元向移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,第一策略控制网元向所述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息。
第二十五方面,本申请实施例还提供一种通信系统,包括:第一策略控制网元和用量监控网元。第一策略控制网元,用于向用量监控网元发送订阅消息,所述订阅消息包括第一切片的标识信息,所述订阅消息用于订阅所述第一切片的用量状态信息;从所述用量监控网元接收第一指示信息,所述第一指示信息用于指示所述第一切片的用量耗尽;以及,向移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,向允许接入所述第一切片的终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息。用量监控网元,用于从第一策略控制网元接收所述订阅消息;在第一切片的用量耗尽的情况下,向所述第一策略控制网元发送所述第一指示信息。
第二十六方面,本申请实施例还提供一种通信方法,包括:第一策略控制网元向用量监控网元发送订阅消息,所述订阅消息包括第一切片的标识信息,所述订阅消息用于订阅所述第一切片的用量状态信息;用量监控网元从第一策略控制网元接收所述订阅消息;在第一切片的用量耗尽的情况下,用量监控网元向所述第一策略控制网元发送第一指示信息,所述第一指示信息用于指示所述第一切片的用量耗尽;第一策略控制网元从所述用量监控网元接收所述第一指示信息;第一策略控制网元向移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,第一策略控制网元向允许接入所述第一切片的终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息。
第二十七方面,本申请实施例还提供一种通信系统,包括:第一策略控制网元和用量监控网元。第一策略控制网元,用于向用量监控网元发送订阅消息,所述订阅消息包括第一网络的标识信息和终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一网络的用量状态信息;从所述用量监控网元接收第一指示信息,所述第一指示信息用于指示所述终端设备在所述第一网络内的用量耗尽;以及,向移动性管理网元发送所述第一网络的可用性状态信息,所述可用性状态信息用于指示所述第一网络不可用;或者,向所 述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一网络的标识信息。用量监控网元,用于从第一策略控制网元接收所述订阅消息;在终端设备在第一网络内的用量耗尽的情况下,向所述第一策略控制网元发送所述第一指示信息。
第二十八方面,本申请实施例还提供一种通信方法,包括:第一策略控制网元向用量监控网元发送订阅消息,所述订阅消息包括第一网络的标识信息和终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一网络的用量状态信息;用量监控网元从第一策略控制网元接收所述订阅消息;在终端设备在第一网络内的用量耗尽的情况下,用量监控网元向所述第一策略控制网元发送第一指示信息,所述第一指示信息用于指示所述终端设备在所述第一网络内的用量耗尽;第一策略控制网元从所述用量监控网元接收所述第一指示信息;第一策略控制网元向移动性管理网元发送所述第一网络的可用性状态信息,所述可用性状态信息用于指示所述第一网络不可用;或者,第一策略控制网元向所述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一网络的标识信息。
附图说明
图1为本申请提供的一种通信系统示意图;
图2(a)为基于服务化架构的5G网络架构示意图;
图2(b)为基于点对点接口的5G网络架构示意图;
图3(a)为本申请提供的一种通信方法流程示意图;
图3(b)为本申请提供的又一种通信方法流程示意图;
图3(c)为本申请提供的又一种通信方法流程示意图;
图4为本申请提供的又一种通信方法流程示意图;
图5为本申请提供的又一种通信方法流程示意图;
图6为本申请提供的又一种通信方法流程示意图;
图7为本申请提供的又一种通信方法流程示意图;
图8为本申请提供的又一种通信方法流程示意图;
图9为本申请提供的又一种通信方法流程示意图;
图10为本申请提供的一种通信装置示意图;
图11为本申请提供的又一种通信装置示意图。
具体实施方式
为了使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请作进一步地详细描述。方法实施例中的具体操作方法也可以应用于装置实施例或系统实施例中。其中,在本申请的描述中,除非另有说明,“多个”的含义是两个或两个以上。
为解决背景技术中提到的问题,如图1所示,本申请提供一种通信系统,该系统包括第一策略控制网元和用量监控网元。可选的,该系统还包括移动性管理网元。
其中,用量监控网元可以是第二策略控制网元,所述第二策略控制网元为会话管理网元提供服务。或者,用量监控网元可以是统一数据库。或者,用量监控网元可以是网络数据分析网元。
在第一个实施例中:
第一策略控制网元,用于向用量监控网元发送订阅消息,所述订阅消息包括第一切片的标识信息和终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一切片的用量状态信息;从所述用量监控网元接收第一指示信息,所述第一指示信息用于指示所述终端设备在所述第一切片内的用量耗尽;以及,向移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,向所述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息。用量监控网元,用于从第一策略控制网元接收所述订阅消息;在终端设备在第一切片内的用量耗尽的情况下,向所述第一策略控制网元发送所述第一指示信息。
作为一种可能的实现方法,第一策略控制网元,还用于在向用量监控网元发送订阅消息之前,从所述移动性管理网元接收允许所述终端设备接入的切片的标识信息,所述允许所述终端设备接入的切片包括所述第一切片。
作为一种可能的实现方法,第一策略控制网元,还用于确定所述允许所述终端设备接入的切片中的所述第一切片。
作为一种可能的实现方法,第一策略控制网元,还用于在向用量监控网元发送订阅消息之前,从所述移动性管理网元接收所述第一切片的标识信息和第二指示信息,所述第二指示信息用于指示对所述终端设备在所述第一切片的用量状态进行监控。
作为一种可能的实现方法,所述第一策略控制网元,用于从所述用量监控网元接收第一指示信息,具体包括:用于从所述用量监控网元接收切片用量状态事件报告,所述切片用量状态事件报告包括所述第一切片的标识信息和所述第一指示信息。
作为一种可能的实现方法,所述移动性管理网元,用于向所述终端设备发送允许所述终端设备接入的切片的标识信息,所述允许所述终端设备接入的切片的标识信息不包括所述第一切片的标识信息。
在第二个实施例中:
第一策略控制网元,用于向用量监控网元发送订阅消息,所述订阅消息包括第一切片的标识信息,所述订阅消息用于订阅所述第一切片的用量状态信息;从所述用量监控网元接收第一指示信息,所述第一指示信息用于指示所述第一切片的用量耗尽;以及,向移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,向允许接入所述第一切片的终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息。用量监控网元,用于从第一策略控制网元接收所述订阅消息;在第一切片的用量耗尽的情况下,向所述第一策略控制网元发送所述第一指示信息。
其中,允许接入第一切片的终端设备也可以理解为支持接入第一切片的终端设备,具体地,可理解为该终端设备所收到的允许接入的切片标识(Allowed NSSAI)或是其签约的切片标识(Subscribed NSSAI)中包含该第一切片的标识信息。
作为一种可能的实现方法,所述第一策略控制网元,还用于在向用量监控网元发送订阅消息之前,从所述移动性管理网元接收所述第一切片的标识信息和第二指示信息,所述第二指示信息用于指示对所述第一切片的用量状态进行监控。
作为一种可能的实现方法,所述第一策略控制网元,用于从所述用量监控网元接收第一指示信息,具体包括:用于从所述用量监控网元接收切片用量状态事件报告,所述切片 用量状态事件报告包括所述第一切片的标识信息和所述第一指示信息。
作为一种可能的实现方法,所述移动性管理网元,用于向允许接入所述第一切片的终端设备发送更新后的允许所述终端设备接入的切片的标识信息,所述更新后的允许所述终端设备接入的切片的标识信息不包括所述第一切片的标识信息。
在第三个实施例中:
第一策略控制网元,用于向用量监控网元发送订阅消息,所述订阅消息包括第一网络的标识信息和终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一网络的用量状态信息;从所述用量监控网元接收第一指示信息,所述第一指示信息用于指示所述终端设备在所述第一网络内的用量耗尽;以及,向移动性管理网元发送所述第一网络的可用性状态信息,所述可用性状态信息用于指示所述第一网络不可用;或者,向所述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一网络的标识信息。用量监控网元,用于从第一策略控制网元接收所述订阅消息;在终端设备在第一网络内的用量耗尽的情况下,向所述第一策略控制网元发送所述第一指示信息。
作为一种可能的实现方法,所述第一网络的标识信息为第一数据网络名称DNN,所述第一DNN用于标识第一数据网络,所述订阅消息用于订阅所述终端设备在所述第一数据网络的用量状态信息,所述第一指示信息用于指示所述终端设备在所述第一数据网络内的用量耗尽。
作为一种可能的实现方法,所述第一策略控制网元,还用于在向用量监控网元发送订阅消息之前,从所述移动性管理网元接收签约的DNN,所述签约的DNN包括所述第一DNN。
作为一种可能的实现方法,所述第一策略控制网元,还用于确定所述签约的DNN中的所述第一DNN。
作为一种可能的实现方法,所述第一策略控制网元,还用于在向用量监控网元发送订阅消息之前,从所述移动性管理网元接收所述第一DNN和第二指示信息,所述第二指示信息用于指示对所述终端设备在所述第一数据网络的用量状态进行监控。
作为一种可能的实现方法,所述第一策略控制网元,用于从所述用量监控网元接收第一指示信息,具体包括:用于从所述用量监控网元接收用量状态事件报告,所述用量状态事件报告包括所述第一DNN和所述第一指示信息。
作为一种可能的实现方法,所述第一网络的标识信息为第一数据网络名称DNN和第一切片的标识信息,所述第一DNN用于标识第一数据网络,所述第一切片的标识信息用于标识第一切片,所述订阅消息用于订阅所述终端设备在所述第一数据网络和所述第一切片的用量状态信息,所述第一指示信息用于指示所述终端设备在所述第一数据网络和所述第一切片内的用量耗尽。
作为一种可能的实现方法,所述第一策略控制网元,还用于在向用量监控网元发送订阅消息之前,从所述移动性管理网元接收签约的DNN和允许所述终端设备接入的切片的标识信息,所述签约的DNN包括所述第一DNN,所述允许所述终端设备接入的切片包括所述第一切片。
作为一种可能的实现方法,所述第一策略控制网元,还用于确定所述签约的DNN中的所述第一DNN和所述允许所述终端设备接入的切片中的所述第一切片。
作为一种可能的实现方法,所述第一策略控制网元,还用于在向用量监控网元发送订阅消息之前,从所述移动性管理网元接收所述第一DNN、所述第一切片的标识信息和第二指示信息,所述第二指示信息用于指示对所述终端设备在所述第一数据网络和所述第一切片的用量状态进行监控。
作为一种可能的实现方法,所述第一策略控制网元,用于从所述用量监控网元接收第一指示信息,具体包括:用于从所述用量监控网元接收用量状态事件报告,所述用量状态事件报告包括所述第一DNN、所述第一切片的标识信息和所述第一指示信息。
作为一种可能的实现方法,所述移动性管理网元,用于向所述终端设备发送第二网络的标识,所述第二网络为允许所述终端设备接入的网络,所述第二网络的标识不包括所述第一网络的标识信息。
作为一种可能的实现方法,所述第一网络的标识信息为第一数据网络名称DNN,所述第一DNN用于标识第一数据网络;所述移动性管理网元,用于在从策略控制网元接收第一网络的可用性状态信息之前,向所述策略控制网元发送签约的DNN,所述签约的DNN包括所述第一DNN;或者,确定签约的DNN中的所述第一DNN,以及向所述策略控制网元发送所述第一DNN和指示信息,所述指示信息用于指示对所述终端设备在所述第一数据网络的用量状态进行监控。
作为一种可能的实现方法,所述第一网络的标识信息为第一数据网络名称DNN和第一切片的标识信息,所述第一DNN用于标识第一数据网络;所述移动性管理网元,用于从策略控制网元接收第一网络的可用性状态信息之前,向所述策略控制网元发送签约的DNN和允许所述终端设备接入的切片的标识信息,所述签约的DNN包括所述第一DNN,所述允许所述终端设备接入的切片包括所述第一切片;或者,确定签约的DNN中的所述第一DNN,确定所述允许所述终端设备接入的切片中的所述第一切片;以及向所述策略控制网元发送所述第一DNN、所述第一切片的标识信息和指示信息,所述指示信息用于指示对所述终端设备在所述第一数据网络和所述到第一切片的用量状态进行监控。
在第四个实施例中:
用量监控网元,用于获取终端设备的标识信息和第一切片的标识信息;确定所述终端设备在所述第一切片内的用量耗尽;向第一策略控制网元发送第一指示信息,所述第一指示信息用于指示所述终端设备在所述第一切片内的用量耗尽。第一策略控制网元,用于从用量监控网元接收所述第一指示信息;以及,向移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,向所述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息。
作为一种可能的实现方法,用量监控网元,用于获取终端设备的标识信息和第一切片的标识信息,包括:用于从第一策略控制网元接收订阅消息,所述订阅消息包括第一切片的标识信息和终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一切片的用量状态信息。
在第五个实施例中:
用量监控网元,用于获取第一切片的标识信息;确定第一切片的用量耗尽;向第一策略控制网元发送第一指示信息,所述第一指示信息用于指示所述第一切片的用量耗尽。第 一策略控制网元,用于从用量监控网元接收所述第一指示信息;以及,向移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,向允许接入所述第一切片的终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息。
作为一种可能的实现方法,用量监控网元,用于获取第一切片的标识信息,包括:用于从第一策略控制网元接收订阅消息,所述订阅消息包括第一切片的标识信息,所述订阅消息用于订阅所述第一切片的用量状态信息。
在第六个实施例中:
用量监控网元,用于获取终端设备的标识信息和第一网络的标识信息;确定所述终端设备在所述第一网络内的用量耗尽;向第一策略控制网元发送第一指示信息,所述第一指示信息用于指示所述终端设备在所述第一网络内的用量耗尽。第一策略控制网元,用于从用量监控网元接收所述第一指示信息;以及,向移动性管理网元发送所述第一网络的可用性状态信息,所述可用性状态信息用于指示所述第一网络不可用;或者,向所述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一网络的标识信息。
作为一种可能的实现方法,用量监控网元,用于获取终端设备的标识信息和第一网络的标识信息,包括:用于从第一策略控制网元接收订阅消息,所述订阅消息包括第一网络的标识信息和终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一网络的用量状态信息。
其中,上述方案的具体实现将在后续方法实施例部分详细阐述,在此不再赘述。
图1所示的系统可以用在图2(a)或图2(b)所示的第五代(5th generation,5G)网络架构中,当然,也可以用在未来网络架构,比如第六代(6th generation,6G)网络架构等,本申请不做限定。
示例性的,假设图1所示的通信系统应用于5G网络架构,如图2(a)所示,为基于服务化架构的5G网络架构示意图。图1中的第一策略控制网元所对应的网元或者实体可以为图2(a)所示的5G网络架构中的策略控制功能(policy control function,PCF)网元,图1中的用量监控网元所对应的网元或者实体可以为图2(a)所示的5G网络架构中的PCF网元、统一数据库(Unified Data Repository,UDR)、或网络数据分析功能(NetWork Data Analysis Function,NWDAF)网元(图中未示出)。图1中的移动性管理网元所对应的网元或者实体可以为图2(a)所示的5G网络架构中的接入与移动性管理功能(access and mobility management function,AMF)网元。
图2(a)所示的5G网络架构中可包括三部分,分别是终端设备部分、数据网络(data network,DN)和运营商网络部分。下面对其中的部分网元的功能进行简单介绍说明。
其中,运营商网络可包括以下网元中的一个或多个:鉴权服务器功能(Authentication Server Function,AUSF)网元、网络开放功能(network exposure function,NEF)网元、PCF网元、统一数据管理(unified data management,UDM)网元、UDR、网络存储功能(Network Repository Function,NRF)网元、应用功能(application function,AF)网元、AMF网元、会话管理功能(session management function,SMF)网元、无线接入网(radio access network,RAN)以及用户面功能(user plane function,UPF)网元等。上述运营商网络中, 除无线接入网部分之外的部分可以称为核心网络部分。
在具体实现中,本申请实施例中的终端设备,可以是用于实现无线通信功能的设备。其中,终端设备可以是5G网络或者未来演进的公共陆地移动网络(public land mobile network,PLMN)中的用户设备(user equipment,UE)、接入终端、终端单元、终端站、移动站、移动台、远方站、远程终端、移动设备、无线通信设备、终端代理或终端装置等。接入终端可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备或可穿戴设备,虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等。终端可以是移动的,也可以是固定的。
上述终端设备可通过运营商网络提供的接口(例如N1等)与运营商网络建立连接,使用运营商网络提供的数据和/或语音等服务。终端设备还可通过运营商网络访问DN,使用DN上部署的运营商业务,和/或第三方提供的业务。其中,上述第三方可为运营商网络和终端设备之外的服务方,可为终端设备提供他数据和/或语音等服务。其中,上述第三方的具体表现形式,具体可根据实际应用场景确定,在此不做限制。
RAN是运营商网络的子网络,是运营商网络中业务节点与终端设备之间的实施系统。终端设备要接入运营商网络,首先是经过RAN,进而可通过RAN与运营商网络的业务节点连接。本申请中的RAN设备,是一种为终端设备提供无线通信功能的设备,RAN设备也称为接入网设备。本申请中的RAN设备包括但不限于:5G中的下一代基站(g nodeB,gNB)、演进型节点B(evolved node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved nodeB,或home node B,HNB)、基带单元(baseBand unit,BBU)、传输点(transmitting and receiving point,TRP)、发射点(transmitting point,TP)、移动交换中心等。
AMF网元,主要进行移动性管理、接入鉴权/授权等功能。此外,还负责在UE与PCF间传递用户策略。
SMF网元,主要进行会话管理、PCF下发控制策略的执行、UPF的选择、UE互联网协议(internet protocol,IP)地址分配等功能。
UPF网元,作为和数据网络的接口UPF,完成用户面数据转发、基于会话/流级的计费统计,带宽限制等功能。
UDM网元,主要负责管理签约数据、用户接入授权等功能。
UDR,主要负责签约数据、策略数据、应用数据等类型数据的存取功能。
NEF网元,主要用于支持能力和事件的开放。
AF网元,主要传递应用侧对网络侧的需求,例如,服务质量(Quality of Service,QoS)需求或用户状态事件订阅等。AF可以是第三方功能实体,也可以是运营商部署的应用服务,如IP多媒体子系统(IP Multimedia Subsystem,IMS)语音呼叫业务。
PCF网元,主要负责针对会话、业务流级别进行计费、QoS带宽保障及移动性管理、 UE策略决策等策略控制功能。该架构中,AMF所连接的PCF可以提供接入与移动性控制(PCF for Access and Mobility Control),以及可以提供UE策略控制(PCF for UE Policy Control),或者理解为AMF所连接的PCF包括AM PCF和UE PCF。SMF所连接的PCF可以提供会话管理(PCF for Session Management),或者理解为SMF所连接的PCF称为SM PCF。在实际部署中,AMF所连接的PCF与SMF所连接的PCF可能是同一个PCF,也可能是不同的PCF。
NRF网元,可用于提供网元发现功能,基于其他网元的请求,提供网元类型对应的网元信息。NRF还提供网元管理服务,如网元注册、更新、去注册以及网元状态订阅和推送等。
AUSF网元:主要负责对用户进行鉴权,以确定是否允许用户或设备接入网络。
DN,是位于运营商网络之外的网络,运营商网络可以接入多个DN,DN上可部署多种业务,可为终端设备提供数据和/或语音等服务。例如,DN是某智能工厂的私有网络,智能工厂安装在车间的传感器可为终端设备,DN中部署了传感器的控制服务器,控制服务器可为传感器提供服务。传感器可与控制服务器通信,获取控制服务器的指令,根据指令将采集的传感器数据传送给控制服务器等。又例如,DN是某公司的内部办公网络,该公司员工的手机或者电脑可为终端设备,员工的手机或者电脑可以访问公司内部办公网络上的信息、数据资源等。
图2(a)中Nausf、Nnef、Npcf、Nudm、Naf、Namf、Nsmf、N1、N2、N3、N4,以及N6为接口序列号。这些接口序列号的含义可参见3GPP标准协议中定义的含义,在此不做限制。
示例性的,假设图1所示的通信系统应用于5G网络架构,如图2(b)所示,为基于点对点接口的5G网络架构示意图。图1中的第一策略控制网元所对应的网元或者实体可以为图2(b)所示的5G网络架构中的PCF网元,图1中的用量监控网元所对应的网元或者实体可以为图2(b)所示的5G网络架构中的PCF网元、UDR、或NWDAF网元(图中未示出)。图1中的移动性管理网元所对应的网元或者实体可以为图2(b)所示的5G网络架构中的AMF网元。
图2(b)中的网元的功能的介绍可以参考图2(a)中对应的网元的功能的介绍,不再赘述。图2(b)与图2(a)的主要区别在于:图2(b)中的各个网元之间的接口是点对点的接口,而不是服务化的接口。
在图2(b)所示的架构中,各个网元之间的接口名称及功能如下:
1)、N7:PCF与SMF之间的接口,用于下发协议数据单元(protocol data unit,PDU)会话粒度以及业务数据流粒度控制策略。
2)、N15:PCF与AMF之间的接口,用于下发UE策略及接入控制相关策略。
3)、N5:AF与PCF之间的接口,用于应用业务请求下发以及网络事件上报。
4)、N4:SMF与UPF之间的接口,用于控制面与用户面之间传递信息,包括控制面向用户面的转发规则、QoS控制规则、流量统计规则等的下发以及用户面的信息上报。
5)、N11:SMF与AMF之间的接口,用于传递RAN和UPF之间的PDU会话隧道信息、传递发送给UE的控制消息、传递发送给RAN的无线资源控制信息等。
6)、N2:AMF与RAN之间的接口,用于传递核心网侧至RAN的无线承载控制信息等。
7)、N1:AMF与UE之间的接口,接入无关,用于向UE传递QoS控制规则等。
8)、N8:AMF与UDM间的接口,用于AMF向UDM获取接入与移动性管理相关签约数据与鉴权数据,以及AMF向UDM注册UE当前移动性管理相关信息等。
9)、N10:SMF与UDM间的接口,用于SMF向UDM获取会话管理相关签约数据,以及SMF向UDM注册UE当前会话相关信息等。
10)、N35:UDM与UDR间的接口,用于UDM从UDR中获取用户签约数据信息。
11)、N36:PCF与UDR间的接口,用于PCF从UDR中获取策略相关签约数据以及应用数据相关信息。
12)、N12:AMF和AUSF间的接口,用于AMF向AUSF发起鉴权流程,其中可携带SUCI作为签约标识;
13)、N13:UDM与AUSF间的接口,用于AUSF向UDM获取用户鉴权向量,以执行鉴权流程。
可以理解的是,上述网元或者功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。可选的,上述网元或者功能可以由一个设备实现,也可以由多个设备共同实现,还可以是一个设备内的一个功能模块,本申请实施例对此不作具体限定。
本申请中的移动性管理网元、会话管理网元、策略控制网元、应用功能网元、接入网设备、用户面网元分别可以是图2(a)或图2(b)中的AMF、SMF、PCF、AF、RAN、UPF,也可以是未来通信如第六代(6th generation,6G)网络中具有上述AMF、SMF、PCF、AF、RAN、UPF的功能的网元,本申请对此不限定。为方便说明,本申请以移动性管理网元、会话管理网元、策略控制网元、应用功能网元、接入网设备、用户面网元分别为上述AMF、SMF、PCF、AF、RAN、UPF为例进行说明。进一步地,本申请中将终端设备简称为UE。
为便于理解本申请方案,下面首先对相关背景技术进行介绍说明。
一、通用的用户注册流程
通用的用户注册流程可简单描述为:UE通过RAN发送注册请求至AMF,AMF根据永久签约标识(Subscription Permanent Identifier,SUPI)向特定UDM获取签约数据,UDM收到该请求后可向UDR获取实际签约数据。此外,AMF还可向PCF发起用户策略关联建立请求(UEPolicyControl_Create Request)及接入管理策略关联建立请求(AMPolicyControl_Create Request),分别用于获取UE策略及接入控制策略。PCF在该过程中返回接入控制策略至AMF,以及经由AMF向UE提供UE策略。
二、通用的会话建立流程
通用的会话建立流程可简单描述为:UE通过RAN发送会话建立请求到AMF,AMF为该会话选择SMF为其提供服务,保存SMF与PDU会话的对应关系,并将会话建立请求发送至SMF,SMF为UE选择相应UPF并建立用户面传输路径,并为其分配IP地址。在此过程中,SMF还将向PCF发起策略控制会话建立请求,用于在SMF和PCF间建立策略控制会话。在策略控制会话建立过程中,SMF将保存策略控制会话与PDU会话间的对应关系。此外,AF还可与PCF间建立AF会话,由PCF对AF会话与策略控制会话进行绑定。
三、允许的网络切片选择辅助信息(network slicing selection assistance information,NSSAI)(Allowed NSSAI)
为实现切片接入控制,在注册流程中,AMF可根据来自UE的请求的NSSAI(Requested NSSAI)、来自UDM的签约的NSSAI(Subscribed NSSAI),以及本地配置的运营商策略等信息,决策生成Allowed NSSAI,作为网络侧允许UE使用的切片的标识。可选地,该过程还可以有网络切片选择功能(Network Slice Selection Function,NSSF)网元的参与,即AMF提供当前所收到的Subscribed NSSAI、Requested NSSAI等切片相关输入,及公共陆地移动网络(public land mobile network,PLMN)标识(ID)、跟踪区标识(Tracking Area Identity,TAI)等信息,用于NSSF决策UE的Allowed NSSAI。在网间切换场景下,AMF也可通过提供UE在归属网络下的切片信息,用于请求NSSF决策UE的Allowed NSSAI。
具体地,UE的Requested NSSAI可以是UE根据默认配置的NSSAI(Default Configured NSSAI)以及当前接入方式下的Allowed NSSAI所组合而成,本申请实施例对此不做限定。
四、5G策略架构
当前5G架构中,与AMF直接相连的PCF(该PCF包括AM PCF和UE PCF)支持提供下述策略至AMF或经由AMF提供至UE:
1)UE PCF经由AMF提供给UE的用户策略(UE Policy)。
用户策略主要包括接入网络发现与选择策略(Access Network Discovery and Selection Policy,ANDSP)与用户路由选择策略(UE Routing Selection Policy,URSP)。用户策略由UE PCF经由AMF提供至UE。
其中,ANDSP主要用于UE在非3GPP(Non-3GPP)接入时执行接入网的选择,以及执行接入网元的选择。URSP用于UE发起应用或业务时选择相应路由参数的策略规则,如选择该应用或业务所需要的数据网名称(Data Network Name,DNN)、单网络切片选择辅助信息(single network slice selection assistance information,S-NSSAI)、会话与业务连续性模式(Session and Service Continuity mode,SSC mode)等。
2)AM PCF提供给AMF的接入与移动性管理策略。
接入与移动性管理策略主要包括服务区域限制(Service Area Restriction)及无线接入技术/频点选择策略(RAT/Frequency Selection Policy,RFSP)。
其中,服务区域限制主要包括允许接入区域、禁止接入区域等信息,如特殊管控区域禁止用户接入运营商网络。RFSP主要用户执行接入方式、频点选择使用,如部分小区拥塞时将调整RFSP策略以引导拥塞小区下的用户迁移至其他小区。
当前5G架构中,与SMF直接相连的PCF(该PCF也可以称为SM PCF)支持提供会话管理策略至SMF。其中,会话管理策略包含业务流或会话级别的QoS策略、计费控制、流转发控制等信息,如业务流级别的策略计费控制规则(Policy and Charging Control rule,PCC rule)和会话级别的PDU会话策略控制信息(PDU Session Policy Control Information)。
五、用户策略机制
当前标准中定义了两种用户策略,分别为ANDSP和URSP。本申请实施例主要涉及URSP场景。
URSP主要由两部分内容组成:流描述信息(Traffic descriptor)和路由选择描述信息列表(List of Route Selection Descriptors,RSD list)。其中,流描述信息例如包括操作系统标识(OS ID)、应用标识(APP ID)、IP三元组、域描述信息等等。路由选择描述信息包括S-NSSAI、DNN、SSC mode等等。
其中,UE执行URSP匹配的过程为:当UE判断需发起特定业务或应用时,将根据URSP的优先级,按顺序将待发起的业务或应用与所收到的URSP中的流描述信息进行匹配,若匹配到具体的URSP(该URSP也可能是默认URSP,如流描述信息为Match-all形式),则UE还需判断该URSP里的RSD所包含的S-NSSAI是否符合Allowed NSSAI的限定,若该RSD中的S-NSSAI不属于Allowed NSSAI,则UE将按照RSD的优先级继续判断下一条RSD是否满足该条件。若满足该条件,UE还需判断是否已有PDU会话符合该RSD的定义:
1)、如果已有PDU会话所对应的DNN,S-NSSAI,SSC mode等信息与所匹配URSP所对应的路由选择描述信息中的对应信息均一致,则UE可以选择在已有PDU会话的基础上发起PDU会话修改请求,该PDU会话修改请求中可携带参数包括当前PDU Session ID,N1SM Container(PDU Session Modification Request(PDU Session ID,packet filters,Operation,Requested QoS));其中PDU Session ID用于AMF关联至具体会话上下文,N1SM Container则由AMF透传至SMF,以指示UE所希望发起的具体业务以及该业务所需要得到的QoS保障。
2)、如果已有PDU Session(s)均无法与该URSP的RSD信息匹配,则UE将为该业务/应用发起PDU会话建立请求,并在发送至AMF的请求消息中携带新分配的PDU Session ID及RSD中的DNN,S-NSSAI,N1SM Container(SSC mode,PDU Session Type)等参数;其中,新分配的PDU Session ID用于标识该PDU会话建立请求所对应的PDU会话,DNN+S-NSSAI则作为AMF为该PDU会话建立请求选择SMF实体的参数,N1SM Container则由AMF透传至所选择的SMF。
现有技术中,在一种场景中(以下称为场景一),UE以用户粒度增值服务形式向运营商订购某个或某些高优先级切片的服务,并被允许在该切片内使用特定配额的服务,如流量、使用时长等。在该UE在该切片内的配额耗尽的情况下,根据签约,该UE将仅被允许使用普通切片接入相应业务。也即,该UE不再允许使用订购的高优先级切片。
在另一种场景中(以下称为场景二),切片租户(如企业)以切片粒度向运营商订购满足特定指标的切片服务,并由网络侧执行切片粒度的用量控制,如由UDR或NWDAF网元根据周边网元所上报的用量信息对该切片执行用量控制。在该切片内的用量配额耗尽的情况下,根据签约,该切片内的UE将不被允许通过该切片接入相应业务。
上述场景一和场景二是运营商基于切片粒度执行用量监控,在另一场景中(以下称为场景三),在部分运营商网络部署中,也存在基于数据网络粒度(也称为DNN粒度)或基于数据网络+切片粒度(也称为DNN+S-NSSAI粒度)执行用量监控的方式,并基于用量监控结果执行URSP策略调整,以避免UE继续请求接入对应的DNN或DNN+S-NSSAI。
结合上述场景,若UE在切片内的用量耗尽、或切片的用量耗尽、或UE在数据网络的用量耗尽、或UE在数据网络和切片的用量耗尽的情况下,如何调整相应参数,使得UE不再继续使用该切片的服务,目前还没有相应的解决方案。
为解决上述问题,基于图2(a)或图2(b)所示的网络架构,如图3(a)所示,本申请提供一种通信方法。该方法可应用于切换流程(如4G切换到5G,或5G切换到5G等),或初始注册流程等。
该实施例是针对上述场景一的解决方案。该方案中,在UE在第一切片的配额耗尽的情况下及时调整允许该UE接入的切片,从而避免UE在第一切片的配额耗尽的情况下仍将UE引导至该第一切片而导致发生错误。
该方法包括以下步骤:
步骤301a,第一PCF向用量监控网元发送订阅消息。相应地,用量监控网元可以接收到该订阅消息。
该订阅消息包括第一切片的标识信息和UE的标识信息,订阅消息用于订阅UE在第一切片的用量状态信息。
这里的第一切片可以是一个或多个切片。
也即,UE在第一切片内是有配额限制的。例如,UE在第一切片内的配额等于第一切片的配额乘以一个预设比例。这里的配额可以是流量、或时长等。示例性的,第一切片的流量配额是100G,UE 1在第一切片的配额是1G,UE 2在第一切片的配额是1.5G等等。
这里的第一PCF为AMF提供服务,该第一PCF包括AM PCF和UE PCF。或者理解为第一PCF具备AM PCF的功能和UE PCF的功能。
作为一种实现方法,这里的用量监控网元可以是第二PCF,该第二PCF为SMF提供服务,该第二PCF也可以称为SM PCF。
作为又一种实现方法,这里的用量监控网元可以是UDR。
作为又一种实现方法,这里的用量监控网元还可以是NWDAF网元。
步骤302a,用量监控网元向第一PCF发送第一指示信息。相应地,第一PCF可以接收到该第一指示信息。
用量监控网元接收到订阅消息后,对UE在第一切片内的用量情况进行监控,当发现UE在第一切片内的用量耗尽,则向第一PCF发送第一指示信息,用于指示UE在第一切片内的用量耗尽。
作为一种具体实现方法,该步骤302a可以是:第一PCF从用量监控网元接收切片用量状态事件报告,该切片用量状态事件报告包括第一切片的标识信息和第一指示信息。
第一PCF在接收到第一指示信息之后,可以通知AMF该第一切片不可用,然后由AMF通知UE不使用第一切片(对应以下步骤303a至步骤304a)。或者,第一PCF在接收到第一指示信息之后,由第一PCF通过用户路由选择策略通知UE不使用第一切片(对应以下步骤305a)。在实际应用中,可以选择其中一种方式来执行。
步骤303a,第一PCF向AMF发送第一切片的可用性状态信息。相应地,AMF可以接收到该第一切片的可用性状态信息。
该可用性状态信息用于指示第一切片不可用。或者理解为,该可用性状态用于指示UE不可以使用该第一切片。
步骤304a,AMF向UE发送允许该UE接入的切片的标识信息。相应地,UE可以接收到该允许该UE接入的切片的标识信息。
其中,允许该UE接入的切片的标识信息不包括第一切片的标识信息。
作为一种具体实现方法,允许该UE接入的切片的标识信息可以用Allowed NSSAI表示,则该UE的Allowed NSSAI中不包括第一切片的标识信息。从而该UE将不会接入到第一切片。
由于允许UE接入的切片的标识信息不包括上述第一切片的标识信息,后续UE不会 使用第一切片的服务,从而当UE在第一切片内的用量耗尽后,可以避免该UE继续使用该第一切片的服务,有助于实现正确通信。
可选的,还包括步骤305a。
步骤305a,第一PCF向UE发送用户路由选择策略。相应地,UE可以接收到该用户路由选择策略。
该UE的用户路由选择策略不包括第一切片的标识信息。
由于该UE的用户路由选择策略不包括上述第一切片的标识信息,后续UE不会使用第一切片的服务,从而当UE在第一切片内的用量耗尽后,可以避免该UE继续使用该第一切片的服务,有助于实现正确通信。
作为一种实现方法,在上述步骤301a之前,第一PCF还确定需要对UE在第一切片的用量进行监控,包括但不限于以下实现方法。
实现方法一,AMF向第一PCF发送允许UE接入的切片的标识信息,其中,允许UE接入的切片的标识信息包括上述第一切片的标识信息。第一PCF接收到允许UE接入的切片的识信息之后,可以根据运营商策略,确定该UE在第一切片是有用量限制,则确定需要对UE在第一切片的用量进行监控。
基于该实现方法,作为一种实现方式,上述步骤301a的订阅消息可以包括允许UE接入的切片的标识信息,用量监控网元接收到允许UE接入的切片的标识信息之后,确定UE需要在其中的第一切片内执行用量监控。或者,作为另一种实现方式,上述步骤301a的订阅消息包括第一切片的标识信息,不包括允许UE接入的切片的标识信息中的除第一切片的标识信息之外的其他标识信息。
实现方法二,AMF确定允许UE接入的切片的标识信息,其中,允许UE接入的切片的标识信息包括上述第一切片的标识信息。然后,AMF根据运营商策略,确定该UE在第一切片是有用量限制,则向第一PCF发送第一切片的标识信息和第二指示信息,该第二指示信息用于指示对该UE在第一切片的用量状态进行监控。
为解决上述问题,基于图2(a)或图2(b)所示的网络架构,如图3(b)所示,本申请提供又一种通信方法。该方法可应用于切换流程(如4G切换到5G,或5G切换到5G等),或初始注册流程等。
该实施例是针对上述场景二的解决方案。该方案中,在第一切片的配额耗尽的情况下及时调整第一切片内的UE可以接入的切片,从而避免在第一切片的配额耗尽的情况下,该第一切片内的UE继续使用该第一切片而导致发生错误。
该方法包括以下步骤:
步骤301b,第一PCF向用量监控网元发送订阅消息。相应地,用量监控网元可以接收到该订阅消息。
该订阅消息包括第一切片的标识信息,订阅消息用于订阅第一切片的用量状态信息。
这里的第一切片可以是一个或多个切片。
也即,第一切片是配额限制的。这里的配额可以是流量、或时长等。示例性的,第一切片的流量配额是100G。
需要说明的是,该允许接入第一切片的所有UE均可以使用该第一切片的配额,并且每个UE的配额即为该第一切片的配额。比如,第一切片的流量配额是100G,则允许接入 该切片的所有UE可共同使用的流量配额也是100G。
这里的第一PCF为AMF提供服务,该第一PCF包括AM PCF和UE PCF。或者理解为第一PCF具备AM PCF的功能和UE PCF的功能。
作为一种实现方法,这里的用量监控网元可以是UDR。
作为又一种实现方法,这里的用量监控网元还可以是NWDAF网元。
步骤302b,用量监控网元向第一PCF发送第一指示信息。相应地,第一PCF可以接收到该第一指示信息。
用量监控网元接收到订阅消息后,对第一切片内的用量情况进行监控,当发现第一切片的用量耗尽,则向第一PCF发送第一指示信息,用于指示第一切片的用量耗尽。
作为一种具体实现方法,该步骤302b可以是:第一PCF从用量监控网元接收切片用量状态事件报告,该切片用量状态事件报告包括第一切片的标识信息和第一指示信息。
第一PCF在接收到第一指示信息之后,可以通知AMF该第一切片不可用,然后由AMF通知允许接入该第一切片的UE不使用第一切片(对应以下步骤303b至步骤304b)。或者,第一PCF在接收到第一指示信息之后,由第一PCF通过用户路由选择策略通知允许接入该第一切片的UE不使用第一切片(对应以下步骤305b)。在实际应用中,可以选择其中一种方式来执行。
步骤303b,第一PCF向AMF发送第一切片的可用性状态信息。相应地,AMF可以接收到该第一切片的可用性状态信息。
该可用性状态信息用于指示第一切片不可用。或者理解为,该可用性状态用于指示允许接入第一切片的UE不可以使用该第一切片。
步骤304b,AMF向UE发送更新后的允许该UE接入的切片的标识信息。相应地,UE可以接收到更新后的允许该UE接入的切片的标识信息。
这里的UE指的是允许接入第一切片的UE。允许接入第一切片的UE可以是一个或多个UE。或者理解为,这里的UE所收到的允许接入的切片标识(Allowed NSSAI)或是其签约的切片标识(Subscribed NSSAI)中包含该第一切片的标识信息。也即,在步骤304b之前的任意步骤或其他流程中,该UE可以接收到Allowed NSSAI,其中包含第一切片的标识信息,和/或,在该UE的Subscribed NSSAI中包含第一切片的标识信息。这表明该UE可以接入该第一切片。
在上述步骤303b中,由于AMF接收到第一切片的可用性状态信息,指示该第一切片不可用,则在该步骤304b中,AMF将需要通知允许接入该第一切片的UE,该第一切片不再可用或暂时不可用,因此该步骤304b中,AMF可以向UE发送更新的允许该UE接入的切片的标识信息(或称为new Allowed NSSAI),其中不包含第一切片的标识信息。
由于更新后的允许UE接入的切片的标识信息不包括上述第一切片的标识信息,后续该UE不会使用第一切片的服务,从而当第一切片的用量耗尽后,可以避免相应的UE继续使用该第一切片的服务,有助于实现正确通信。
步骤305b,第一PCF向UE发送用户路由选择策略。相应地,UE可以接收到该用户路由选择策略。
这里的UE指的是允许接入第一切片的UE。允许接入第一切片的UE可以是一个或多个UE。
该UE的用户路由选择策略不包括第一切片的标识信息。
由于允许接入第一切片的UE的用户路由选择策略不包括上述第一切片的标识信息,后续UE不会使用第一切片的服务,从而当第一切片的用量耗尽后,可以避免允许接入第一切片的UE继续使用该第一切片的服务,有助于实现正确通信。
作为一种实现方法,在上述步骤301b之前,第一PCF还确定需要对UE在第一切片的用量进行监控,比如可以通过以下方法实现:AMF可以根据运营商策略,确定AMF支持的切片中的需要执行用量监控的第一切片,然后AMF向PCF发送第一切片的标识信息和指示信息,该指示信息用于指示对第一切片的用量状态进行监控。
为解决上述问题,基于图2(a)或图2(b)所示的网络架构,如图3(c)所示,本申请提供一种通信方法。该方法可应用于切换流程(如4G切换到5G,或5G切换到5G等),或初始注册流程等。
该实施例是针对上述场景三的解决方案。该方案中,在UE在第一网络的配额耗尽的情况下及时通知UE,从而避免UE在第一网络的配额耗尽的情况下仍将UE引导至该第一网络而导致发生错误。
该方法包括以下步骤:
步骤301c,第一PCF向用量监控网元发送订阅消息。相应地,用量监控网元可以接收到该订阅消息。
该订阅消息包括第一网络的标识信息和UE的标识信息,订阅消息用于订阅UE在第一网络的用量状态信息。
在一种实现方法中,第一网络是第一数据网络,第一网络的标识信息为第一DNN。
在另一种实现方法中,第一网络是第一数据网络和第一切片这一组合,第一网络的标识信息为第一DNN和第一切片的标识信息。
这里的第一网络可以是一个或多个网络。
也即,UE在第一网络内是有配额限制的。例如,UE在第一网络内的配额等于第一网络的配额乘以一个预设比例。这里的配额可以是流量、或时长等。示例性的,第一网络的流量配额是100G,UE 1在第一网络的配额是1G,UE 2在第一网络的配额是1.5G等等。
这里的第一PCF为AMF提供服务,该第一PCF包括AM PCF和UE PCF。或者理解为第一PCF具备AM PCF的功能和UE PCF的功能。
作为一种实现方法,这里的用量监控网元可以是第二PCF,该第二PCF为SMF提供服务,该第二PCF也可以称为SM PCF。
作为又一种实现方法,这里的用量监控网元可以是UDR。
作为又一种实现方法,这里的用量监控网元还可以是NWDAF网元。
步骤302c,用量监控网元向第一PCF发送第一指示信息。相应地,第一PCF可以接收到该第一指示信息。
用量监控网元接收到订阅消息后,对UE在第一网络内的用量情况进行监控,当发现UE在第一网络内的用量耗尽,则向第一PCF发送第一指示信息,用于指示UE在第一网络内的用量耗尽。
作为一种具体实现方法,该步骤302c可以是:第一PCF从用量监控网元接收用量状态事件报告,该用量状态事件报告包括第一网络的标识信息和第一指示信息。
第一PCF在接收到第一指示信息之后,可以通知AMF该第一网络不可用,然后由AMF 通知UE不使用第一网络(对应以下步骤303c至步骤304c)。或者,第一PCF在接收到第一指示信息之后,由第一PCF通过用户路由选择策略通知UE不使用第一网络(对应以下步骤305c。在实际应用中,可以选择其中一种方式来执行。
步骤303c,第一PCF向AMF发送第一网络的可用性状态信息。相应地,AMF可以接收到该第一网络的可用性状态信息。
该可用性状态信息用于指示第一网络不可用。或者理解为,该可用性状态用于指示UE不可以使用该第一网络。
步骤304c,AMF向UE发送第二网络的标识信息。相应地,UE可以接收到第二网络的标识信息。
第二网络的标识信息也可以理解为是允许该UE接入的网络的标识信息。
其中,第二网络的标识信息不包括第一网络的标识信息。
由于第二网络的标识信息不包括上述第一网络的标识信息,后续UE不会使用第一网络的服务,从而当UE在第一网络内的用量耗尽后,可以避免该UE继续使用该第一网络的服务,有助于实现正确通信。
可选的,还包括步骤305c。
步骤305c,第一PCF向UE发送用户路由选择策略。相应地,UE可以接收到该用户路由选择策略。
该UE的用户路由选择策略不包括第一网络的标识信息。
由于该UE的用户路由选择策略不包括上述第一网络的标识信息,后续UE不会使用第一网络的服务,从而当UE在第一网络内的用量耗尽后,可以避免该UE继续使用该第一网络的服务,有助于实现正确通信。
作为一种实现方法,在上述步骤301c之前,第一PCF还确定需要对UE在第一网络的用量进行监控,包括但不限于以下实现方法。
场景一,第一网络的标识信息为第一DNN。
该场景一下第一PCF还确定需要对UE在第一网络的用量进行监控,包括但不限于以下实现方法一和二。
实现方法一,AMF向第一PCF发送签约的DNN,其中,签约的DNN包括上述第一DNN。第一PCF接收到签约的DNN之后,可以根据运营商策略,确定该UE在签约的DNN中的第一DNN标识的第一数据网络是有用量限制,则确定需要对UE在第一数据网络的用量进行监控。
基于该实现方法,作为一种实现方式,上述步骤301c的订阅消息可以包括签约的DNN,用量监控网元接收到签约的DNN之后,确定UE需要在其中的第一数据网络内执行用量监控。或者,作为另一种实现方式,上述步骤301c的订阅消息包括第一DNN,不包括签约的DNN中的除第一DNN之外的其他DNN。
实现方法二,AMF确定签约的DNN,其中,签约的DNN包括上述第一DNN。然后,AMF根据运营商策略,确定该UE在第一DNN标识的第一数据网络是有用量限制,则向第一PCF发送第一DNN和第二指示信息,该第二指示信息用于指示对该UE在第一数据网络的用量状态进行监控。
场景二,第一网络的标识信息为第一DNN和第一切片的标识信息。
该场景一下第一PCF还确定需要对UE在第一DNN和第一切片的用量进行监控,包括但不限于以下实现方法三和四。
实现方法三,AMF向第一PCF发送签约的DNN和允许UE接入的切片的标识信息,其中,签约的DNN包括上述第一DNN,允许UE接入的切片的标识信息包括上述第一切片的标识信息。第一PCF接收到签约的DNN和允许UE接入的切片的识信息之后,可以根据运营商策略,确定该UE在第一DNN标识的第一数据网络和第一切片是有用量限制,则确定需要对UE在第一数据网络和第一切片的用量进行监控。
基于该实现方法,作为一种实现方式,上述步骤301c的订阅消息可以包括签约的DNN和允许UE接入的切片的标识信息,用量监控网元接收到签约的DNN和允许UE接入的切片的标识信息之后,确定UE需要在签约的DNN中的第一DNN标识的第一网络和UE接入的切片中的第一切片内执行用量监控。或者,作为另一种实现方式,上述步骤301c的订阅消息包括第一DNN和第一切片的标识信息,不包括签约的DNN中的除第一DNN之外的其他DNN,也不包括允许UE接入的切片的标识信息中的除第一切片的标识信息之外的其他切片的标识信息。
实现方法四,AMF确定签约的DNN和允许UE接入的切片的标识信息,其中,签约的DNN包括上述第一DNN,允许UE接入的切片的标识信息包括上述第一切片的标识信息。然后,AMF根据运营商策略,确定该UE在第一DNN标识的第一数据网络和第一切片是有用量限制,则向第一PCF发送第一DNN、第一切片的标识信息和第二指示信息,该第二指示信息用于指示对该UE在第一数据网络和第一切片的用量状态进行监控。
下面结合具体示例,对上述图3(a)、图3(b)和图3(c)所示的流程进行介绍说明。其中,以下实施例中,图4和图5对应的实施例是图3(a)对应的实施例的具体示例。图6和图7对应的实施例是图3(b)对应的实施例的具体示例。图8和图9对应的实施例是图3(c)对应的实施例的具体示例。
本申请实施例中,将AMF连接的PCF称为第一PCF,该第一PCF包括UE PCF和AMF PCF,也即第一PCF具备为UE提供策略和为AMF提供策略的功能。将SMF连接的PCF称为第二PCF或SM PCF。
如图4所示,为本申请提供的又一种通信方法流程示意图。该方法可应用于切换流程(如4G切换到5G,或5G切换到5G等),或初始注册流程等。
该方案由第一PCF根据来自AMF的Allowed NSSAI确定需要执行UE的用量状态监控的切片,以便确定UE在第一切片的配额耗尽的情况下及时调整该UE的Allowed NSSAI,从而避免在UE在第一切片的配额耗尽的情况下仍将UE引导至该第一切片而导致发生错误。
该方法包括以下步骤:
步骤401,AMF向第一PCF发送策略控制请求消息。相应的,第一PCF可以接收到该策略控制请求消息。
该策略控制请求消息携带允许UE接入的切片的标识信息,比如允许UE接入的切片的标识信息可以用Allowed NSSAI来表示。该Allowed NSSAI包括一个或多个S-NSSAI,每个S-NSSAI用于标识一个网络侧决策允许UE接入的切片。因此,Allowed NSSAI用于 标识一个或多个允许UE接入的切片。
步骤402,第一PCF确定允许接入的切片中的第一切片,该第一切片为需要执行UE的用量状态监控的切片。
也即,该UE在第一切片内的是有配额限制的,例如该UE的配额为第一切片的总量的20%。
作为一种实现方法,第一PCF可以根据运营商策略确定UE在第一切片中的用量是有配额限制的,则确定第一切片需要执行UE的用量状态监控。
需要说明的是,这里的第一切片可以是一个或多个切片。
步骤403,第一PCF向用量监控网元发送订阅消息。相应的,用量监控网元可以接收到该订阅消息。
该订阅消息包括UE的标识信息(如SUPI)和第一切片的标识信息,该订阅消息用于订阅UE在第一切片的用量状态信息。可选的,该订阅消息还可以包括用量状态事件,用于指示订阅的事件为用量状态监控事件。
这里的用量监控网元可以是第二PCF(即SM PCF),或UDR,或NWDAF网元。
需要说明的是,若第一PCF和第二PCF设置于同一个物理实体,则第一PCF向第二PCF发送的订阅消息是一个内部消息。比如,第一PCF模块通过内部接口向第二PCF模块发送该订阅消息请求上述用量状态信息。
步骤404,第一PCF向AMF发送策略控制响应消息。相应的,AMF可以接收到该策略控制响应消息。
该策略控制响应消息包括接入与移动性管理策略(AM Policy),如RFSP索引,服务区域限制等。
该步骤404为可选步骤。
步骤405,用量监控网元向第一PCF发送切片用量状态事件报告。相应的,第一PCF可以接收到该切片用量状态事件报告。
该切片用量状态事件报告包括第一切片的标识信息和指示信息,该指示信息用于指示UE在第一切片内的用量耗尽,或者该指示信息用于指示UE在第一切片内的用量达到配额。
作为一种实现方法,当用量监控网元为第二PCF,则第二PCF可以根据SMF所执行的用量统计以及来自UDR的该UE的切片配额,判断该UE再第一切片内的用量已经耗尽。
步骤406,第一PCF根据切片用量状态事件报告,向AMF发送策略控制更新请求消息。相应的,AMF可以接收到该策略控制更新请求消息。
该策略控制更新请求消息包含第一切片的标识信息和第一切片的可用性状态信息,该可用性状态信息用于指示第一切片不可用。
步骤407,AMF向第一PCF发送策略控制更新响应消息。相应的,第一PCF可以接收到该策略控制更新响应消息。
该步骤407为可选步骤。
步骤408,AMF确定更新的允许UE接入的切片的标识信息,该更新的允许UE接入的切片的标识信息不包括上述第一切片的标识信息。
步骤409,AMF向UE发送配置更新消息。相应的,UE可以接收到配置更新消息。
该配置更新消息包含更新的允许UE接入的切片的标识信息。
UE获取到更新的允许UE接入的切片的标识信息之后,可以根据更新的允许UE接入 的切片的标识信息发送会话建立流程。
基于上述方案,由于更新的允许UE接入的切片的标识信息不包括上述第一切片的标识信息,后续UE不会使用第一切片的服务,从而当UE在某个切片内的用量耗尽后,可以避免该UE继续使用该切片的服务,有助于实现正确通信。
作为一种可替代的实现方式,上述步骤402也可以由AMF执行,且是在步骤401之前执行。具体的,AMF先执行上述步骤402,然后执行上述步骤401,且步骤401的策略控制请求消息中携带的不是允许UE接入的切片的标识信息,而是第一切片的标识信息和指示信息,该指示信息用于指示对UE在第一切片的用量状态进行监控。后续步骤则仍然按照上述步骤403至步骤409的顺序执行。
作为一种实现方法,上述步骤401中的策略控制请求消息为Npcf_AMPolicyControl_Create Request消息,上述步骤404的策略控制响应消息为Npcf_AMPolicyControl_Create Response消息,上述步骤406的策略控制更新请求消息为Npcf_AMPolicyControl_UpdateNotify Request消息,上述步骤407的策略控制更新响应消息为Npcf_AMPolicyControl_UpdateNotify Response消息。
作为另一种实现方法,上述步骤401中的策略控制请求消息为Npcf_AMPolicyControl_Update Request消息,上述步骤404的策略控制响应消息为Npcf_AMPolicyControl_Update Response消息,上述步骤406的策略控制更新请求消息为Npcf_AMPolicyControl_UpdateNotify Request消息,上述步骤407的策略控制更新响应消息为Npcf_AMPolicyControl_UpdateNotify Response消息。
作为另一种实现方法,上述步骤401中的策略控制请求消息为Npcf_UEPolicyControl_Create Request消息,上述步骤404的策略控制响应消息为Npcf_UEPolicyControl_Create Response消息,上述步骤406的策略控制更新请求消息为Npcf_UEPolicyControl_UpdateNotify Request消息,上述步骤407的策略控制更新响应消息为Npcf_UEPolicyControl_UpdateNotify Response消息。
作为另一种实现方法,上述步骤401中的策略控制请求消息为Npcf_UEPolicyControl_Update Request消息,上述步骤404的策略控制响应消息为Npcf_UEPolicyControl_Update Response消息,上述步骤406的策略控制更新请求消息为Npcf_UEPolicyControl_UpdateNotify Request消息,上述步骤407的策略控制更新响应消息为Npcf_UEPolicyControl_UpdateNotify Response消息。
如图5所示,为本申请提供的又一种通信方法流程示意图。该方法可应用于切换流程(如4G切换到5G,或5G切换到5G等),或初始注册流程等。
该方案由第一PCF根据来自AMF的Allowed NSSAI确定需要执行UE的用量状态监控的第一切片,以便确定在UE在第一切片的配额耗尽的情况下及时调整该UE的Allowed NSSAI,从而避免在UE在第一切片的配额耗尽的情况下仍将UE引导至该第一切片而导致发生错误。该方法是通过更新URSP策略的方式避免UE在用量耗尽的切片内发起业务请求。
该方法包括以下步骤:
步骤501至步骤505,同图4实施例的步骤401至步骤405,可参考前述描述。
步骤506,第一PCF确定UE的更新的URSP,该URSP不包括第一切片的标识信息。
具体的,根据前述描述,URSP中包括一个或多个RSD,每个RSD中包括S-NSSAI、DNN、SSC mode等信息。本申请实施例中,可以通过更新URSP,使得更新的URSP的每个RSD中都不包括第一切片的标识信息。从而使得UE无法匹配到包含有第一切片的标识信息的RSD,因而UE无法使用该第一切片。
步骤507,第一PCF向AMF发送用户策略更新请求消息。相应的,AMF可以接收到该用户策略更新请求消息。
该策略控制更新消息包含更新的URSP。
步骤508,AMF向第一PCF发送用户策略更新响应消息。相应的,第一PCF可以接收到该用户策略更新响应消息。
该步骤508为可选步骤。
步骤509,AMF向UE发送配置更新消息。相应的,UE可以接收到配置更新消息。
该配置更新消息包含更新的URSP。
基于上述方案,由于更新的URSP不包括上述第一切片的标识信息,后续UE不会使用第一切片的服务,从而当UE在某个切片内的用量耗尽后,可以避免该UE继续使用该切片的服务,有助于实现正确通信。
作为一种可替代的实现方式,上述步骤502也可以由AMF执行,且是在步骤501之前执行。具体的,AMF先执行上述步骤502,然后执行上述步骤501,且步骤501的策略控制请求消息中携带的不是允许UE接入的切片的标识信息,而是第一切片的标识信息和指示信息,该指示信息用于指示对UE在第一切片的用量状态进行监控。后续步骤则仍然按照上述步骤503至步骤509的顺序执行。
作为一种实现方法,上述步骤507的用户策略更新请求消息为Namf_N1N2MessageTransfer Request消息,上述步骤508的用户策略更新响应消息为Namf_N1N2MessageTransfer Response消息。
如图6所示,为本申请提供的又一种通信方法流程示意图。该方法可应用于切换流程(如4G切换到5G,或5G切换到5G等),或初始注册流程等。
该方案由AMF确定租户订购的切片中需要执行用量状态监控的切片,然后向第一PCF发送该切片的信息,以便第一PCF确定在该切片的配额耗尽的情况下及时向AMF通知该配额耗尽事件,以便触发AMF调整该切片下的UE的Allowed NSSAI,从而避免在该切片的配额耗尽的情况下仍为允许接入该切片的UE提供服务而导致发生错误。
该方法包括以下步骤:
步骤601,AMF确定第一切片,该第一切片为该AMF支持的切片中需要执行用量状态监控的切片。
也即,第一切片是有配额限制的,可选的,第一切片的配额包括流量配额和/或时长配额。例如,第一切片的流程配额为100兆,时长配额为1小时。
作为一种实现方法,AMF可以根据运营商策略确定AMF支持的切片中的第一切片的用量是有配额限制的,则确定第一切片需要执行用量状态监控。
需要说明的是,这里的第一切片可以是一个或多个切片。
步骤602,AMF向第一PCF发送策略控制请求消息。相应的,第一PCF可以接收到该策略控制请求消息。
该策略控制请求消息携带第一切片的标识信息和指示信息,该指示信息用于指示对所述第一切片的用量状态信息进行监控。
步骤603,第一PCF向用量监控网元发送订阅消息。相应的,用量监控网元可以接收到该订阅消息。
该订阅消息包括第一切片的标识信息,该订阅消息用于订阅第一切片的用量状态信息。可选的,该订阅消息还可以包括用量状态事件,用于指示订阅的事件为用量状态监控事件。
这里的用量监控网元可以是UDR,或NWDAF网元。
步骤604,第一PCF向AMF发送策略控制响应消息。相应的,AMF可以接收到该策略控制响应消息。
该策略控制响应消息包括接入与移动性管理策略(AM Policy),如RFSP索引,服务区域限制等。
该步骤604为可选步骤。
步骤605,用量监控网元向第一PCF发送切片用量状态事件报告。相应的,第一PCF可以接收到该切片用量状态事件报告。
该切片用量状态事件报告包括第一切片的标识信息和指示信息,该指示信息用于指示第一切片的用量耗尽,或者该指示信息用于指示第一切片内的用量达到配额。
步骤606,第一PCF根据切片用量状态事件报告,向AMF发送策略控制更新请求消息。相应的,AMF可以接收到该策略控制更新请求消息。
该策略控制更新请求消息包含第一切片的标识信息和第一切片的可用性状态信息,该可用性状态信息用于指示第一切片不可用。
步骤607,AMF向第一PCF发送策略控制更新响应消息。相应的,第一PCF可以接收到该策略控制更新响应消息。
该步骤607为可选步骤。
步骤608,AMF确定更新的允许UE接入的切片的标识信息,该更新的允许UE接入的切片的标识信息不包括上述第一切片的标识信息。这里的UE指的是允许使用第一切片的服务的UE,该UE所收到的更新前的Allowed NSSAI或所签约的Subscribed NSSAI中包含第一切片,或者称为第一切片下的UE。
其中,该步骤608中的更新的允许UE接入的切片的标识信息可以表示为new Allowed NSSAI(即更新后的Allowed NSSAI)。
步骤609,AMF向UE发送配置更新消息。相应的,UE可以接收到配置更新消息。
该配置更新消息包含更新的允许UE接入的切片的标识信息。
UE获取到更新的允许UE接入的切片的标识信息之后,可以根据更新的允许UE接入的切片的标识信息发送会话建立流程。
基于上述方案,由于更新的允许UE接入的切片的标识信息不包括上述第一切片的标识信息,后续UE不会使用第一切片的服务,从而当某个切片内的用量耗尽后,可以避免该切片下的UE继续使用该切片的服务,有助于实现正确通信。
作为一种实现方法,上述步骤602中的策略控制请求消息为Npcf_AMPolicyControl_Create Request消息,上述步骤604的策略控制响应消息为Npcf_AMPolicyControl_Create Response消息,上述步骤606的策略控制更新请求消息为Npcf_AMPolicyControl_UpdateNotify Request消息,上述步骤607的策略控制更新响应消息 为Npcf_AMPolicyControl_UpdateNotify Response消息。
作为另一种实现方法,上述步骤602中的策略控制请求消息为Npcf_AMPolicyControl_Update Request消息,上述步骤604的策略控制响应消息为Npcf_AMPolicyControl_Update Response消息,上述步骤606的策略控制更新请求消息为Npcf_AMPolicyControl_UpdateNotify Request消息,上述步骤607的策略控制更新响应消息为Npcf_AMPolicyControl_UpdateNotify Response消息。
作为另一种实现方法,上述步骤602中的策略控制请求消息为Npcf_UEPolicyControl_Create Request消息,上述步骤604的策略控制响应消息为Npcf_UEPolicyControl_Create Response消息,上述步骤606的策略控制更新请求消息为Npcf_UEPolicyControl_UpdateNotify Request消息,上述步骤607的策略控制更新响应消息为Npcf_UEPolicyControl_UpdateNotify Response消息。
作为另一种实现方法,上述步骤602中的策略控制请求消息为Npcf_UEPolicyControl_Update Request消息,上述步骤604的策略控制响应消息为Npcf_UEPolicyControl_Update Response消息,上述步骤606的策略控制更新请求消息为Npcf_UEPolicyControl_UpdateNotify Request消息,上述步骤607的策略控制更新响应消息为Npcf_UEPolicyControl_UpdateNotify Response消息。
如图7所示,为本申请提供的又一种通信方法流程示意图。该方法可应用于切换流程(如4G切换到5G,或5G切换到5G等),或初始注册流程等。
该方案由AMF确定租户订购的切片中需要执行用量状态监控的切片,然后向第一PCF发送该切片的信息,以便第一PCF确定在该切片的配额耗尽的情况下及时调整该切片下的UE的URSP,从而避免在该切片的配额耗尽的情况下仍为该切片下的UE提供服务而导致发生错误。该方法是通过更新URSP策略的方式避免UE在用量耗尽的切片内发起业务请求。
该方法包括以下步骤:
步骤701至步骤705,同图6实施例的步骤601至步骤605,可参考前述描述。
步骤706,第一PCF确定UE的更新的URSP,该URSP不包括第一切片的标识信息。
这里的UE指的是允许使用第一切片的服务的UE,例如该UE所收到的Allowed NSSAI或所签约的Subscribed NSSAI中包含第一切片,或者称为第一切片下的UE。
具体的,根据前述描述,URSP中包括一个或多个RSD,每个RSD中包括S-NSSAI、DNN、SSC mode等信息。本申请实施例中,可以通过更新URSP,使得更新的URSP的每个RSD中都不包括第一切片的标识信息。从而使得UE无法匹配到包含有第一切片的标识信息的RSD,因而UE无法使用该第一切片。
步骤707,第一PCF向AMF发送用户策略更新请求消息。相应的,AMF可以接收到该用户策略更新请求消息。
该策略控制更新请求消息包含更新的URSP。
步骤708,AMF向第一PCF发送用户策略更新响应消息。相应的,第一PCF可以接收到该用户策略更新响应消息。
该步骤708为可选步骤。
步骤709,AMF向UE发送配置更新消息。相应的,UE可以接收到配置更新消息。
这里的UE指的是使用第一切片的服务的UE,或者称为第一切片下的UE。
该配置更新消息包含更新的URSP。
基于上述方案,由于更新的URSP不包括上述第一切片的标识信息,后续UE不会使用第一切片的服务,从而当某个切片的用量耗尽后,可以避免允许接入该切片的UE继续使用该切片的服务,有助于实现正确通信。
作为一种实现方法,上述步骤707的用户策略更新请求消息为Namf_N1N2MessageTransfer Request消息,上述步骤708的用户策略更新响应消息为Namf_N1N2MessageTransfer Response消息。
如图8所示,为本申请提供的又一种通信方法流程示意图。该方法可应用于切换流程(如4G切换到5G,或5G切换到5G等),或初始注册流程等。
该方案由第一PCF确定需要执行UE的用量状态监控的网络,以便确定UE在第一网络的配额耗尽的情况下,仍将UE引导至该第一网络而导致发生错误。
该方法包括以下步骤:
步骤801,AMF向第一PCF发送策略控制请求消息。相应的,第一PCF可以接收到该策略控制请求消息。
作为一种实现方法,该策略控制请求消息携带签约的DNN,该签约的DNN包括UE签约的一个或多个DNN。
作为另一种实现方法,该策略控制请求消息携带签约的DNN和允许UE接入的切片的标识信息,该签约的DNN包括UE签约的一个或多个DNN,允许UE接入的切片的标识信息可以用Allowed NSSAI来表示。该Allowed NSSAI包括一个或多个S-NSSAI,每个S-NSSAI用于标识一个网络侧决策允许UE接入的切片。因此,Allowed NSSAI用于标识一个或多个允许UE接入的切片。
步骤802,第一PCF确定第一网络的标识信息,该第一网络为需要执行UE的用量状态监控的网络。
作为一种实现方法,上述策略控制请求消息携带签约的DNN,则该步骤802中第一PCF确定的第一网络的标识信息为签约的DNN中的第一DNN。
作为一种实现方法,上述策略控制请求消息携带签约的DNN和允许UE接入的切片的标识信息,则该步骤802中第一PCF确定的第一网络的标识信息为签约的DNN中的第一DNN和允许UE接入的切片的标识信息中的第一切片的标识信息,也即第一网络的标识信息为第一DNN和第一切片的标识信息。
也即,该UE在第一网络内的是有配额限制的,例如该UE的配额为第一网络的总量的20%。
作为一种实现方法,第一PCF可以根据运营商策略确定UE在第一网络中的用量是有配额限制的,则确定第一网络需要执行UE的用量状态监控。
需要说明的是,这里的第一网络可以是一个或多个网络。
步骤803,第一PCF向用量监控网元发送订阅消息。相应的,用量监控网元可以接收到该订阅消息。
该订阅消息包括UE的标识信息(如SUPI)和第一网络的标识信息,该订阅消息用于订阅UE在第一网络的用量状态信息。可选的,该订阅消息还可以包括用量状态事件,用 于指示订阅的事件为用量状态监控事件。
这里的用量监控网元可以是第二PCF(即SM PCF),或UDR,或NWDAF网元。
需要说明的是,若第一PCF和第二PCF设置于同一个物理实体,则第一PCF向第二PCF发送的订阅消息是一个内部消息。比如,第一PCF模块通过内部接口向第二PCF模块发送该订阅消息请求上述用量状态信息。
步骤804,第一PCF向AMF发送策略控制响应消息。相应的,AMF可以接收到该策略控制响应消息。
该策略控制响应消息包括接入与移动性管理策略(AM Policy),如RFSP索引,服务区域限制等。
该步骤804为可选步骤。
步骤805,用量监控网元向第一PCF发送用量状态事件报告。相应的,第一PCF可以接收到该用量状态事件报告。
该用量状态事件报告包括第一网络的标识信息和指示信息,该指示信息用于指示UE在第一网络内的用量耗尽,或者该指示信息用于指示UE在第一网络内的用量达到配额。
作为一种实现方法,当用量监控网元为第二PCF,则第二PCF可以根据SMF所执行的用量统计以及来自UDR的该UE的网络配额,判断该UE在第一网络内的用量已经耗尽。
步骤806,第一PCF根据用量状态事件报告,向AMF发送策略控制更新请求消息。相应的,AMF可以接收到该策略控制更新请求消息。
该策略控制更新请求消息包含第一网络的标识信息和第一网络的可用性状态信息,该可用性状态信息用于指示第一网络不可用。
步骤807,AMF向第一PCF发送策略控制更新响应消息。相应的,第一PCF可以接收到该策略控制更新响应消息。
该步骤807为可选步骤。
步骤808,AMF确定第二网络的标识信息,该第二网络的标识信息不包括上述第一网络的标识信息。
该第二网络的标识信息也可以理解为允许UE接入的网络的标识信息。
步骤809,AMF向UE发送配置更新消息。相应的,UE可以接收到配置更新消息。
该配置更新消息包含第二网络的标识信息。
UE获取到第二网络的标识信息之后,可以根据第二网络的标识信息发送会话建立流程。
基于上述方案,由于第二网络的标识信息不包括上述第一网络的标识信息,后续UE不会使用第一网络的服务,从而当UE在某个网络内的用量耗尽后,可以避免该UE继续使用该网络的服务,有助于实现正确通信。
作为一种可替代的实现方式,上述步骤802也可以由AMF执行,且是在步骤801之前执行。具体的,AMF先执行上述步骤802,然后执行上述步骤801,且步骤801的策略控制请求消息中携带的不是签约的DNN、或签约的DNN和允许UE接入的切片的标识信息,而是第一网络的标识信息和指示信息,该指示信息用于指示对UE在第一网络的用量状态进行监控。后续步骤则仍然按照上述步骤803至步骤809的顺序执行。
作为一种实现方法,上述步骤801中的策略控制请求消息为Npcf_AMPolicyControl_Create Request消息,上述步骤804的策略控制响应消息为 Npcf_AMPolicyControl_Create Response消息,上述步骤806的策略控制更新请求消息为Npcf_AMPolicyControl_UpdateNotify Request消息,上述步骤807的策略控制更新响应消息为Npcf_AMPolicyControl_UpdateNotify Response消息。
作为另一种实现方法,上述步骤801中的策略控制请求消息为Npcf_AMPolicyControl_Update Request消息,上述步骤804的策略控制响应消息为Npcf_AMPolicyControl_Update Response消息,上述步骤806的策略控制更新请求消息为Npcf_AMPolicyControl_UpdateNotify Request消息,上述步骤807的策略控制更新响应消息为Npcf_AMPolicyControl_UpdateNotify Response消息。
作为另一种实现方法,上述步骤801中的策略控制请求消息为Npcf_UEPolicyControl_Create Request消息,上述步骤804的策略控制响应消息为Npcf_UEPolicyControl_Create Response消息,上述步骤806的策略控制更新请求消息为Npcf_UEPolicyControl_UpdateNotify Request消息,上述步骤807的策略控制更新响应消息为Npcf_UEPolicyControl_UpdateNotify Response消息。
作为另一种实现方法,上述步骤801中的策略控制请求消息为Npcf_UEPolicyControl_Update Request消息,上述步骤804的策略控制响应消息为Npcf_UEPolicyControl_Update Response消息,上述步骤806的策略控制更新请求消息为Npcf_UEPolicyControl_UpdateNotify Request消息,上述步骤807的策略控制更新响应消息为Npcf_UEPolicyControl_UpdateNotify Response消息。
如图9所示,为本申请提供的又一种通信方法流程示意图。该方法可应用于切换流程(如4G切换到5G,或5G切换到5G等),或初始注册流程等。
该方案由第一PCF确定需要执行UE的用量状态监控的第一网络,以便确定在UE在第一网络的配额耗尽的情况下避免仍将UE引导至该第一网络而导致发生错误。该方法是通过更新URSP策略的方式避免UE在用量耗尽的网络内发起业务请求。
该方法包括以下步骤:
步骤901至步骤905,同图8实施例的步骤801至步骤805,可参考前述描述。
步骤906,第一PCF确定UE的更新的URSP,该URSP不包括第一网络的标识信息。
具体的,根据前述描述,URSP中包括一个或多个RSD,每个RSD中包括S-NSSAI、DNN、SSC mode等信息。本申请实施例中,可以通过更新URSP,使得更新的URSP的每个RSD中都不包括第一网络的标识信息。从而使得UE无法匹配到包含有第一网络的标识信息的RSD,因而UE无法使用该第一网络。
步骤907,第一PCF向AMF发送用户策略更新请求消息。相应的,AMF可以接收到该用户策略更新请求消息。
该策略控制更新消息包含更新的URSP。
步骤908,AMF向第一PCF发送用户策略更新响应消息。相应的,第一PCF可以接收到该用户策略更新响应消息。
该步骤908为可选步骤。
步骤909,AMF向UE发送配置更新消息。相应的,UE可以接收到配置更新消息。
该配置更新消息包含更新的URSP。
基于上述方案,由于更新的URSP不包括上述第一网络的标识信息,后续UE不会使 用第一网络的服务,从而当UE在某个网络内的用量耗尽后,可以避免该UE继续使用该网络的服务,有助于实现正确通信。
作为一种可替代的实现方式,上述步骤902也可以由AMF执行,且是在步骤901之前执行。具体的,AMF先执行上述步骤902,然后执行上述步骤901,且步骤901的策略控制请求消息中携带的不是签约的DNN、或签约的DNN和允许UE接入的切片的标识信息,而是第一网络的标识信息和指示信息,该指示信息用于指示对UE在第一网络的用量状态进行监控。后续步骤则仍然按照上述步骤903至步骤909的顺序执行。
作为一种实现方法,上述步骤907的用户策略更新请求消息为Namf_N1N2MessageTransfer Request消息,上述步骤908的用户策略更新响应消息为Namf_N1N2MessageTransfer Response消息。
在上述图3(a)至图3(c),以及图4-图9所示的实施例中,是由第一PCF向用量监控网络发送订阅消息,从而触发用量监控网元对UE在第一切片的用量、或第一切片的用量、或UE在第一网络的用量执行用量监控,进而当用量监控网元监测到UE在第一切片的用量耗尽、或第一切片的用量耗尽、或UE在第一网络的用量耗尽的情况下,向第一PCF发送第一指示信息。作为另一种实现方法,在上述图3(a)至图3(c),以及图4-图9所示的实施例中,也可以是由用量监控网元获取UE的标识信息和第一切片的标识信息(或第一网络的标识信息),例如可以是从SMF或其他网元获取UE的标识信息和第一切片的标识信息(或第一网络的标识信息),然后用量监控网元确定UE在第一切片的用量耗尽、或第一切片的用量耗尽、或UE在第一网络的用量耗尽,则向第一PCF发送第一指示信息,第一指示信息用于指示UE在第一切片的用量耗尽、或第一切片的用量耗尽、或UE在第一网络的用量耗尽。
上述主要从各个网元之间交互的角度对本申请提供的方案进行了介绍。可以理解的是,上述实现各网元为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本发明能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。
可以理解的是,上述各个方法实施例中,对应由第一策略控制网元实现的步骤或者操作,也可以由配置于第一策略控制网元的部件(例如芯片或者电路)实现,对应由用量监控网元实现的步骤或者操作,也可以由配置于用量监控网元的部件(例如芯片或者电路)实现,对应由移动性管理网元实现的步骤或者操作,也可以由配置于移动性管理网元的部件(例如芯片或者电路)实现。
参考图10,为本申请实施例提供的一种通信装置的示意图。该装置用于实现上述方法实施例中对应第一策略控制网元、或移动性管理网元所执行的各个步骤,如图10所示,该装置1000包括接收单元1010和发送单元1020。可选的,该装置1000还包括确定单元1030。
在第一个实施例中,该通信装置用于实现上述方法实施例中对应第一策略控制网元所 执行的各个步骤,则:
发送单元1020,用于向用量监控网元发送订阅消息,所述订阅消息包括第一切片的标识信息和终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一切片的用量状态信息;以及,向移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,向所述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息。接收单元1010,用于从所述用量监控网元接收第一指示信息,所述第一指示信息用于指示所述终端设备在所述第一切片内的用量耗尽。
作为一种可能的实现方法,所述接收单元1010,还用于在所述发送单元1020向用量监控网元发送订阅消息之前,从所述移动性管理网元接收允许所述终端设备接入的切片的标识信息,所述允许所述终端设备接入的切片包括所述第一切片。
作为一种可能的实现方法,确定单元1030,用于确定所述允许所述终端设备接入的切片中的所述第一切片。
作为一种可能的实现方法,所述接收单元1010,还用于在所述发送单元1020向用量监控网元发送订阅消息之前,从所述移动性管理网元接收所述第一切片的标识信息和第二指示信息,所述第二指示信息用于指示对所述终端设备在所述第一切片的用量状态进行监控。
作为一种可能的实现方法,所述接收单元1010,用于从所述用量监控网元接收第一指示信息,具体包括:用于从所述用量监控网元接收切片用量状态事件报告,所述切片用量状态事件报告包括所述第一切片的标识信息和所述第一指示信息。
作为一种可能的实现方法,所述用量监控网元为策略控制网元,所述策略控制网元为会话管理网元提供服务;或者,所述用量监控网元为统一数据库;或者,所述用量监控网元为网络数据分析网元。
在第二个实施例中,该通信装置用于实现上述方法实施例中对应第一策略控制网元所执行的各个步骤,则:
发送单元1020,用于向用量监控网元发送订阅消息,所述订阅消息包括第一切片的标识信息,所述订阅消息用于订阅所述第一切片的用量状态信息;以及,移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,所述第一策略控制网元向允许接入所述第一切片的终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息;接收单元1010,用于从所述用量监控网元接收第一指示信息,所述第一指示信息用于指示所述第一切片的用量耗尽。
作为一种可能的实现方法,所述接收单元1010,还用于在所述发送单元1020向用量监控网元发送订阅消息之前,从所述移动性管理网元接收所述第一切片的标识信息和第二指示信息,所述第二指示信息用于指示对所述第一切片的用量状态进行监控。
作为一种可能的实现方法,所述接收单元1010,用于从所述用量监控网元接收第一指示信息,具体包括:从所述用量监控网元接收切片用量状态事件报告,所述切片用量状态事件报告包括所述第一切片的标识信息和所述第一指示信息。
作为一种可能的实现方法,所述用量监控网元为策略控制网元,所述策略控制网元为会话管理网元提供服务;或者,所述用量监控网元为统一数据库;或者,所述用量监控网 元为网络数据分析网元。
在第三个实施例中,该通信装置用于实现上述方法实施例中对应移动性管理网元所执行的各个步骤,则:
接收单元1010,用于从策略控制网元接收第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用,所述可用性状态信息是所述终端设备在所述第一切片内的用量耗尽的情况下发送的;发送单元1020,用于向所述终端设备发送允许所述终端设备接入的切片的标识信息,所述允许所述终端设备接入的切片的标识信息不包括所述第一切片的标识信息。
作为一种可能的实现方法,所述发送单元1020,还用于在所述接收单元从策略控制网元接收第一切片的可用性状态信息之前,向所述策略控制网元发送允许所述终端设备接入的切片的标识信息,所述允许所述终端设备接入的切片包括所述第一切片;或者,确定单元1030,用于确定允许所述终端设备接入的切片中的所述第一切片;所述发送单元1020,还用于向所述策略控制网元发送所述第一切片的标识信息和指示信息,所述指示信息用于指示对所述终端设备在所述第一切片的用量状态进行监控。
在第四个实施例中,该通信装置用于实现上述方法实施例中对应移动性管理网元所执行的各个步骤,则:
接收单元1010,用于从策略控制网元接收第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用,所述可用性状态信息是当所述第一切片的用量耗尽的情况下发送的;发送单元1020,用于向允许接入所述第一切片的终端设备发送更新后的允许所述终端设备接入的切片的标识信息,所述更新后的允许所述终端设备接入的切片的标识信息不包括所述第一切片的标识信息。
作为一种可能的实现方法,确定单元1030,用于在所述接收单元从策略控制网元接收第一切片的可用性状态信息之前,确定所述移动性管理网元支持的切片中的所述第一切片;所述发送单元1020,还用于向所述策略控制网元发送所述第一切片的标识信息和指示信息,所述指示信息用于指示对所述第一切片的用量状态进行监控。
在第五个实施例中,该通信装置用于实现上述方法实施例中对应第一策略控制网元所执行的各个步骤,则:
发送单元1020,用于向用量监控网元发送订阅消息,所述订阅消息包括第一网络的标识信息和终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一网络的用量状态信息;向移动性管理网元发送所述第一网络的可用性状态信息,所述可用性状态信息用于指示所述第一网络不可用;或者,向所述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一网络的标识信息。接收单元1010,用于从所述用量监控网元接收第一指示信息,所述第一指示信息用于指示所述终端设备在所述第一网络内的用量耗尽。
作为一种可能的实现方法,所述第一网络的标识信息为第一数据网络名称DNN,所述第一DNN用于标识第一数据网络,所述订阅消息用于订阅所述终端设备在所述第一数据网络的用量状态信息,所述第一指示信息用于指示所述终端设备在所述第一数据网络内的 用量耗尽。
作为一种可能的实现方法,所述接收单元1010,用于,用于在发送单元1020向用量监控网元发送订阅消息之前,从所述移动性管理网元接收签约的DNN,所述签约的DNN包括所述第一DNN。
作为一种可能的实现方法,确定单元1030,用于确定所述签约的DNN中的所述第一DNN。
作为一种可能的实现方法,接收单元1010,用于在发送单元1020向用量监控网元发送订阅消息之前,从所述移动性管理网元接收所述第一DNN和第二指示信息,所述第二指示信息用于指示对所述终端设备在所述第一数据网络的用量状态进行监控。
作为一种可能的实现方法,接收单元1010,用于从所述用量监控网元接收第一指示信息,具体包括:用于从所述用量监控网元接收用量状态事件报告,所述用量状态事件报告包括所述第一DNN和所述第一指示信息。
作为一种可能的实现方法,所述第一网络的标识信息为第一数据网络名称DNN和第一切片的标识信息,所述第一DNN用于标识第一数据网络,所述第一切片的标识信息用于标识第一切片,所述订阅消息用于订阅所述终端设备在所述第一数据网络和所述第一切片的用量状态信息,所述第一指示信息用于指示所述终端设备在所述第一数据网络和所述第一切片内的用量耗尽。
作为一种可能的实现方法,所述接收单元1010,用于在发送单元1020向用量监控网元发送订阅消息之前,从所述移动性管理网元接收签约的DNN和允许所述终端设备接入的切片的标识信息,所述签约的DNN包括所述第一DNN,所述允许所述终端设备接入的切片包括所述第一切片。
作为一种可能的实现方法,确定单元1030,用于确定所述签约的DNN中的所述第一DNN和所述允许所述终端设备接入的切片中的所述第一切片。
作为一种可能的实现方法,接收单元1010,用于在发送单元1020向用量监控网元发送订阅消息之前,从所述移动性管理网元接收所述第一DNN、所述第一切片的标识信息和第二指示信息,所述第二指示信息用于指示对所述终端设备在所述第一数据网络和所述第一切片的用量状态进行监控。
作为一种可能的实现方法,接收单元1010,用于从所述用量监控网元接收第一指示信息,具体包括:用于从所述用量监控网元接收用量状态事件报告,所述用量状态事件报告包括所述第一DNN、所述第一切片的标识信息和所述第一指示信息。
在第六个实施例中,该通信装置用于实现上述方法实施例中对应移动性管理网元所执行的各个步骤,则:
接收单元1010,用于从策略控制网元接收第一网络的可用性状态信息,所述可用性状态信息用于指示所述第一网络不可用,所述可用性状态信息是所述终端设备在所述第一网络内的用量耗尽的情况下发送的;发送单元1020,用于向所述终端设备发送第二网络的标识,所述第二网络为允许所述终端设备接入的网络,所述第二网络的标识不包括所述第一网络的标识信息。
作为一种可能的实现方法,所述第一网络的标识信息为第一数据网络名称DNN,所述第一DNN用于标识第一数据网络;发送单元1020,用于在接收单元1010从策略控制网元 接收第一网络的可用性状态信息之前,向所述策略控制网元发送签约的DNN,所述签约的DNN包括所述第一DNN;或者,确定单元1030,用于确定签约的DNN中的所述第一DNN,以及发送单元1020,用于向所述策略控制网元发送所述第一DNN和指示信息,所述指示信息用于指示对所述终端设备在所述第一数据网络的用量状态进行监控。
作为一种可能的实现方法,所述第一网络的标识信息为第一数据网络名称DNN和第一切片的标识信息,所述第一DNN用于标识第一数据网络;发送单元1020,用于在接收单元1010从策略控制网元接收第一网络的可用性状态信息之前,向所述策略控制网元发送签约的DNN和允许所述终端设备接入的切片的标识信息,所述签约的DNN包括所述第一DNN,所述允许所述终端设备接入的切片包括所述第一切片;或者,确定单元1030,用于确定签约的DNN中的所述第一DNN,确定所述允许所述终端设备接入的切片中的所述第一切片;以及发送单元1020,用于向所述策略控制网元发送所述第一DNN、所述第一切片的标识信息和指示信息,所述指示信息用于指示对所述终端设备在所述第一数据网络和所述到第一切片的用量状态进行监控。
在第七个实施例中,该通信装置用于实现上述方法实施例中对应第一策略控制网元所执行的各个步骤,则:
接收单元1010,用于从用量监控网元接收第一指示信息,所述第一指示信息用于指示终端设备在第一切片内的用量耗尽。发送单元1020,用于向移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,向所述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息。
作为一种可能的实现方法,发送单元1020,还用于向用量监控网元发送订阅消息,所述订阅消息包括第一切片的标识信息和终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一切片的用量状态信息。
在第八个实施例中,该通信装置用于实现上述方法实施例中对应第一策略控制网元所执行的各个步骤,则:
接收单元1010,用于从用量监控网元接收第一指示信息,所述第一指示信息用于指示第一切片的用量耗尽。发送单元1020,用于向移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,向允许接入所述第一切片的终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息。
作为一种可能的实现方法,发送单元1020,还用于向用量监控网元发送订阅消息,所述订阅消息包括所述第一切片的标识信息,所述订阅消息用于订阅所述第一切片的用量状态信息。
在第九个实施例中,该通信装置用于实现上述方法实施例中对应第一策略控制网元所执行的各个步骤,则:
接收单元1010,用于从所述用量监控网元接收第一指示信息,所述第一指示信息用于指示终端设备在第一网络内的用量耗尽。发送单元1020,用于向移动性管理网元发送所述 第一网络的可用性状态信息,所述可用性状态信息用于指示所述第一网络不可用;或者,向所述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一网络的标识信息。
作为一种可能的实现方法,发送单元1020,还用于向用量监控网元发送订阅消息,所述订阅消息包括第一网络的标识信息和终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一网络的用量状态信息。
在第十个实施例中,该通信装置用于实现上述方法实施例中对应用量监控网元所执行的各个步骤,则:
接收单元1010,用于获取终端设备的标识信息和第一切片的标识信息;确定单元1030,用于确定所述终端设备在所述第一切片内的用量耗尽;发送单元1020,用于向第一策略控制网元发送第一指示信息,所述第一指示信息用于指示所述终端设备在所述第一切片内的用量耗尽。
在第十一个实施例中,该通信装置用于实现上述方法实施例中对应用量监控网元所执行的各个步骤,则:
接收单元1010,用于获取第一切片的标识信息;确定单元1030,用于确定所述第一切片内的用量耗尽;发送单元1020,用于向第一策略控制网元发送第一指示信息,所述第一指示信息用于指示所述第一切片的用量耗尽。
在第十二个实施例中,该通信装置用于实现上述方法实施例中对应用量监控网元所执行的各个步骤,则:
接收单元1010,用于获取第一网络的标识信息和终端设备的标识信息;确定单元1030,用于确定所述终端设备在所述第一网络内的用量耗尽;发送单元1020,用于向第一策略控制网元发送第一指示信息,所述第一指示信息用于指示所述终端设备在所述第一网络内的用量耗尽。
可选的,上述通信装置1000还可以包括存储单元,该存储单元用于存储数据或者指令(也可以称为代码或者程序),上述各个单元可以和存储单元交互或者耦合,以实现对应的方法或者功能。例如,处理单元可以读取存储单元中的数据或者指令,使得通信装置实现上述实施例中的方法。
应理解以上装置中单元的划分仅仅是一种逻辑功能的划分,实际实现时可以全部或部分集成到一个物理实体上,也可以物理上分开。且装置中的单元可以全部以软件通过处理元件调用的形式实现;也可以全部以硬件的形式实现;还可以部分单元以软件通过处理元件调用的形式实现,部分单元以硬件的形式实现。例如,各个单元可以为单独设立的处理元件,也可以集成在装置的某一个芯片中实现,此外,也可以以程序的形式存储于存储器中,由装置的某一个处理元件调用并执行该单元的功能。此外这些单元全部或部分可以集成在一起,也可以独立实现。这里所述的处理元件又可以成为处理器,可以是一种具有信号的处理能力的集成电路。在实现过程中,上述方法的各步骤或以上各个单元可以通过处理器元件中的硬件的集成逻辑电路实现或者以软件通过处理元件调用的形式实现。
在一个例子中,以上任一装置中的单元可以是被配置成实施以上方法的一个或多个集成电路,例如:一个或多个特定集成电路(Application Specific Integrated Circuit,ASIC),或,一个或多个微处理器(digital singnal processor,DSP),或,一个或者多个现场可编程门阵列(Field Programmable Gate Array,FPGA),或这些集成电路形式中至少两种的组合。再如,当装置中的单元可以通过处理元件调度程序的形式实现时,该处理元件可以是通用处理器,例如中央处理器(Central Processing Unit,CPU)或其它可以调用程序的处理器。再如,这些单元可以集成在一起,以片上系统(system-on-a-chip,SOC)的形式实现。
以上用于接收的单元(例如接收单元)是一种该装置的接口电路,用于从其它装置接收信号。例如,当该装置以芯片的方式实现时,该接收单元是该芯片用于从其它芯片或装置接收信号的接口电路。以上用于发送的单元(例如发送单元)是一种该装置的接口电路,用于向其它装置发送信号。例如,当该装置以芯片的方式实现时,该发送单元是该芯片用于向其它芯片或装置发送信号的接口电路。
参考图11,为本申请实施例提供的又一种通信装置示意图,用于实现以上实施例中第一策略控制网元、或移动性管理网元、或用量监控网元的操作。如图11所示,该通信装置包括:处理器1110和接口1130,可选的,该通信装置还包括存储器1120。接口1130用于实现与其他设备进行通信。
以上实施例中第一策略控制网元、或移动性管理网元、或用量监控网元执行的方法可以通过处理器1110调用存储器(可以是第一策略控制网元、或移动性管理网元、或用量监控网元中的存储器1120,也可以是外部存储器)中存储的程序来实现。即,用于第一策略控制网元、或移动性管理网元、或用量监控网元的装置可以包括处理器1110,该处理器1110通过调用存储器中的程序,以执行以上方法实施例中的第一策略控制网元、或移动性管理网元、或用量监控网元执行的方法。这里的处理器可以是一种具有信号的处理能力的集成电路,例如CPU。用于第一策略控制网元、或移动性管理网元、或用量监控网元的装置可以通过配置成实施以上方法的一个或多个集成电路来实现。例如:一个或多个ASIC,或,一个或多个微处理器DSP,或,一个或者多个FPGA等,或这些集成电路形式中至少两种的组合。或者,可以结合以上实现方式。
具体的,图10中的接收单元1010、发送单元1020和确定单元1030的功能/实现过程可以通过图11所示的通信装置1100中的处理器1110调用存储器1120中存储的计算机可执行指令来实现。或者,图10中的确定单元1030的功能/实现过程可以通过图11所示的通信装置1100中的处理器1110调用存储器1120中存储的计算机执行指令来实现,图10中的接收单元1010和发送单元1020的功能/实现过程可以通过图11中所示的通信装置1100中的接口1130来实现。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、 数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包括一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,SSD))等。
本申请实施例中所描述的各种说明性的逻辑单元和电路可以通过通用处理器,数字信号处理器,专用集成电路(ASIC),现场可编程门阵列(FPGA)或其它可编程逻辑装置,离散门或晶体管逻辑,离散硬件部件,或上述任何组合的设计来实现或操作所描述的功能。通用处理器可以为微处理器,可选地,该通用处理器也可以为任何传统的处理器、控制器、微控制器或状态机。处理器也可以通过计算装置的组合来实现,例如数字信号处理器和微处理器,多个微处理器,一个或多个微处理器联合一个数字信号处理器核,或任何其它类似的配置来实现。
本申请实施例中所描述的方法或算法的步骤可以直接嵌入硬件、处理器执行的软件单元、或者这两者的结合。软件单元可以存储于随机存取存储器(Random Access Memory,RAM)、闪存、只读存储器(Read-Only Memory,ROM)、EPROM存储器、EEPROM存储器、寄存器、硬盘、可移动磁盘、CD-ROM或本领域中其它任意形式的存储媒介中。示例性地,存储媒介可以与处理器连接,以使得处理器可以从存储媒介中读取信息,并可以向存储媒介存写信息。可选地,存储媒介还可以集成到处理器中。处理器和存储媒介可以设置于ASIC中。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
在一个或多个示例性的设计中,本申请所描述的上述功能可以在硬件、软件、固件或这三者的任意组合来实现。如果在软件中实现,这些功能可以存储与电脑可读的媒介上,或以一个或多个指令或代码形式传输于电脑可读的媒介上。电脑可读媒介包括电脑存储媒介和便于使得让电脑程序从一个地方转移到其它地方的通信媒介。存储媒介可以是任何通用或特殊电脑可以接入访问的可用媒体。例如,这样的电脑可读媒体可以包括但不限于RAM、ROM、EEPROM、CD-ROM或其它光盘存储、磁盘存储或其它磁性存储装置,或其它任何可以用于承载或存储以指令或数据结构和其它可被通用或特殊电脑、或通用或特殊处理器读取形式的程序代码的媒介。此外,任何连接都可以被适当地定义为电脑可读媒介,例如,如果软件是从一个网站站点、服务器或其它远程资源通过一个同轴电缆、光纤电脑、双绞线、数字用户线(DSL)或以例如红外、无线和微波等无线方式传输的也被包含在所定义的电脑可读媒介中。所述的碟片(disk)和磁盘(disc)包括压缩磁盘、镭射盘、光盘、数字通用光盘(英文:Digital Versatile Disc,简称:DVD)、软盘和蓝光光盘,磁盘通常以磁性复制数据,而碟片通常以激光进行光学复制数据。上述的组合也可以包含在电脑可读媒介中。
本领域技术人员应该可以意识到,在上述一个或多个示例中,本申请所描述的功能可以用硬件、软件、固件或它们的任意组合来实现。当使用软件实现时,可以将这些功能存储在计算机可读介质中或者作为计算机可读介质上的一个或多个指令或代码进行传输。计 算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。存储介质可以是通用或专用计算机能够存取的任何可用介质。
以上所述的具体实施方式,对本申请的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本申请的具体实施方式而已,并不用于限定本申请的保护范围,凡在本申请的技术方案的基础之上,所做的任何修改、等同替换、改进等,均应包括在本申请的保护范围之内。本申请说明书的上述描述可以使得本领域技术任何可以利用或实现本申请的内容,任何基于所公开内容的修改都应该被认为是本领域显而易见的,本申请所描述的基本原则可以应用到其它变形中而不偏离本申请的发明本质和范围。因此,本申请所公开的内容不仅仅局限于所描述的实施例和设计,还可以扩展到与本申请原则和所公开的新特征一致的最大范围。
尽管结合具体特征及其实施例对本申请进行了描述,显而易见的,在不脱离本申请的精神和范围的情况下,可对其进行各种修改和组合。相应地,本说明书和附图仅仅是所附权利要求所界定的本申请的示例性说明,且视为已覆盖本申请范围内的任意和所有修改、变化、组合或等同物。显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包括这些改动和变型在内。

Claims (48)

  1. 一种通信方法,其特征在于,包括:
    第一策略控制网元向用量监控网元发送订阅消息,所述订阅消息包括第一切片的标识信息和终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一切片的用量状态信息;
    所述第一策略控制网元从所述用量监控网元接收第一指示信息,所述第一指示信息用于指示所述终端设备在所述第一切片内的用量耗尽;
    所述第一策略控制网元向移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,所述第一策略控制网元向所述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息。
  2. 如权利要求1所述的方法,其特征在于,所述第一策略控制网元向用量监控网元发送订阅消息之前,还包括:
    所述第一策略控制网元从所述移动性管理网元接收允许所述终端设备接入的切片的标识信息,所述允许所述终端设备接入的切片包括所述第一切片。
  3. 如权利要求2所述的方法,其特征在于,还包括:
    所述第一策略控制网元确定所述允许所述终端设备接入的切片中的所述第一切片。
  4. 如权利要求1所述的方法,其特征在于,所述第一策略控制网元向用量监控网元发送订阅消息之前,还包括:
    所述第一策略控制网元从所述移动性管理网元接收所述第一切片的标识信息和第二指示信息,所述第二指示信息用于指示对所述终端设备在所述第一切片的用量状态进行监控。
  5. 如权利要求1-4任一所述的方法,其特征在于,所述第一策略控制网元从所述用量监控网元接收第一指示信息,包括:
    所述第一策略控制网元从所述用量监控网元接收切片用量状态事件报告,所述切片用量状态事件报告包括所述第一切片的标识信息和所述第一指示信息。
  6. 一种通信方法,其特征在于,包括:
    第一策略控制网元向用量监控网元发送订阅消息,所述订阅消息包括第一切片的标识信息,所述订阅消息用于订阅所述第一切片的用量状态信息;
    所述第一策略控制网元从所述用量监控网元接收第一指示信息,所述第一指示信息用于指示所述第一切片的用量耗尽;
    所述第一策略控制网元向移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,所述第一策略控制网元向允许接入所述第一切片的终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息。
  7. 如权利要求6所述的方法,其特征在于,所述第一策略控制网元向用量监控网元发送订阅消息之前,还包括:
    所述第一策略控制网元从所述移动性管理网元接收所述第一切片的标识信息和第二指示信息,所述第二指示信息用于指示对所述第一切片的用量状态进行监控。
  8. 如权利要求6或7所述的方法,其特征在于,所述第一策略控制网元从所述用量 监控网元接收第一指示信息,包括:
    所述第一策略控制网元从所述用量监控网元接收切片用量状态事件报告,所述切片用量状态事件报告包括所述第一切片的标识信息和所述第一指示信息。
  9. 一种通信方法,其特征在于,包括:
    移动性管理网元从策略控制网元接收第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用,所述可用性状态信息是所述终端设备在所述第一切片内的用量耗尽的情况下发送的;
    所述移动性管理网元向所述终端设备发送允许所述终端设备接入的切片的标识信息,所述允许所述终端设备接入的切片的标识信息不包括所述第一切片的标识信息。
  10. 如权利要求9所述的方法,其特征在于,所述移动性管理网元从策略控制网元接收第一切片的可用性状态信息之前,还包括:
    所述移动性管理网元向所述策略控制网元发送允许所述终端设备接入的切片的标识信息,所述允许所述终端设备接入的切片包括所述第一切片;或者,
    所述移动性管理网元确定允许所述终端设备接入的切片中的所述第一切片,以及向所述策略控制网元发送所述第一切片的标识信息和指示信息,所述指示信息用于指示对所述终端设备在所述第一切片的用量状态进行监控。
  11. 一种通信方法,其特征在于,包括:
    移动性管理网元从策略控制网元接收第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用,所述可用性状态信息是当所述第一切片的用量耗尽的情况下发送的;
    所述移动性管理网元向允许接入所述第一切片的终端设备发送更新后的允许所述终端设备接入的切片的标识信息,所述更新后的允许所述终端设备接入的切片的标识信息不包括所述第一切片的标识信息。
  12. 如权利要求11所述的方法,其特征在于,所述移动性管理网元从策略控制网元接收第一切片的可用性状态信息之前,还包括:
    所述移动性管理网元确定所述移动性管理网元支持的切片中的所述第一切片;
    所述移动性管理网元向所述策略控制网元发送所述第一切片的标识信息和指示信息,所述指示信息用于指示对所述第一切片的用量状态进行监控。
  13. 一种通信装置,其特征在于,包括:
    发送单元,用于向用量监控网元发送订阅消息,所述订阅消息包括第一切片的标识信息和终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一切片的用量状态信息;以及,向移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,向所述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息;
    接收单元,用于从所述用量监控网元接收第一指示信息,所述第一指示信息用于指示所述终端设备在所述第一切片内的用量耗尽。
  14. 如权利要求13所述的装置,其特征在于,所述接收单元,还用于在所述发送单元向用量监控网元发送订阅消息之前,从所述移动性管理网元接收允许所述终端设备接入的切片的标识信息,所述允许所述终端设备接入的切片包括所述第一切片。
  15. 如权利要求14所述的装置,其特征在于,所述装置还包括确定单元,用于确定 所述允许所述终端设备接入的切片中的所述第一切片。
  16. 如权利要求13所述的装置,其特征在于,所述接收单元,还用于在所述发送单元向用量监控网元发送订阅消息之前,从所述移动性管理网元接收所述第一切片的标识信息和第二指示信息,所述第二指示信息用于指示对所述终端设备在所述第一切片的用量状态进行监控。
  17. 如权利要求13-16任一所述的装置,其特征在于,所述接收单元,用于从所述用量监控网元接收第一指示信息,具体包括:
    用于从所述用量监控网元接收切片用量状态事件报告,所述切片用量状态事件报告包括所述第一切片的标识信息和所述第一指示信息。
  18. 如权利要求13-17任一所述的装置,其特征在于,所述用量监控网元为策略控制网元,所述策略控制网元为会话管理网元提供服务;或者,
    所述用量监控网元为统一数据库;或者,
    所述用量监控网元为网络数据分析网元。
  19. 一种通信装置,其特征在于,包括:
    发送单元,用于向用量监控网元发送订阅消息,所述订阅消息包括第一切片的标识信息,所述订阅消息用于订阅所述第一切片的用量状态信息;以及,移动性管理网元发送所述第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用;或者,所述第一策略控制网元向允许接入所述第一切片的终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一切片的标识信息;
    接收单元,用于从所述用量监控网元接收第一指示信息,所述第一指示信息用于指示所述第一切片的用量耗尽。
  20. 如权利要求19所述的装置,其特征在于,所述接收单元,还用于在所述发送单元向用量监控网元发送订阅消息之前,从所述移动性管理网元接收所述第一切片的标识信息和第二指示信息,所述第二指示信息用于指示对所述第一切片的用量状态进行监控。
  21. 如权利要求19或20所述的装置,其特征在于,所述接收单元,用于从所述用量监控网元接收第一指示信息,具体包括:
    从所述用量监控网元接收切片用量状态事件报告,所述切片用量状态事件报告包括所述第一切片的标识信息和所述第一指示信息。
  22. 如权利要求19-21任一所述的装置,其特征在于,所述用量监控网元为策略控制网元,所述策略控制网元为会话管理网元提供服务;或者,
    所述用量监控网元为统一数据库;或者,
    所述用量监控网元为网络数据分析网元。
  23. 一种通信装置,其特征在于,包括:
    接收单元,用于从策略控制网元接收第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用,所述可用性状态信息是所述终端设备在所述第一切片内的用量耗尽的情况下发送的;
    发送单元,用于向所述终端设备发送允许所述终端设备接入的切片的标识信息,所述允许所述终端设备接入的切片的标识信息不包括所述第一切片的标识信息。
  24. 如权利要求23所述的装置,其特征在于,所述发送单元,还用于在所述接收单元从策略控制网元接收第一切片的可用性状态信息之前,向所述策略控制网元发送允许所 述终端设备接入的切片的标识信息,所述允许所述终端设备接入的切片包括所述第一切片;或者,
    所述装置还包括确定单元,用于确定允许所述终端设备接入的切片中的所述第一切片;所述发送单元,还用于向所述策略控制网元发送所述第一切片的标识信息和指示信息,所述指示信息用于指示对所述终端设备在所述第一切片的用量状态进行监控。
  25. 一种通信装置,其特征在于,包括:
    接收单元,用于从策略控制网元接收第一切片的可用性状态信息,所述可用性状态信息用于指示所述第一切片不可用,所述可用性状态信息是当所述第一切片的用量耗尽的情况下发送的;
    发送单元,用于向允许接入所述第一切片的终端设备发送更新后的允许所述终端设备接入的切片的标识信息,所述更新后的允许所述终端设备接入的切片的标识信息不包括所述第一切片的标识信息。
  26. 如权利要求25所述的装置,其特征在于,所述装置还包括确定单元,用于在所述接收单元从策略控制网元接收第一切片的可用性状态信息之前,确定所述移动性管理网元支持的切片中的所述第一切片;
    所述发送单元,还用于向所述策略控制网元发送所述第一切片的标识信息和指示信息,所述指示信息用于指示对所述第一切片的用量状态进行监控。
  27. 一种通信系统,其特征在于,包括:用于执行如权利要求1-5任一所述方法的第一策略控制网元,和用于执行如权利要求9-10任一所述方法的移动性管理网元。
  28. 一种通信系统,其特征在于,包括:用于执行如权利要求6-8任一所述方法的第一策略控制网元,和用于执行如权利要求11-12任一所述方法的移动性管理网元。
  29. 一种通信方法,其特征在于,包括:
    第一策略控制网元从用量监控网元接收第一指示信息,所述第一指示信息用于指示终端设备在第一网络内的用量耗尽;
    所述第一策略控制网元向所述终端设备发送用户路由选择策略,所述用户路由选择策略不包括所述第一网络的标识信息。
  30. 如权利要求29所述的方法,其特征在于,还包括:
    所述第一策略控制网元向所述用量监控网元发送订阅消息,所述订阅消息包括所述第一网络的标识信息和所述终端设备的标识信息,所述订阅消息用于订阅所述终端设备在所述第一网络的用量状态信息。
  31. 如权利要求30所述的方法,其特征在于,所述第一网络的标识信息为第一数据网络名称DNN,所述第一DNN用于标识第一数据网络,所述订阅消息用于订阅所述终端设备在所述第一数据网络的用量状态信息,所述第一指示信息用于指示所述终端设备在所述第一数据网络内的用量耗尽。
  32. 如权利要求31所述的方法,其特征在于,所述第一策略控制网元向用量监控网元发送订阅消息之前,还包括:
    所述第一策略控制网元从所述移动性管理网元接收签约的DNN,所述签约的DNN包括所述第一DNN。
  33. 如权利要求32所述的方法,其特征在于,还包括:
    所述第一策略控制网元确定所述签约的DNN中的所述第一DNN。
  34. 如权利要求31所述的方法,其特征在于,所述第一策略控制网元向用量监控网元发送订阅消息之前,还包括:
    所述第一策略控制网元从所述移动性管理网元接收所述第一DNN和第二指示信息,所述第二指示信息用于指示对所述终端设备在所述第一数据网络的用量状态进行监控。
  35. 如权利要求31-33任一所述的方法,其特征在于,所述第一策略控制网元从所述用量监控网元接收第一指示信息,包括:
    所述第一策略控制网元从所述用量监控网元接收用量状态事件报告,所述用量状态事件报告包括所述第一DNN和所述第一指示信息。
  36. 如权利要求30所述的方法,其特征在于,所述第一网络的标识信息为第一数据网络名称DNN和第一切片的标识信息,所述第一DNN用于标识第一数据网络,所述第一切片的标识信息用于标识第一切片,所述订阅消息用于订阅所述终端设备在所述第一数据网络和所述第一切片的用量状态信息,所述第一指示信息用于指示所述终端设备在所述第一数据网络和所述第一切片内的用量耗尽。
  37. 如权利要求36所述的方法,其特征在于,所述第一策略控制网元向用量监控网元发送订阅消息之前,还包括:
    所述第一策略控制网元从所述移动性管理网元接收签约的DNN和允许所述终端设备接入的切片的标识信息,所述签约的DNN包括所述第一DNN,所述允许所述终端设备接入的切片包括所述第一切片。
  38. 如权利要求37所述的方法,其特征在于,还包括:
    所述第一策略控制网元确定所述签约的DNN中的所述第一DNN和所述允许所述终端设备接入的切片中的所述第一切片。
  39. 如权利要求36所述的方法,其特征在于,所述第一策略控制网元向用量监控网元发送订阅消息之前,还包括:
    所述第一策略控制网元从所述移动性管理网元接收所述第一DNN、所述第一切片的标识信息和第二指示信息,所述第二指示信息用于指示对所述终端设备在所述第一数据网络和所述第一切片的用量状态进行监控。
  40. 如权利要求36-39任一所述的方法,其特征在于,所述第一策略控制网元从所述用量监控网元接收第一指示信息,包括:
    所述第一策略控制网元从所述用量监控网元接收用量状态事件报告,所述用量状态事件报告包括所述第一DNN、所述第一切片的标识信息和所述第一指示信息。
  41. 一种计算机可读存储介质,其特征在于,包括计算机程序,当其在计算机上运行时,使得所述计算机执行如利要求1-12、29-40任一所述的通信方法。
  42. 一种计算机程序产品,其特征在于,所述计算机程序产品包括计算机程序,当所述计算机程序在计算机上运行时,使得计算机执行如利要求1-12、29-40任一所述的通信方法。
  43. 一种第一策略控制网元,其特征在于,包括:处理器和存储器;所述存储器用于存储计算机执行指令,当所述第一策略控制网元运行时,所述处理器执行所述存储器存储的所述计算机执行指令,以使所述第一策略控制网元执行如权利要求1-8、29-40任一项所述的通信方法。
  44. 一种移动性管理网元,其特征在于,包括:处理器和存储器;所述存储器用于存 储计算机执行指令,当所述移动性管理网元运行时,所述处理器执行所述存储器存储的所述计算机执行指令,以使所述移动性管理网元执行如权利要求9-12任一项所述的通信方法。
  45. 一种处理装置,其特征在于,包括:
    存储器,用于存储计算机程序;
    处理器,用于从所述存储器调用并运行所述计算机程序,以执行如权利要求1-12、29-40任一项所述的通信方法。
  46. 一种处理器,其特征在于,用于执行如利要求1-12、29-40任一项所述的通信方法。
  47. 一种芯片系统,其特征在于,包括:
    存储器,用于存储计算机程序;
    处理器,用于从所述存储器调用并运行所述计算机程序,使得安装有所述芯片系统的设备执行如利要求1-12、29-40任一项所述的通信方法。
  48. 一种通信装置,其特征在于,所述装置用来执行权利要求1-12、29-40任一项所述的通信方法。
PCT/CN2020/120680 2020-03-04 2020-10-13 通信方法、装置及系统 WO2021174859A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP20922817.0A EP4099632A4 (en) 2020-03-04 2020-10-13 COMMUNICATION METHOD, DEVICE AND SYSTEM
US17/902,623 US12021695B2 (en) 2020-03-04 2022-09-02 Communication method, apparatus, and system

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202010143072 2020-03-04
CN202010143072.7 2020-03-04
CN202010789827.0A CN113364604A (zh) 2020-03-04 2020-08-07 通信方法、装置及系统
CN202010789827.0 2020-08-07

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/902,623 Continuation US12021695B2 (en) 2020-03-04 2022-09-02 Communication method, apparatus, and system

Publications (1)

Publication Number Publication Date
WO2021174859A1 true WO2021174859A1 (zh) 2021-09-10

Family

ID=77524484

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/120680 WO2021174859A1 (zh) 2020-03-04 2020-10-13 通信方法、装置及系统

Country Status (4)

Country Link
US (1) US12021695B2 (zh)
EP (1) EP4099632A4 (zh)
CN (1) CN113364604A (zh)
WO (1) WO2021174859A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022036336A1 (en) * 2020-08-13 2022-02-17 Alibaba Group Holding Limited Network communication method and apparatus
WO2023050106A1 (zh) * 2021-09-28 2023-04-06 Oppo广东移动通信有限公司 终端选择方法、装置、设备以及介质
US20230132096A1 (en) * 2021-10-25 2023-04-27 Cisco Technology, Inc. Registration procedure for ensuring service based on a selection of the best available network slice of the same slice type
CN117354155A (zh) * 2022-06-27 2024-01-05 中兴通讯股份有限公司 网络管理方法及装置、网元、计算机可读介质
WO2024000518A1 (zh) * 2022-06-30 2024-01-04 北京小米移动软件有限公司 信息处理方法、装置、通信设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108307474A (zh) * 2016-09-27 2018-07-20 中国电信股份有限公司 网络切片的选择方法、系统以及切片选择功能实体
CN109842910A (zh) * 2017-11-28 2019-06-04 中国移动通信有限公司研究院 一种网络切片的处理方法及接入网网元
WO2019196796A1 (zh) * 2018-04-13 2019-10-17 华为技术有限公司 通信方法与装置
CN110622573A (zh) * 2017-06-29 2019-12-27 诺基亚通信公司 基于计费规则的网络切片选择

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7433943B1 (en) * 2001-12-20 2008-10-07 Packeteer, Inc. Volume-based network management scheme
WO2013103960A1 (en) * 2012-01-05 2013-07-11 Tekelec, Inc. Methods, systems, and computer readable media for utilizing quota usage policy control in a diameter-based communication network
EP2992645B1 (en) * 2013-04-29 2017-03-01 Telefonaktiebolaget LM Ericsson (publ) Methods and apparatuses for control of usage of one or more services for a user
CN112702180B (zh) * 2016-10-31 2022-05-17 华为技术有限公司 一种策略控制方法、装置及系统
KR20200143134A (ko) * 2019-06-14 2020-12-23 삼성전자주식회사 무선통신 시스템에서 서비스를 제공하는 방법 및 장치
US20230080830A1 (en) * 2020-02-03 2023-03-16 Telefonaktiebolaget Lm Ericsson (Publ) EXTENSION OF Npcf_EventExposure WITH USAGE MONITORING EVENT

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108307474A (zh) * 2016-09-27 2018-07-20 中国电信股份有限公司 网络切片的选择方法、系统以及切片选择功能实体
CN110622573A (zh) * 2017-06-29 2019-12-27 诺基亚通信公司 基于计费规则的网络切片选择
CN109842910A (zh) * 2017-11-28 2019-06-04 中国移动通信有限公司研究院 一种网络切片的处理方法及接入网网元
WO2019196796A1 (zh) * 2018-04-13 2019-10-17 华为技术有限公司 通信方法与装置

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
NOKIA, NOKIA SHANGHAI BELL: "[TP for SON BL CR for TS 38.423] Discussion and updates of slice load, beam load and TNL load reporting", 3GPP DRAFT; R3-196840, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG3, no. Reno (NV), USA; 20191118 - 20191122, 9 November 2019 (2019-11-09), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP051823965 *
See also references of EP4099632A4 *

Also Published As

Publication number Publication date
US12021695B2 (en) 2024-06-25
US20220417101A1 (en) 2022-12-29
EP4099632A1 (en) 2022-12-07
CN113364604A (zh) 2021-09-07
EP4099632A4 (en) 2023-07-19

Similar Documents

Publication Publication Date Title
US11019528B2 (en) Method and system for admission control with network slice capability
WO2021174859A1 (zh) 通信方法、装置及系统
US20210274436A1 (en) Resource information sending method, first network element and system
US11172405B2 (en) Method for checking change in wireless connection type of terminal in third-party application server
US20220345929A1 (en) Apparatus and method for psa-upf relocation in wireless communication system
WO2021042742A1 (zh) 一种通信方法、装置及系统
EP4138439A1 (en) Communication method, apparatus, and system
WO2021212939A1 (zh) 通信方法、装置及系统
WO2022021971A1 (zh) 通信方法、第一策略控制网元及通信系统
KR20210034531A (ko) 무선 통신 시스템에서 네트워크 슬라이스의 관리 및 접속 제어 방법 및 장치
US12028753B2 (en) Selection of edge application server
WO2018233451A1 (zh) 通信方法、装置和系统
JP2021524204A (ja) サービス品質監視方法、及びシステム、並びに装置
WO2021175210A1 (zh) 一种确定策略控制网元的方法、装置和系统
CN115915196A (zh) 一种链路状态检测方法、通信装置及通信系统
KR20220138227A (ko) 이동통신 시스템에서 트래픽 스티어링을 제공하기 위한 방법 및 장치
US11849351B2 (en) Removal of application identifier
WO2023280093A1 (zh) 执行在线签约的方法和装置
WO2021218244A1 (zh) 通信方法、装置及系统
WO2022228192A1 (zh) 一种通信方法、装置及系统
WO2022155853A1 (zh) 无线通信方法、通信装置及通信系统
WO2021159415A1 (zh) 通信方法、装置及系统
KR20230137998A (ko) Af 세션에 대한 외부 매개변수 프로비저닝을 위한 새로운 방법
WO2021138784A1 (zh) 一种接入网络的方法、装置及系统
WO2023061207A1 (zh) 一种通信方法、通信装置及通信系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20922817

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2020922817

Country of ref document: EP

Effective date: 20220830

NENP Non-entry into the national phase

Ref country code: DE