WO2021204299A1 - 一种确定策略的方法、装置及系统 - Google Patents

一种确定策略的方法、装置及系统 Download PDF

Info

Publication number
WO2021204299A1
WO2021204299A1 PCT/CN2021/086727 CN2021086727W WO2021204299A1 WO 2021204299 A1 WO2021204299 A1 WO 2021204299A1 CN 2021086727 W CN2021086727 W CN 2021086727W WO 2021204299 A1 WO2021204299 A1 WO 2021204299A1
Authority
WO
WIPO (PCT)
Prior art keywords
area
network element
strategy
traffic transmission
background traffic
Prior art date
Application number
PCT/CN2021/086727
Other languages
English (en)
French (fr)
Inventor
辛阳
吴晓波
阎亚丽
崇卫微
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP21785319.1A priority Critical patent/EP4124094A4/en
Publication of WO2021204299A1 publication Critical patent/WO2021204299A1/zh
Priority to US17/957,785 priority patent/US20230040486A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0289Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/82Miscellaneous aspects
    • H04L47/822Collecting or measuring resource availability data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/82Miscellaneous aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/82Miscellaneous aspects
    • H04L47/826Involving periods of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition

Definitions

  • the embodiments of the present application relate to the field of communication technologies, and in particular, to a method, device, and system for determining a strategy.
  • the cloud server may need to negotiate with the operator's network to transmit this type of data during network idle time. While avoiding the waste of network resources, it can reduce the transmission of such data. Incoming traffic costs. Generally, the traffic generated during the transmission of this type of data is called background data. For example, for car companies, the operator's network can be used to upload map information to the cloud server for the development of high-definition maps.
  • the third-party application function (AF) network element Before the background traffic is transmitted, the third-party application function (AF) network element will request the background traffic transmission strategy from the operator’s network, and then the policy control function (PCF) network element in the operator’s network will be
  • the demand information of the AF network element is used to formulate the background traffic transmission strategy of the area requested by the AF network element. It is convenient for the subsequent AF network element to send the background traffic transmission strategy provided by the PCF network element to the terminal, so that the terminal in the requested area performs the background traffic transmission according to the background traffic transmission strategy provided by the PCF network element.
  • the PCF network element can formulate the background traffic transmission strategy according to the area requested by the AF network element, the terminal distribution is not balanced in different parts of the area and part of the time period in the area and time period requested by the AF network element. All terminals in the area of the PCF network element formulate a background traffic transmission strategy for the requested area and time period to transmit background traffic, which may cause some areas in the area requested by the AF network element to congest network resources or some areas in a certain time period Network resources are wasted in some time periods.
  • the embodiments of the present application provide a method, a device, and a system for determining a strategy, which are used to accurately formulate respective first strategies in different areas according to their respective network performance information in different areas.
  • an embodiment of the present application provides a method for determining a policy, including: a first network element sends a first request for requesting network performance information to a data analysis network element.
  • the first request includes the information of the first area and the information of the first time period.
  • the first network element receives the first network performance information of the second area from the data analysis network element.
  • the first network performance information includes one or more items: the first information in the second area in the second time period, or the number of terminals in the second area in the second time period, the second time period being the first In the sub-time period of the time period, the second area is a sub-area of the first area, and the number of the second area is one or more.
  • the first network element determines the first strategy according to the first network performance information.
  • An embodiment of the present application provides a method for determining a strategy, in which a first network element uses a first request to request network performance information of a first area in a first time period from a data analysis network element. After that, the data analysis network element feeds back to the first network element the first network performance information of each of the one or more second areas included in the first area according to the first request, and the first network performance information is included in the second area.
  • the first information in the second area during the time period or the number of terminals in the second area during the second time period is convenient for the first network element to determine the first strategy based on the first network performance information.
  • the network element requests a large range (for example, the first area or the first time period) of network performance information from the data analysis network element.
  • what the data analysis network element provides to the first network element is a different area included in the first area (for example, one or more second areas) or a different second time period included in the first time period (for example, one or more second time periods).
  • the first network performance information of the second time period which can assist the first network element to take the sub-area as the granularity, and formulate the first strategy more accurately based on the first network performance information of the sub-area, which can ensure that the sub-area is in the sub-area.
  • the background traffic transmission strategy formulated in the time period meets the needs of the sub-area in the sub-time period, solves the problem of network resource congestion or waste of network resources in some areas in some time periods, saves resources, and improves transmission efficiency.
  • the first information includes one or more of the following information about the network in the second area during the second time period: the success rate of session creation, the success rate of terminal handover, and the success rate of terminal registration. Ratio, resource utilization rate of base station or core network element, percentage of base station or core network element usage, load of base station or core network element.
  • the first information may also be load information, which is used to describe the load of the network in the second area in the second time period.
  • the first strategy is the first strategy of the third area
  • the third area includes one or more second areas
  • the number of the third area is one or more
  • the first strategy of the third area includes one or more background traffic transmission strategies.
  • the third area when the third area includes a second area, the third area is the second area.
  • the multiple second areas included in the third area have the same first network performance information.
  • the method provided in the embodiment of the present application further includes: the first network element determines a first target background traffic transmission strategy of the third area, and the first target background traffic transmission strategy is one or more backgrounds One of the traffic transmission strategies.
  • the first network element sends the first target background traffic transmission strategy and one or more of the following information to the network storage network element: the identification of the first target background traffic transmission strategy or the information of the third area.
  • the first target background traffic transmission strategy and one or more of the following information: the identification of the first target background traffic transmission strategy and the information of the third area are stored in the network storage network element, which can be used in the subsequent first target background traffic transmission strategy.
  • the first network element After the network performance of the three areas changes, the first network element only needs to extract the first target background traffic transmission strategy of the third area from the network storage network element, without taking out all the background data transfer (BDT) strategies. The subsequent interaction pressure between the network storage network element and the first network element is reduced.
  • BDT background data transfer
  • the first network element determines the first target background traffic transmission strategy in the third area, including: A network element determines a background traffic transmission strategy as the first target background traffic transmission strategy.
  • the method provided in this embodiment of the present application further includes: the first network element receives the first target background traffic from the requesting device Transmission strategy.
  • the method provided in the embodiment of the present application further includes: the first network element receives second network performance information of the network in the second area from the data analysis network element, where the second network performance information is the first 2.
  • the updated network performance information of the area The first network element determines a second strategy for the third area according to the second network performance information, and the second strategy for the third area includes one or more background traffic transmission strategies.
  • the second network performance is the updated network performance information of the second area relative to the first network performance, where the updated network performance information includes upgraded network performance information or downgraded network performance information. Performance information.
  • the method provided in the embodiment of the present application further includes: the first network element sends the second policy of the third area and time information to the requesting device; or, the first network element sends the first network element to the requesting device.
  • the first network element sets time information, where the time information is used to indicate the maximum response time of the requesting device to the second strategy in the third area.
  • time information (such as a timer or time window) is set to ensure that the time period for policy negotiation between the first network element and the requesting device is increased.
  • the reliability of the program It is understandable that the setting time information of the first network element can be understood as: the first network element sets a timer or a time window, and the time length of the timer is equal to the time length indicated by the time information.
  • the method provided in the embodiment of the present application further includes: within the maximum response time, the first network element receives the second target background traffic transmission strategy fed back by the requesting device, and the second target background traffic transmission strategy It is one of the multiple background traffic transmission strategies included in the second strategy.
  • the first network element sends the second target background traffic transmission strategy and one or more of the following information to the network storage network element: the identification of the first target background traffic transmission strategy or the information of the third area.
  • the network storage network element after the network storage network element receives the second target background traffic transmission strategy, it can update the first target background traffic transmission strategy to the second target background according to the identifier of the first target background traffic transmission strategy or the information of the third region. Traffic transmission strategy.
  • the method provided in the embodiment of the present application further includes: the first network element determines to delete the first target background traffic transmission strategy of the third area.
  • the first network element sends a first deletion message to the network storage network element, where the first deletion message is used to notify the network storage network element to delete the first target background traffic transmission policy of the third area.
  • the first network element determines to delete the first target background traffic transmission strategy of the third area, including: within the maximum response time, the first network element does not receive from the requesting device from the requesting device to the second
  • the strategy includes a second target background traffic transmission strategy selected from a plurality of background traffic transmission strategies, and the first network element determines to delete the first target background traffic transmission strategy in the third area.
  • the second target background traffic transmission strategy selected by the requesting device from the second strategy in the third area is not received, and then the network storage network element is notified to delete the third area The first target background traffic transmission strategy.
  • the first network element in the third area when the strategy of the first network element in the third area is changed from the first strategy to the second strategy, the first network element directly connects the network without negotiating with the requesting device.
  • the first target traffic transmission strategy of the third area in the storage network element is deleted.
  • the solution provided in the embodiment of the present application is much more flexible to avoid that the user cannot obtain the first target background traffic transmission strategy during the renegotiation process.
  • the first network element determining to delete the first target background traffic transmission strategy of the third area includes: the first network element receives first indication information of the requesting device, and the first indication information is used for It means that the requesting device has not selected the target background traffic transmission strategy from the multiple background traffic transmission strategies included in the second strategy.
  • the first network element determines, according to the first instruction information, a first target background traffic transmission strategy for deleting the third area.
  • the first indication information is received by the first network element within the maximum response time.
  • the first network element determining to delete the first target background traffic transmission strategy of the third area includes: after the first network element sends the second strategy of the third area to the requesting device, if the first network element sends the second strategy of the third area to the requesting device, if the first When the network element determines that the requesting device does not select the target background traffic transmission strategy from the second strategy in the third area, the first network element determines to delete the first target background traffic transmission strategy in the third area.
  • the first network element determines that the requesting device does not select the target background traffic transmission strategy from the second strategy in the third area, including: the first network element determines that the request device does not select the target background from the second strategy in the third area Based on the feedback of the traffic transmission strategy, the first network element determines that the requesting device has not selected the target background traffic transmission strategy from the second strategy in the third area. Alternatively, the first network element determines, according to the first indication information, that the requesting device does not select the target background traffic transmission strategy from the second strategy in the third area.
  • the method provided in the embodiment of the present application further includes: the first network element determines that the background traffic transmission strategy corresponding to the first area is to be acquired.
  • the first network element determining to obtain the background traffic transmission policy corresponding to the first area includes: the first network element receives a request for the background traffic transmission policy corresponding to the first area from the requesting device The second request, the second request includes the information of the first area and the information of the first time period. According to the second request, the first network element determines to obtain the background traffic transmission strategy corresponding to the first area.
  • the second request may also include one or more of the following information in the first area: the number of terminals, the size of data transmitted by each terminal, the identification of the requesting device, and the group identification of the terminal .
  • the method provided in the embodiment of the present application further includes: the first network element sends the first policy and one or more of the following information to the requesting device: the information of the third area or the information of the first policy Logo.
  • the method provided in the embodiment of the present application further includes: if the first network element determines that the first policy of the third area is unavailable according to the second network performance information, it cannot be based on the second network performance information. If the second strategy of the third area is determined, the first network element will not delete the first strategy of the third area stored in the network storage network element. In other words, the first network element needs to retain the first strategy stored in the network storage network element. The first strategy for the three regions. In this way, when the first network element cannot determine the second strategy in the third area, the first strategy in the third area is still available.
  • an embodiment of the present application provides a method for determining a policy.
  • the method includes: a data analysis network element receives a first request for network performance information from a first network element, the first request including a first area The information and the information of the first time period.
  • the data analysis network element sends the first network performance information of each second area in one or more second areas to the first network element, and the first network performance information of any second area includes one or more items: The first information in any of the second areas in the second time period, or the number of terminals in the second area in the second time period, the second time period is a sub-time period of the first time period, and the second area is A sub-area of the first area.
  • the first information includes one or more of the following information about the network in the second area during the second time period: the success rate of session creation, the success rate of terminal handover, and the success rate of terminal registration. Ratio, resource utilization rate of base station or core network element, percentage of base station or core network element usage, load of base station or core network element.
  • the first information may also be load information, which is used to describe the load of the network in the second area in the second time period.
  • the data analysis network element sends second network performance information of the second area to the first network element, where the second network performance information is updated network performance information of the second area.
  • the second network performance is the updated network performance information of the second area relative to the first network performance, where the updated network performance information includes upgraded network performance information or downgraded network performance information. Performance information.
  • an embodiment of the present application provides a method for determining a strategy.
  • the method includes: requesting a device to receive a first strategy from a third area of a first network element, and one or more of the following information: third area The information or the identification of the first strategy.
  • the requesting device determines the first target background traffic transmission strategy of the third area according to the first strategy of the third area.
  • the requesting device transmits the background traffic according to the first target background traffic transmission strategy of the third area, the number of the third area is one or more, the third area includes one or more second areas, and the second area is the first area Sub-area.
  • the first strategy in the third area includes one or more background traffic transmission strategies.
  • the third area when the third area includes a second area, the third area is the second area.
  • the multiple second areas have the same first network performance information.
  • requesting the device to determine the first target background traffic transmission strategy in the third area includes: requesting the device to determine the background traffic transmission The strategy is the first target background traffic transmission strategy in the third area.
  • the requesting device to determine the first target background traffic transmission strategy in the third area includes: The background traffic transmission strategy selected in the traffic transmission strategy is determined to be the first target background traffic transmission strategy in the third area.
  • the method provided in the embodiment of the present application may further include: the requesting device sends a response message to the first network element, and the response message is used to reflect multiple background traffic transmission strategies of the requesting device from the third area.
  • the method provided in the embodiment of the present application may further include: requesting the device to send a second request for requesting a background traffic transmission strategy corresponding to the first area to the first network element, where the second request includes Information of the first area and information of the first time period.
  • the second request may also include one or more of the following information in the first area: the number of terminals, the size of data transmitted by each terminal, the identification of the requesting device, and the group identification of the terminal .
  • the method provided in the embodiment of the present application may further include: requesting the device to receive the second policy and time information from the third area of the first network element.
  • the time information is used to indicate the maximum response time of the second policy of the requesting device for the third area.
  • the requesting device feeds back to the first network element the second target background traffic transmission strategy selected by the requesting device from the second strategy in the third area.
  • the second strategy includes one or more transmission strategies.
  • the method provided in this embodiment of the present application may further include: the requesting device sends first indication information to the first network element, where the first indication information is used to indicate that the requesting device does not include the information from the second policy. Select the target background traffic transmission strategy among multiple background traffic transmission strategies.
  • the requesting device in the embodiment of the present application sends the first indication information to the first network element within the maximum response time.
  • the requesting device is an application function network element.
  • an embodiment of the present application provides an apparatus for determining a strategy.
  • the apparatus for determining a strategy can implement a method for determining a strategy described in the first aspect or any one of the possible implementations of the first aspect.
  • the beneficial effects of the first aspect or any possible implementation manner of the first aspect can be achieved.
  • the device for determining the strategy may be the first network element, or may be a device that can support the first network element to implement the first aspect or any one of the possible implementation manners of the first aspect. For example, it is applied to the chip in the first network element.
  • the device for determining the strategy can implement the above method through software, hardware, or through hardware executing corresponding software.
  • an embodiment of the present application provides an apparatus for determining a policy, including: a communication unit, configured to send a first request for requesting network performance information to a data analysis network element.
  • the first request includes the information of the first area and the information of the first time period.
  • the communication unit is configured to receive the first network performance information of the second area from the data analysis network element.
  • the first network performance information includes one or more items: the first information in the second area in the second time period, or the number of terminals in the second area in the second time period, the second time period being the first In the sub-time period of the time period, the second area is a sub-area of the first area, and the number of the second area is one or more.
  • the processing unit is configured to determine the first strategy according to the first network performance information.
  • the first information includes one or more of the following information about the network in the second area during the second time period: the success rate of session creation, the success rate of terminal handover, and the success rate of terminal registration. Ratio, resource utilization rate of base station or core network element, percentage of base station or core network element usage, load of base station or core network element.
  • the first information may also be load information, which is used to describe the load of the network in the second area in the second time period.
  • the first strategy is the first strategy of the third area
  • the third area includes one or more second areas
  • the number of the third areas is one or more
  • the third area has the first strategy.
  • a strategy includes one or more background traffic transmission strategies.
  • the third area when the third area includes a second area, the third area is the second area.
  • networks in the multiple second areas have the same first network performance information.
  • the processing unit is further configured to determine a first target background traffic transmission strategy in the third area, where the first target background traffic transmission strategy is one of one or more background traffic transmission strategies.
  • the communication unit is further configured to send the first target background traffic transmission strategy and one or more of the following information to the network storage network element: the identification of the first target background traffic transmission strategy or the information of the third area.
  • the first target background traffic transmission strategy may be determined by the device for determining the strategy from the first strategy of the third area, or may be determined by the requesting device from the first strategy of the third area.
  • the processing unit is configured to determine a background traffic transmission strategy as the first target background traffic transmission strategy.
  • the processing unit is further configured to use the communication unit to receive the first target background traffic transmission strategy from the requesting device.
  • the communication unit is configured to receive second network performance information of the network in the second area of the data analysis network element, where the second network performance information is updated network performance information of the second area.
  • the processing unit is configured to determine a second strategy in the third area according to the second network performance information, where the second strategy in the third area includes one or more background traffic transmission strategies.
  • the second network performance is the updated network performance information of the second area relative to the first network performance, where the updated network performance information includes upgraded network performance information or downgraded network performance information. Performance information.
  • the communication unit is further configured to send the second policy of the third area and time information to the requesting device; or, when the first network element sends the second policy of the third area to the requesting device, The first network element sets time information, where the time information is used to indicate the maximum response time of the second policy of the requesting device to the third area.
  • time information (such as a timer or time window) is set to ensure that the time period for policy negotiation between the first network element and the requesting device is increased. The reliability of the program.
  • the processing unit is further configured to use the communication unit to receive the second target background traffic transmission strategy fed back by the requesting device from the requesting device within the maximum response time, and the second target background traffic transmission strategy is the first One of the multiple background traffic transmission strategies included in the second strategy.
  • the communication unit is further configured to send the second target background traffic transmission strategy and one or more of the following information to the network storage network element: the identification of the first target background traffic transmission strategy or the information of the third area.
  • the processing unit is further configured to determine the first target background traffic transmission strategy for deleting the third area; the communication unit is further configured to send a first deletion message to the network storage network element, and the first deletion message Used to notify the network storage network element to delete the first target background traffic transmission strategy in the third area.
  • the processing unit is configured to determine that within the maximum response time, the communication unit has not received from the requesting device the second target background selected by the requesting device from the multiple background traffic transmission strategies included in the second strategy Traffic transmission strategy, the first network element determines to delete the first target background traffic transmission strategy of the third area.
  • the communication unit is further configured to receive first indication information from the requesting device, where the first indication information is used to indicate that the requesting device does not select from a plurality of background traffic transmission strategies included in the second strategy Target background traffic transmission strategy; a processing unit, configured to determine the first target background traffic transmission strategy for deleting the third area according to the first instruction information.
  • the first indication information is received by the communication unit within the maximum response time.
  • the processing unit configured to determine the first target background traffic transmission strategy for deleting the third area, includes: after the communication unit sends the second strategy for the third area to the requesting device, if the processing unit determines The requesting device does not select the target background traffic transmission strategy from the second strategy in the third area, and the processing unit is configured to determine to delete the first target background traffic transmission strategy in the third area.
  • the processing unit determining that the requesting device does not select the target background traffic transmission strategy from the second strategy in the third area includes: the processing unit determines that the requesting device does not select the target background traffic transmission strategy from the second strategy in the third area Feedback, the processing unit determines that the requesting device has not selected the target background traffic transmission strategy from the second strategy in the third area.
  • the processing unit determines according to the first indication information that the requesting device does not select the target background traffic transmission strategy from the second strategy in the third area.
  • the processing unit is further configured to determine that the background traffic transmission strategy corresponding to the first area needs to be acquired.
  • the communication unit is further configured to receive a second request from the requesting device for requesting a background traffic transmission strategy corresponding to the first area, where the second request includes the information of the first area and the first area. Time period information.
  • the processing unit is configured to determine, according to the second request, that the background traffic transmission strategy corresponding to the first area needs to be acquired.
  • the second request may also include one or more of the following information in the first area: the number of terminals, the size of data transmitted by each terminal, the identification of the requesting device, and the group identification of the terminal .
  • the communication unit is further configured to send the first policy and one or more of the following information to the requesting device: information of the third area and an identifier of the first policy.
  • the processing unit determines that the first strategy in the third area is unavailable according to the second network performance information, but cannot determine the second strategy in the third area according to the second network performance information, the processing unit The first strategy of the third area stored in the network storage network element will not be deleted. In other words, the processing unit needs to retain the first strategy of the third area stored in the network storage network element. In this way, when the processing unit cannot determine the second strategy in the third area, the first strategy in the third area is still available.
  • an embodiment of the present application provides a device for determining a policy.
  • the device for determining a policy may be a first network element or a chip in the first network element.
  • the device for determining the strategy may include: a processing unit and a communication unit.
  • the processing unit may be a processor.
  • the communication unit may be an interface circuit.
  • the device for determining the strategy may further include a storage unit.
  • the storage unit may be a memory.
  • the storage unit is used to store computer program code, and the computer program code includes instructions.
  • the processing unit executes the instructions stored in the storage unit, so that the device for determining a strategy implements the first aspect or the method described in any one of the possible implementation manners of the first aspect.
  • the processing unit may be a processor, and the communication unit may be collectively referred to as a communication interface.
  • the communication interface can be an input/output interface, a pin or a circuit, and so on.
  • the processing unit executes the computer program code stored in the storage unit to enable the first network element to implement the method described in the first aspect or any one of the possible implementations of the first aspect.
  • the storage unit may be in the chip
  • the storage unit (for example, a register, a cache, etc.) may also be a storage unit (for example, a read-only memory, a random access memory, etc.) located outside the chip in the first network element.
  • the processor, the communication interface and the memory are coupled with each other.
  • an embodiment of the present application provides an apparatus for determining a strategy.
  • the apparatus for determining a strategy can implement a method for determining a strategy described in the second aspect or any one of the possible implementations of the second aspect.
  • the beneficial effects of the second aspect or any possible implementation manner of the second aspect can be achieved.
  • the device for determining the strategy may be a data analysis network element, or a device that can support the data analysis network element to implement the second aspect or any one of the possible implementation manners of the second aspect. For example, it is applied to the chip in the data analysis network element.
  • the device for determining the strategy can implement the above method through software, hardware, or through hardware executing corresponding software.
  • an embodiment of the present application provides an apparatus for determining a policy.
  • the apparatus includes: a communication unit configured to receive a first request from a first network element for requesting network performance information, where the first request includes a first The information of the area and the information of the first time period.
  • the processing unit is configured to determine the first network performance information of each second area in the one or more second areas.
  • the communication unit is further configured to send first network performance information of each second area in one or more second areas to the first network element, where the first network performance information of any second area includes one or more items :
  • the area is a sub-area of the first area.
  • the first information includes one or more of the following information of the network in the second time period: the success rate of session creation, the success rate of terminal handover, the success rate of terminal registration, the base station, or The resource utilization rate of the core network network element, the proportion of the use of the base station or the core network element, and the load of the base station or the core network element.
  • the first information may also be load information, which is used to describe the load of the network in the second area in the second time period.
  • the communication unit is further configured to send second network performance information of the second area to the first network element, where the second network performance information is updated network performance information of the second area.
  • the second network performance is the updated network performance information of the second area relative to the first network performance, where the updated network performance information includes upgraded network performance information or downgraded network performance information. Performance information.
  • an embodiment of the present application provides a device for determining a strategy.
  • the device for determining a strategy may be a data analysis network element or a chip in the data analysis network element.
  • the device for determining the strategy may include: a processing unit and a communication unit.
  • the processing unit may be a processor.
  • the communication unit may be an interface circuit.
  • the device for determining the strategy may further include a storage unit.
  • the storage unit may be a memory.
  • the storage unit is used to store computer program code, and the computer program code includes instructions.
  • the processing unit executes the instructions stored in the storage unit, so that the device for determining a strategy implements the second aspect or the method described in any one of the possible implementation manners of the second aspect.
  • the processing unit may be a processor, and the communication unit may be collectively referred to as a communication interface.
  • the communication interface can be an input/output interface, a pin or a circuit, and so on.
  • the processing unit executes the computer program code stored in the storage unit to enable the data analysis network element to implement the method described in the second aspect or any one of the possible implementations of the second aspect.
  • the storage unit may be in the chip
  • the storage unit (for example, a register, a cache, etc.) may also be a storage unit (for example, a read-only memory, a random access memory, etc.) located outside the chip in the data analysis network element.
  • the processor, the communication interface and the memory are coupled with each other.
  • an embodiment of the present application provides an apparatus for determining a strategy.
  • the apparatus for determining a strategy can implement a method for determining a strategy described in the third aspect or any one of the possible implementations of the third aspect.
  • the beneficial effects of the third aspect or any possible implementation manner of the third aspect can be achieved.
  • the device for determining the strategy may be a requesting device, or a device that can support the requesting device to implement the third aspect or any one of the possible implementation manners of the third aspect. For example, it is applied to the chip in the requesting device.
  • the device for determining the strategy can implement the above method through software, hardware, or through hardware executing corresponding software.
  • an embodiment of the present application provides an apparatus for determining a strategy.
  • the apparatus includes: a communication unit configured to receive a first strategy from a third area of a first network element, and one or more of the following information: The information of the third area or the identification of the first strategy.
  • the processing unit is configured to determine the first target background traffic transmission strategy of the third area according to the first strategy of the third area.
  • the processing unit is configured to transmit background traffic according to the first target background traffic transmission strategy of the third area, the number of the third area is one or more, the third area includes one or more second areas, and the second area is the first A sub-region of a region.
  • the first strategy in the third area includes one or more background traffic transmission strategies.
  • the third area when the third area includes a second area, the third area is the second area.
  • the multiple second areas have the same first network performance information.
  • the processing unit is configured to determine that the one background traffic transmission strategy is the first target background traffic transmission strategy in the third area.
  • the processing unit is configured to determine the background traffic transmission strategy selected from the multiple background traffic transmission strategies as the third The first target background traffic transmission strategy of the area.
  • the communication unit is further configured to send a response message to the first network element, where the response message is used to reflect the first target background selected by the requesting device from the multiple background traffic transmission strategies in the third area Traffic transmission strategy.
  • the communication unit is further configured to send a second request for requesting a background traffic transmission strategy corresponding to the first area to the first network element, where the second request includes the information of the first area and the first area. Information for a period of time.
  • the second request may also include one or more of the following information in the first area: the number of terminals, the size of data transmitted by each terminal, the identification of the requesting device, and the group identification of the terminal .
  • the communication unit is further configured to receive the second strategy of the third area from the first network element and time information; or, the first network element sends the second strategy of the third area to the requesting device.
  • the first network element sets time information, where the time information is used to indicate the maximum response time of the requesting device to the second strategy of the third area.
  • the communication unit is further configured to feed back to the first network element the second target background traffic transmission strategy selected by the requesting device from the second strategy in the third area.
  • the communication unit is further configured to send first indication information to the first network element, where the first indication information is used to indicate that the requesting device has not selected multiple background traffic transmission policies included in the second policy. Select the target background traffic transmission strategy.
  • the communication unit is further configured to send the first indication information to the first network element within the maximum response time.
  • the device for determining the strategy is an application function network element.
  • an embodiment of the present application provides an apparatus for determining a policy.
  • the apparatus for determining a policy may be a requesting device or a chip in the requesting device.
  • the device for determining the strategy may include: a processing unit and a communication unit.
  • the processing unit may be a processor.
  • the communication unit may be an interface circuit.
  • the device for determining a strategy may further include a storage unit.
  • the storage unit may be a memory.
  • the storage unit is used to store computer program code, and the computer program code includes instructions.
  • the processing unit executes the instructions stored in the storage unit, so that the device for determining a strategy implements the third aspect or the method described in any one of the possible implementation manners of the third aspect.
  • the processing unit may be a processor, and the communication unit may be collectively referred to as a communication interface.
  • the communication interface may be an input/output interface, pin or circuit, and so on.
  • the processing unit executes the computer program code stored in the storage unit to enable the requesting device to implement the method described in the third aspect or any one of the possible implementations of the third aspect.
  • the storage unit may be a storage unit in the chip (For example, register, cache, etc.), it may also be a storage unit (for example, read-only memory, random access memory, etc.) located outside the chip in the requesting device.
  • the processor, the communication interface and the memory are coupled with each other.
  • the embodiments of the present application provide a computer-readable storage medium, and the computer-readable storage medium stores a computer program or instruction.
  • the computer program or instruction runs on a computer, the computer can execute the operations as described in the first aspect to the first aspect.
  • the method of determining the strategy described in any one of the possible implementations can be any one of the possible implementations.
  • an embodiment of the present application provides a computer-readable storage medium, and a computer program or instruction is stored in the computer-readable storage medium.
  • the embodiments of the present application provide a computer-readable storage medium.
  • the computer-readable storage medium stores a computer program or instruction.
  • the computer program or instruction When the computer program or instruction is run on a computer, the computer executes operations such as the third aspect to the first aspect.
  • the embodiments of the present application provide a computer program product including instructions.
  • the instructions When the instructions are executed on a computer, the computer executes the determination strategy described in the first aspect or various possible implementations of the first aspect. Methods.
  • this application provides a computer program product that includes instructions.
  • the instructions run on a computer, the computer executes the second aspect or a certain strategy described in the various possible implementations of the second aspect. method.
  • this application provides a computer program product that includes instructions.
  • the instructions run on a computer, the computer executes a certain strategy described in the third aspect or various possible implementations of the third aspect. method.
  • an embodiment of the present application provides a communication system, which includes any one or more of the following: the fourth aspect and the device for determining the strategy described in various possible implementations, the fifth aspect and the fifth aspect The device for determining the strategy described in the various possible implementations of the five aspects.
  • system may further include: the device for determining the strategy described in the sixth aspect and various possible implementation manners of the sixth aspect.
  • an embodiment of the present application provides a communication device.
  • the communication device includes a processor and a storage medium.
  • the storage medium stores instructions. When the instructions are executed by the processor, the Possible implementations describe the method of determining the strategy.
  • an embodiment of the present application provides a communication device.
  • the communication device includes a processor and a storage medium.
  • the storage medium stores instructions. Possible implementations describe the method of determining the strategy.
  • an embodiment of the present application provides a communication device that includes a processor and a storage medium.
  • the storage medium stores instructions.
  • the instructions When executed by the processor, they can implement various aspects such as the third aspect or the third aspect. Possible implementations describe the method of determining the strategy.
  • an embodiment of the present application provides a communication device that includes one or more modules for implementing the methods of the first, second, third, and twenty-fourth aspects described above,
  • the one or more modules may correspond to each step in the method of the first aspect, the second aspect, the third aspect, and the twenty-fourth aspect.
  • an embodiment of the present application provides a chip that includes a processor and a communication interface, and the communication interface is coupled to the processor.
  • the processor is used to run a computer program or instruction to implement the first aspect or each of the first aspect. A method of determining the strategy described in the possible implementations.
  • the communication interface is used to communicate with other modules outside the chip.
  • an embodiment of the present application provides a chip that includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a computer program or instruction to implement the second aspect or each of the second aspect. A method of determining the strategy described in the possible implementations.
  • the communication interface is used to communicate with other modules outside the chip.
  • an embodiment of the present application provides a chip that includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a computer program or instruction to implement the third aspect or each of the third aspect. A method of determining the strategy described in the possible implementations.
  • the communication interface is used to communicate with other modules outside the chip.
  • the chip provided in the embodiment of the present application further includes a memory for storing computer programs or instructions.
  • an embodiment of the present application provides a communication device that includes at least one processor, and the at least one processor is configured to run a computer program or instruction stored in a memory to implement the first aspect or the first aspect A method of determining the strategy described in the various possible implementations.
  • an embodiment of the present application provides a communication device that includes at least one processor, and the at least one processor is configured to run a computer program or instruction stored in a memory to implement the second aspect or the second aspect A method of determining the strategy described in the various possible implementations.
  • an embodiment of the present application provides a communication device that includes at least one processor, and the at least one processor is configured to run a computer program or instruction stored in a memory to implement the third aspect or the third aspect A method of determining the strategy described in the various possible implementations.
  • an embodiment of the present application provides a method for determining a policy.
  • the method includes: a first network element sends a first request for requesting network performance information to a data analysis network element.
  • the first request includes information of the first area.
  • the first network element receives first network performance information of the second area from the data analysis network element, where the first network performance information includes one or more of the first information or the number of terminals.
  • the second area is a sub-area of the first area, and the number of the second area is one or more.
  • the first network element determines the first strategy for the third area according to the first network performance information.
  • the third area includes one or more second areas, the number of third areas is multiple, and the third area is the first area. Sub-area.
  • the first network element sends the first policy corresponding to each of the multiple third areas to the requesting device.
  • the first strategy corresponding to the third area includes one or more background traffic transmission strategies.
  • the multiple second areas included in the third area have the same first network performance information.
  • the third area when the third area includes a second area, the third area is the second area.
  • the method provided in the embodiment of the present application further includes: the first network element determines the first target background traffic transmission strategy of any third region among the plurality of third regions, and the transmission strategy of any third region is The first target background traffic transmission strategy is one of one or more background traffic transmission strategies in any third area.
  • the first network element sends the first target background traffic transmission strategy of any third area and one or more of the following information to the network storage network element: the identification of the first target background traffic transmission strategy or the information of any third area .
  • the first network element determines the first target background traffic transmission strategy of any third area among the plurality of third areas, including: the first strategy of any third area includes a background traffic Transmission strategy.
  • the first network element determines a background traffic transmission strategy as the first target background traffic transmission strategy of any third area.
  • the first strategy of any third area includes multiple background traffic transmission strategies, and the first network element receives the first target background traffic transmission strategy of any third area from the requesting device.
  • the method provided in the embodiment of the present application further includes: the first network element receives second network performance information of the second area from the data analysis network element, and the second network performance information is updated after the second area Network performance information.
  • the first network element determines a second strategy for the third area according to the second network performance information, and the second strategy for the third area includes one or more background traffic transmission strategies.
  • the method provided in the embodiment of the present application further includes: the first network element sends a second policy of the third area and time information to the requesting device. Or, when the first network element sends the second policy of the third area to the requesting device, the first network element sets the time information. Wherein, the time information is used to indicate the maximum response time of the second strategy of the requesting device for the third area.
  • the method provided in the embodiment of the present application further includes: within the maximum response time, the first network element receives the second target background traffic transmission strategy fed back by the requesting device, and the second target background traffic transmission strategy It is one of the multiple background traffic transmission strategies included in the second strategy.
  • the first network element sends the second target background traffic transmission strategy and one or more of the following information to the network storage network element: the identification of the first target background traffic transmission strategy or the information of the third area.
  • the method provided in the embodiment of the present application further includes: the first network element determines to delete the first target background traffic transmission strategy of the third area.
  • the first network element sends a first deletion message to the network storage network element, where the first deletion message is used to notify the network storage network element to delete the first target background traffic transmission policy of the third area.
  • the first network element determines to delete the first target background traffic transmission strategy of the third area, including: within the maximum response time, the first network element does not receive from the requesting device from the requesting device to the second
  • the strategy includes a second target background traffic transmission strategy selected from a plurality of background traffic transmission strategies, and the first network element determines to delete the first target background traffic transmission strategy in the third area.
  • the second target background traffic transmission strategy selected by the requesting device from the second strategy in the third area is not received, and then the network storage network element is notified to delete the third area The first target background traffic transmission strategy.
  • the first network element in the third area when the strategy of the first network element in the third area is changed from the first strategy to the second strategy, the first network element directly connects the network without negotiating with the requesting device.
  • the first target traffic transmission strategy of the third area in the storage network element is deleted.
  • the solution provided in the embodiment of the present application is much more flexible to avoid that the user cannot obtain the first target background traffic transmission strategy during the renegotiation process.
  • the first network element determining to delete the first target background traffic transmission strategy of the third area includes: the first network element receives first indication information of the requesting device, and the first indication information is used for It means that the requesting device has not selected the target background traffic transmission strategy from the multiple background traffic transmission strategies included in the second strategy.
  • the first network element determines, according to the first instruction information, a first target background traffic transmission strategy for deleting the third area.
  • the first indication information is received by the first network element within the maximum response time.
  • the first network element determining to delete the first target background traffic transmission strategy of the third area includes: after the first network element sends the second strategy of the third area to the requesting device, if the first network element sends the second strategy of the third area to the requesting device, if the first When the network element determines that the requesting device does not select the target background traffic transmission strategy from the second strategy in the third area, the first network element determines to delete the first target background traffic transmission strategy in the third area.
  • the first network element determines that the requesting device does not select the target background traffic transmission strategy from the second strategy in the third area, including: the first network element determines that the request device does not select the target background from the second strategy in the third area Based on the feedback of the traffic transmission strategy, the first network element determines that the requesting device has not selected the target background traffic transmission strategy from the second strategy in the third area. Alternatively, the first network element determines, according to the first indication information, that the requesting device does not select the target background traffic transmission strategy from the second strategy in the third area.
  • the method provided by the embodiment of the present application may further include: the first network element receives the request from the data analysis network element.
  • a second request of the device for requesting a background traffic transmission strategy corresponding to the first area where the second request includes the information of the first area and the information of the first time period.
  • the first network element determines to obtain the background traffic transmission strategy corresponding to the first area.
  • the first network performance information includes one or more of: the first information in the second area in the second time period, or the number of terminals in the second area in the second time period.
  • the second request may also include one or more of the following information in the first area: the number of terminals, the size of data transmitted by each terminal, the identification of the requesting device, and the group identification of the terminal .
  • the method provided in the embodiment of the present application further includes: if the first network element determines that the first policy of the third area is unavailable according to the second network performance information, but it cannot be based on the second network performance If the information determines the second strategy in the third area, the first network element will not delete the first strategy in the third area stored in the network storage network element. In other words, the first network element needs to retain the storage in the network storage network element The first strategy of the third area. In this way, when the first network element cannot determine the second strategy in the third area, the first strategy in the third area is still available.
  • an embodiment of the present application provides an apparatus for determining a strategy.
  • the apparatus for determining a strategy can implement a determination described in the twenty-fourth aspect or any one of the possible implementation manners of the twenty-fourth aspect. Therefore, it can also achieve the beneficial effects of the twenty-fourth aspect or any one of the possible implementation manners of the twenty-fourth aspect.
  • the device for determining the strategy may be the first network element, or may be a device that can support the first network element to implement the second aspect or any one of the possible implementation manners of the second aspect. For example, it is applied to the chip in the first network element.
  • the device for determining the strategy can implement the above method by software, hardware, or by hardware executing corresponding software.
  • an embodiment of the present application provides an apparatus for determining a strategy, the apparatus including: a communication unit configured to send a first request for requesting network performance information to a data analysis network element.
  • the first request includes information of the first area.
  • the communication unit is further configured to receive first network performance information of the second area from the data analysis network element, where the first network performance information includes: one or more of the first information or the number of terminals.
  • the second area is a sub-area of the first area, and the number of the second area is one or more.
  • the processing unit is further configured to determine the first strategy of the third area according to the first network performance information, the third area includes one or more second areas, the number of the third areas is multiple, and the third area is the first The sub-areas of the area.
  • the first network element sends the first policy corresponding to each of the multiple third areas to the requesting device.
  • the first strategy corresponding to the third area includes one or more background traffic transmission strategies.
  • the multiple second areas included in the third area have the same first network performance information.
  • the third area when the third area includes a second area, the third area is the second area.
  • the processing unit is further configured to determine the first target background traffic transmission strategy of any third region in the plurality of third regions, and the first target background traffic transmission strategy of any third region is One of one or more background traffic transmission strategies in any third area.
  • the communication unit is further configured to send the first target background traffic transmission strategy of any third area and one or more of the following information to the network storage network element: the identification of the first target background traffic transmission strategy or any third area Information.
  • the first strategy of any third area includes a background traffic transmission strategy, and the processing unit is further configured to determine that a background traffic transmission strategy is the first target background of any third area Traffic transmission strategy.
  • the first strategy of any third area includes multiple background traffic transmission strategies, and the processing unit is further configured to receive the first target background traffic transmission strategy of any third area from the requesting device through the communication unit.
  • the communication unit is further configured to receive second network performance information of the second area from the data analysis network element, where the second network performance information is updated network performance information of the second area.
  • the processing unit is further configured to determine a second strategy in the third area according to the second network performance information, where the second strategy in the third area includes one or more background traffic transmission strategies.
  • the communication unit is further configured to send the second strategy of the third area and time information to the requesting device.
  • the processing unit is further configured to set time information.
  • the time information is used to indicate the maximum response time of the second strategy of the requesting device for the third area.
  • the processing unit is further configured to send the second target background traffic to the network storage network element in the case of receiving the second target background traffic transmission strategy fed back by the requesting device Transmission strategy and one or more of the following information: the identification of the first target background traffic transmission strategy or the information of the third area, the second target background traffic transmission strategy is one of the multiple background traffic transmission strategies included in the second strategy .
  • the processing unit is further configured to determine the first target background traffic transmission strategy for deleting the third area; the communication unit is further configured to send a first deletion message to the network storage network element, and the first deletion message Used to notify the network storage network element to delete the first target background traffic transmission strategy in the third area.
  • the processing unit is configured to determine that within the maximum response time, the communication unit has not received from the requesting device the second target background selected by the requesting device from the multiple background traffic transmission strategies included in the second strategy Traffic transmission strategy, the first network element determines to delete the first target background traffic transmission strategy of the third area.
  • the communication unit is further configured to receive first indication information from the requesting device, where the first indication information is used to indicate that the requesting device does not select from a plurality of background traffic transmission strategies included in the second strategy Target background traffic transmission strategy; a processing unit, configured to determine the first target background traffic transmission strategy for deleting the third area according to the first instruction information.
  • the first indication information is received by the communication unit within the maximum response time.
  • the processing unit configured to determine the first target background traffic transmission strategy for deleting the third area, includes: after the communication unit sends the second strategy for the third area to the requesting device, if the processing unit determines The requesting device does not select the target background traffic transmission strategy from the second strategy in the third area, and the processing unit is configured to determine to delete the first target background traffic transmission strategy in the third area.
  • the processing unit determining that the requesting device does not select the target background traffic transmission strategy from the second strategy in the third area includes: the processing unit determines that the requesting device does not select the target background traffic transmission strategy from the second strategy in the third area Feedback, the processing unit determines that the requesting device has not selected the target background traffic transmission strategy from the second strategy in the third area.
  • the processing unit determines according to the first indication information that the requesting device does not select the target background traffic transmission strategy from the second strategy in the third area.
  • the communication unit is further configured to receive a request from the requesting device corresponding to the first area before the first network element sends a first request for requesting network performance information to the data analysis network element
  • the second request of the background traffic transmission strategy includes the information of the first area and the information of the first time period.
  • the processing unit is further configured to determine, according to the second request, the background traffic transmission strategy corresponding to the first area to be acquired.
  • the first network performance information includes one or more of: the first information in the second area in the second time period, or the number of terminals in the second area in the second time period.
  • the second request may also include one or more of the following information in the first area: the number of terminals, the size of data transmitted by each terminal, the identification of the requesting device, and the group identification of the terminal .
  • the processing unit determines that the first strategy in the third area is unavailable according to the second network performance information, but cannot determine the second strategy in the third area according to the second network performance information, the processing unit The first strategy of the third area stored in the network storage network element will not be deleted. In other words, the processing unit needs to retain the first strategy of the third area stored in the network storage network element. In this way, when the processing unit cannot determine the second strategy in the third area, the first strategy in the third area is still available.
  • an embodiment of the present application provides a device for determining a policy.
  • the device for determining a policy may be a first network element or a chip in the first network element.
  • the device for determining the strategy may include: a processing unit and a communication unit.
  • the processing unit may be a processor.
  • the communication unit may be an interface circuit.
  • the device for determining the strategy may further include a storage unit.
  • the storage unit may be a memory. The storage unit is used to store computer program code, and the computer program code includes instructions.
  • the processing unit executes the instructions stored in the storage unit, so that the device for determining a strategy implements the twenty-fourth aspect or the method described in any one of the possible implementation manners of the twenty-fourth aspect.
  • the processing unit may be a processor, and the communication unit may be collectively referred to as a communication interface.
  • the communication interface can be an input/output interface, a pin or a circuit, and so on.
  • the processing unit executes the computer program code stored in the storage unit, so that the first network element implements the method described in the twenty-fourth aspect or any one of the possible implementations of the twenty-fourth aspect, and the storage unit may be
  • the storage unit (for example, register, cache, etc.) in the chip may also be a storage unit (for example, read-only memory, random access memory, etc.) located outside the chip in the first network element.
  • the processor, the communication interface and the memory are coupled with each other.
  • an embodiment of the present application provides a communication device, which includes a processor and a storage medium, and the storage medium stores instructions. The method of determining the strategy described in the various possible implementations of the four aspects.
  • an embodiment of the present application provides a chip that includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a computer program or instruction to implement the twenty-fourth aspect or the second aspect.
  • the communication interface is used to communicate with other modules outside the chip.
  • the embodiments of the present application provide a computer program product including instructions.
  • the instructions When the instructions are executed on a computer, the computer executes the twenty-fourth aspect or various possible implementation manners of the twenty-fourth aspect Describes a method of determining strategy.
  • an embodiment of the present application provides a computer-readable storage medium.
  • the computer-readable storage medium stores a computer program or instruction.
  • the computer program or instruction runs on a computer, the computer can execute The method for determining a strategy described in any one of the possible implementation manners from the fourth aspect to the twenty-fourth aspect.
  • an embodiment of the present application provides a communication device that includes at least one processor, and the at least one processor is configured to run a computer program or instruction stored in a memory to implement the twenty-fourth aspect or the second aspect.
  • any of the above-provided devices or computer storage media or computer program products or chips or communication systems are used to execute the corresponding methods provided above. Therefore, the beneficial effects that can be achieved can refer to the corresponding ones provided above The beneficial effects of the corresponding solutions in the method will not be repeated here.
  • FIG. 1 is an architecture diagram of a communication system provided by an embodiment of this application.
  • FIG. 2 is a system architecture diagram of a 5G network provided by an embodiment of this application.
  • FIG. 3 is a system architecture diagram of another 5G network provided by an embodiment of this application.
  • FIG. 4 is a schematic diagram of terminal distribution according to an embodiment of the application.
  • FIG. 5 is a schematic flow diagram of a method for determining a strategy provided by an embodiment of this application.
  • FIG. 6 is a schematic diagram of a process for determining network performance information by a data analysis network element according to an embodiment of this application;
  • FIG. 7 is a flow diagram of another method for determining a strategy provided by an embodiment of the application.
  • FIG. 8 is a schematic diagram of a specific embodiment for determining a background traffic transmission strategy provided by an embodiment of this application.
  • FIG. 9 is a schematic diagram of another specific embodiment for determining a background traffic transmission strategy provided by an embodiment of the application.
  • FIG. 10 is a schematic flow diagram of another method for determining a policy provided by an embodiment of the application.
  • FIG. 11 is a schematic structural diagram of a device for determining a strategy according to an embodiment of the application.
  • FIG. 12 is a schematic structural diagram of another device for determining a strategy according to an embodiment of the application.
  • FIG. 13 is a schematic structural diagram of a communication device provided by an embodiment of this application.
  • FIG. 14 is a schematic structural diagram of a chip provided by an embodiment of the application.
  • words such as “first” and “second” are used to distinguish the same items or similar items that have substantially the same function and effect.
  • the first request and the second request are only for distinguishing different requests, and the order of them is not limited.
  • words such as “first” and “second” do not limit the quantity and order of execution, and words such as “first” and “second” do not limit the difference.
  • At least one refers to one or more, and “multiple” refers to two or more.
  • “And/or” describes the association relationship of the associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, and B exists alone, where A, B can be singular or plural.
  • the character “/” generally indicates that the associated objects before and after are in an “or” relationship.
  • the following at least one item (a)” or similar expressions refers to any combination of these items, including any combination of a single item (a) or a plurality of items (a).
  • at least one of a, b, or c can mean: a, b, c, ab, ac, bc, or abc, where a, b, and c can be single or multiple .
  • Foreground traffic is terminal interactive traffic, such as the traffic generated by payment services or instant messaging software (for example, WeChat) during operation.
  • Foreground traffic transmission requires high real-time performance, if not Timely interaction will affect the user experience.
  • the foreground traffic is the traffic generated by the terminal's foreground business, that is, the traffic generated by the business that the terminal can see through the screen or is in use.
  • Background Data which can also be referred to as background data.
  • massive amounts of data will be generated on the terminal side, and these data need to be uploaded to the cloud server.
  • the data that needs to be uploaded to the cloud server does not require timeliness, but is very sensitive to tariffs.
  • a car company uploads map information to a cloud server, and the map information is used by the cloud server to develop a high-definition map.
  • Background Traffic transmission has no service level agreement (SLA) requirements, so the idle resources of the network can be used for transmission, and operators can appropriately reduce tariffs to achieve a win-win situation for third parties and operators.
  • SLA service level agreement
  • FIG. 1 shows an architecture diagram of a communication system provided by an embodiment of the present application.
  • the system includes: a policy control network element 10 and a data analysis network element 20 communicating with the policy control network element 10.
  • the communication system may further include: a network storage network element 30 and a service network element 40.
  • the service network element 40 may use the interface with the policy control network element 10 to request the background traffic transmission policy from the policy control network element 10.
  • the service network element 40 may send a request for requesting a background traffic transmission strategy to the policy control network element 10 through an intermediate network element (for example, a network capability opening function network element).
  • the policy control network element 10 is configured to request the data analysis network element 20 for the network performance information of the first area in the first time period.
  • the data analysis network element 20 may provide the policy control network element 10 with first network performance information in the second time period of each of the one or more second areas included in the first area, so as to facilitate the policy control network element 10 According to the first network performance information of each second area in the second time period, the first strategy is formulated to feed back to the service network element 40.
  • the network storage network element 30 is used to store the target background traffic transmission strategy of a certain sub-area.
  • the data analysis network element 20 in the embodiment of the present application may be a separately deployed network element.
  • the data analysis network element 20 may also be co-located with other network elements (for example, the policy control network element 10), or the policy control network element 10 has the function of executing the actions performed by the data analysis network element 20 in the embodiment of the present application.
  • the data analysis network element 20 is co-located with the second network element, and the data analysis network element 20 can interact with the policy control network element 10.
  • the policy control network element 10 and the second network element are not the same network element, for example,
  • the second network element may be a control plane network element (for example, an SMF network element) or a UPF network element in the 5G network architecture.
  • the communication system shown in FIG. 2 may be applied to the current 5G network architecture and other network architectures that will appear in the future, which is not specifically limited in the embodiment of the present application.
  • the communication system shown in FIG. 1 is applied to the 5G network architecture as an example.
  • the communication system shown in FIG. 1 is applied to the 5G network architecture shown in FIG. 2 as an example.
  • the network element or entity corresponding to the above-mentioned policy control network element 10 may be as follows In the structure shown in FIG. 2, the policy control function (PCF) network element, or the session management function (SMF) network element, or the network management network element in the 5GC.
  • the network management network element may be an operation, administration, and maintenance (OAM) network element (may also be referred to as an operation management and maintenance network element).
  • the network element or entity corresponding to the service network element 40 may be an application function (AF) network element in the 5GC in the structure shown in FIG. 2.
  • the AF network element can be an operator AF, such as a proxy-call session control function (P-CSCF), or a third-party AF, such as a third-party server that needs to transmit background traffic.
  • P-CSCF proxy-call session control function
  • third-party AF such as a third-party server that needs to transmit background traffic.
  • car company server or Tencent server or WeChat server Such as car company server or Tencent server or WeChat server.
  • the data analysis network element 20 can be a network data analysis function (NWDAF) network element in 5GC, or it can be a management data analysis function (management data analysis) of a network management system. function, MDAF) network element, or even a data analysis network element on the RAN side.
  • NWDAAF network data analysis function
  • MDAF management data analysis function
  • the network storage network element 30 may be a user data management network element or a user data storage network element.
  • the network storage network element 30 may be a unified database (unified data repository, UDR) or unified data management (unified data management, UDM).
  • the 5G network architecture may also include: terminals, access equipment (for example, access network (AN) or radio access network (RAN)), user plane Function (userplane function, UPF) network element, data network (data network, DN), access and mobility management function (access and mobility management function, AMF) network element, authentication server function (authentication server function, AUSF) network Network elements, session management function (SMF) network elements, network capability exposure function (NEF) network elements, etc., which are not specifically limited in the embodiment of the present application.
  • access equipment for example, access network (AN) or radio access network (RAN)
  • user plane Function userplane function, UPF
  • data network data network
  • data network data network
  • AMF access and mobility management function
  • authentication server function authentication server function
  • AUSF authentication server function
  • NEF network capability exposure function
  • the terminal communicates with the AMF network element through a next generation network (next generation, N1) interface (N1 for short).
  • the access device communicates with the AMF network element through the N2 interface (N2 for short).
  • the access device communicates with the UPF network element through the N3 interface (N3 for short).
  • the UPF network element communicates with the DN through the N6 interface (N6 for short).
  • the UPF network element communicates with the SMF network element through the N4 interface (N4 for short).
  • the AMF network element communicates with the SMF network element through the N11 interface (N11 for short).
  • the AMF network element communicates with the UDM network element through the N8 interface (N8 for short).
  • the SMF network element communicates with the PCF network element through the N7 interface (N7 for short).
  • the SMF network element communicates with the UDM network element through the N10 interface (N10 for short).
  • the AMF network element communicates with the AUSF network element through the N12 interface (N12 for short).
  • the UDM network element communicates with the UDR network element.
  • the PCF network element communicates with the UDR network element.
  • Fig. 3 shows an architecture based on a service interface in a 5G network architecture.
  • the difference between this architecture and Fig. 2 is that the control plane network elements in the 5GC in Fig. 3 can also interact with a service interface.
  • AMF network elements, AUSF network elements, SMF network elements, UDM network elements, UDR network elements, NEF network elements, or PCF network elements interact with each other using service-oriented interfaces.
  • the service-oriented interface provided by the AMF network element to the outside may be Namf.
  • the service-oriented interface provided by the SMF network element to the outside may be Nsmf.
  • the service-oriented interface provided by the UDM network element to the outside may be Nudm.
  • the service-oriented interface provided by the UDR network element to the outside may be Nudr.
  • the service-oriented interface provided by the PCF network element to the outside may be Npcf.
  • the service-oriented interface provided by the NEF network element to the outside may be Nnef.
  • the service-oriented interface provided by the NRF network element to the outside may be Nnrf.
  • the service-oriented interface provided by the NWDAF network element to the outside may be Nnwdaf.
  • FIG. 2 and FIG. 3 are only examples of a PCF network element.
  • the 5G network architecture may include multiple PCF network elements, such as PCF network element 1 and PCF network element 2, which is not specifically limited in the embodiment of the present application.
  • the connection mode between the various network elements can refer to the 5G network architecture shown in FIG. 2 or FIG. 3, which will not be repeated here.
  • the AMF network element is mainly responsible for the mobility management in the mobile network, such as user location update, user registration network, user handover, etc.
  • the SMF network element is mainly responsible for session management in the mobile network, such as session establishment, modification, and release. Specific functions include assigning IP addresses to users and selecting UPF network elements that provide message forwarding functions.
  • PCF network elements are used to formulate background traffic transmission strategies.
  • UDM network elements or UDR network elements are used to store user data, such as background traffic transmission strategies.
  • the UPF network element is mainly responsible for processing user messages, such as forwarding and charging.
  • DN refers to an operator's network that provides data transmission services for terminals, such as IP multi-media service (IMS), Internet, and so on.
  • IMS IP multi-media service
  • the data analysis network element is a network element device that can perform big data analysis, and can be, but is not limited to, a network data analysis function network element, etc., for example, the network data analysis function network element may be NWDAF.
  • the data analysis network element can analyze the network performance information of each sub-region in one or more sub-regions to assist the PCF network element to specify the background traffic transmission strategy according to the network performance information of each sub-region.
  • the service network element can be an application network element.
  • the specific application network element can be, but not limited to, the operator’s AF network element, terminal, and third-party equipment, such as non-operator AF network elements (also called third-party AF network element) and so on.
  • the AF network element of the operator may be, but is not limited to, the service management and control server of the operator;
  • the AF network element of the third party may be, but is not limited to, the service server of the third party.
  • Background traffic is usually defined as non-real-time interactive traffic, which can be specifically divided into uplink background traffic and downlink background traffic.
  • the downstream background traffic may be the traffic transmitted by video caching, file downloads, software update packages, software notification messages, etc.
  • the upstream background traffic may be the traffic transmitted by the vehicle storing driving map information and so on.
  • FIG. 4 is a schematic diagram of a terminal distribution scenario provided by an embodiment of the application.
  • the service network element can request the PCF network element for the background traffic transmission strategy of the TA list (for example, the TA list includes TA1, TA2, and TA3 as shown in Figure 4), and then the PCF network element can obtain it from the NWDAF network element according to Based on the network performance information of the TA list, formulate the background traffic transmission strategy of the TA list.
  • the AF network element requests from the PCF network element that there are 10,000 terminals that need to transmit background traffic between 00:00 and 05:00.
  • the PCF network element obtains the network performance information of the TA list, it is determined to be 00 according to the network performance information of the TA list: From 00 to 05:00, the background traffic of 10,000 terminals can be transmitted.
  • some areas in the TA list may be congested.
  • TA1 has a capacity of 1000 terminals transmitting background traffic from 00:00 to 01:00, but the actual number of terminals transmitting background traffic needs to be 1500.
  • TA2 has a capacity of 3000 terminals that transmit background traffic from 03:00 to 05:00, but the actual number of terminals that transmit background traffic needs to be 3,500.
  • TA3 has a capacity of 6000 terminals that transmit background traffic from 02:00 to 03:00, but the actual number of terminals that transmit background traffic needs to be 5000. This will cause the terminals in TA1 and TA2 to be congested when transmitting the background traffic, while the resources allocated to TA3 by the network for transmitting the background traffic are left. This is because the PCF network element determines the background traffic transmission strategy according to the TA list as the granularity, and the PCF network element is not sure about the demand situation of each TA.
  • the network recommends that the number of terminals transmitted in a TA is 6000, which means that the resources allocated by the network for the TA can ensure that 6000 terminals can reliably transmit background traffic.
  • the embodiments of the present application provide a method for determining a strategy, in which a PCF network element (corresponding to the first network element described below) according to the sub-areas (for example, the second area) and/or included in the first area
  • the strategy meets the needs of the sub-area in the sub-time period, avoids the problem of network resource congestion or waste of network resources in some areas in a certain period of time, saves resources, and improves transmission efficiency.
  • B corresponding to A can be understood as: A and B are associated.
  • the execution subject of a method for determining a strategy in an embodiment of the present application may be the first network element, or may be a chip applied to the first network element.
  • the execution subject of a method for determining a strategy may be a data analysis network element or a chip applied to the data analysis network element.
  • the execution subject of the method for determining the strategy is the data analysis network element and the first network element as an example for description.
  • a schematic diagram of the interaction of a method for determining a strategy provided by an embodiment of this application includes the following step:
  • Step 501 The first network element sends a first request to the data analysis network element.
  • the data analysis network element receives the first request from the first network element.
  • the first request is used to request network performance information.
  • the first request includes the information of the first area and the information of the first time period.
  • the information of the first area is used to determine the first area.
  • the first area may be tracking area TA, tracking area list (TA list), routing area (routing area, RA), RA list, cell, cell list, global positioning system (GPS (global positioning system)
  • GPS global positioning system
  • the GPS list includes one or more physical areas.
  • the TA list includes one or more TAs
  • the Cell list includes one or more cells.
  • the information of the first time period is used to determine the first time period (for example, 00:00-05:00).
  • the first time period may be at least one of a time window (time window), a timestamp (timestamp), and a time period (time interval).
  • the first request in the embodiment of the present application is specifically used to request the data analysis network element for the network performance information of the first area in the first time period.
  • the first network element may be a network element (core network element (for example, PCF network element or SMF network element) or network management network element (network slice management function) used to determine a strategy for transmitting background traffic. function, NSMF)), or the first network element may be a network element that requests a background traffic transmission strategy (for example, an AF network element), or the first network element may be a network element that uses a background traffic transmission strategy for background traffic transmission.
  • core network element for example, PCF network element or SMF network element
  • network management network element network slice management function used to determine a strategy for transmitting background traffic. function, NSMF
  • NSMF network slice management function
  • the first request may also include second indication information, where the second indication information is used to indicate a request for network performance information.
  • Step 502 The data analysis network element determines the first network performance information of the second area according to the first request.
  • the first area includes one or more second areas.
  • the second area is the first area.
  • the data analysis network element determines the first network performance information of each second area in the multiple second areas.
  • the first network performance information of the second area includes one or more of the first information in the second area in the second time period, or the number of terminals in the second area in the second time period.
  • the second time period is a sub-time period of the first time period
  • the second area is a sub-area of the first area
  • the number of the second area is one or more.
  • the foregoing one or more second areas may be divided by the first network element, or the foregoing one or more second areas may be divided by the data analysis network element, which is not limited in the embodiment of the present application.
  • the data analysis network element or the first network element can be divided according to the TA granularity or the cell granularity in the TA List; or the data analysis network element can aggregate different TAs or cells in the TA List according to whether the network performance is similar or the same through data analysis.
  • Category or category the area corresponding to each category is regarded as one of the sub-areas of the first area.
  • the area obtained by the aggregation of one or more second areas in the embodiment of the present application may be the entire area or part of the area of the first area, which is not limited in the embodiment of the present application.
  • the data analysis network element may divide the sub-areas according to the granularity of TA included in the TA list.
  • the data analysis network element can divide area A into area 1, area 2 and area 3, so that the data analysis network element can determine the area 1.
  • the first network performance information in the time period T1 to T3 the first network performance information in the area 2 in the time period T2 to T5, and the first network performance information in the area 3 in the time period T7 to T8.
  • the data analysis network element may divide area B into one area, that is to say, the second area is also area B. In this way, the data analysis network element can determine the first network performance information of the second area in the time period T11 to T14 and the first network performance information of the second area in the time period T16 to T20.
  • the first time period in the embodiment of the present application includes one or more second time periods. Even if the network performance of the same second area in different time periods is different, the first network performance of the same second area
  • the information includes network performance information of the same second area in each second time period in one or more second time periods.
  • the first network performance information of area 1 may include the network performance information of area 1 in the time period T1 to T3 and the network performance information of area 1 in the time period T5 to T6.
  • the second time periods corresponding to different second regions may be the same or different.
  • the data analysis network element can determine the first network performance information of area 1 in the time period T1 to T3, and the first network performance information of area 2 in the time period of T1 to T3.
  • the data analysis network element can determine the first network performance information of area 1 in the time period T1 to T4, and the first network performance information of area 2 in the time period of T5 to T6.
  • the second time period corresponding to the different second areas may be a continuous time period or a discontinuous time period, which is not limited in the embodiment of the present application.
  • the first information in the second area in the second time period is used to indicate the network or network element (such as core network element (such as UPF network element, AMF network element) in the second area in the second time period). Or SMF network element) or access network element (such as gNB or RAN) is in an idle state.
  • the first information in the second area in the second time period includes the load of the network in the second area in the second time period, or the load of the network element in the second area in the second time period.
  • the load of the network in the second area in the second time period is used to indicate whether the network in the second area in the second time period is in an idle state.
  • the load of the network in the second area in the second time period indicates that the network in the second area is in an idle state in the second time period, it means that the network in the second area in the second time period has idle resources. If the load of the network in the second area in the second time period indicates that the network in the second area in the second time period is in a non-idle state, it means that the network in the second area in the second time period does not have idle resources.
  • the first information may also be load information, which is used to describe the load of the network in the second area in the second time period.
  • load information which is used to describe the load of the network in the second area in the second time period.
  • the number of terminals in the second area in the second time period is used to reflect the number of terminals accessing or visiting the second area in the second time period. It is worth noting that the number of terminals can be the true value of a certain time point (timestamp) (it can be subjected to special processing, such as normalization processing) or within a certain time period (time window or time interval or time period) For the average value or the variance value, any number of terminals involved in the embodiment of the present application can be referred to the understanding here, and will not be repeated in the following.
  • the load of the network in the second area in the second time period may be the congestion level of the network in the second area in the second time period, and the load level of the network in the second area in the second time period.
  • at least one of the network performance in the second area in the second time period may be made to the steps in FIG. 6, which will not be repeated here.
  • Step 503 The data analysis network element sends the first network performance information of the second area to the first network element.
  • the first network element receives the first network performance information of the second area from the data analysis network element.
  • the data analysis network element sends to the first network element one or more pieces of first network performance information and a second area corresponding to each of the one or more pieces of first network performance information.
  • the first network element receives one or more pieces of first network performance information from the data analysis network element, and information about the second area corresponding to each of the one or more pieces of first network performance information.
  • the first information in the embodiment of the present application includes one or more of the following information about the network in the second area during the second time period: the success rate of session creation, the success rate of terminal handover The ratio, the ratio of successful terminal registration, the resource usage rate of the base station or the core network element, the proportion of the base station or the core network element, the load of the base station or the core network element.
  • the load of the yuan can be the true value of a certain time point (timestamp) (it can be subjected to special processing, such as normalization processing) or the average value or variance within a certain time period (time window or time interval or time period)
  • time point time point
  • time window or time interval or time period time window or time interval or time period
  • the session creation success rate in the embodiment of the present application can be obtained from the total number of sessions created by the network in the second area during the second time period and the number of successfully created sessions, for example, the number of successfully created sessions divided by the network in the second time period
  • the total number of sessions created in the second area gives the success rate of session creation.
  • the ratio of successful terminal handovers may be determined by the number of terminals handed over in the second area and the number of terminals handed over successfully in the second time period. For example, dividing the number of terminals successfully handed over by the number of terminals handed over obtains the ratio of successful terminal handovers.
  • the resource usage rate of a base station or a core network element can be determined by: the total number of resources of the base station or core network element in the second area during the second time period and the total number of resources of the base station or core network element in the second area during the second time period
  • the number of resources used within is determined. For example, the number of resources used by base stations or core network elements in the second area in the second time period is divided by the total number of resources that the base stations or core network elements in the second area have in the second time period to obtain the base station or core network element.
  • the rate of successful terminal registration may be determined by the total number of terminals registered in the second area in the second time period and the number of successfully registered terminals in the second area. For example, the number of terminals successfully registered in the second area in the second time period divided by the total number of terminals registered in the second area in the second time period is the ratio of successful terminal registration.
  • Step 504 The first network element determines a first strategy according to the first network performance information.
  • the first strategy in the embodiment of the present application is a strategy used when the terminal transmits background data (BD) in the uplink, or the first strategy is a strategy used when the service server transmits background data (BD) in the downlink to the terminal.
  • the background traffic in the embodiments of the present application may also be referred to as background data.
  • SIM Subscriber Identity Module
  • the device can save the vehicle's driving map information, vehicle operating status and other information, and then transmit it to the vehicle control center to help the vehicle control center make high-definition maps and track the engine operating status in real time. This information is used for the next step of analysis, such as autonomous driving. Plan the route of the vehicle, improve the engine, etc.
  • whether it is an uplink background traffic or a downlink background traffic refers to the traffic generated during the transmission of service data that does not require (or is not sensitive) to transmission timeliness.
  • the background traffic refers to traffic generated during the transmission of service data that does not require transmission timeliness but has high (or sensitive) tariff requirements.
  • the network slicing used for background traffic transmission does not have SLA requirements, that is, as long as the network allows the transmission of background traffic, there is no transmission quality (such as transmission delay, transmission bandwidth) requirements, so the background traffic can be transmitted when the network is idle.
  • the first strategy in the embodiment of the present application is the first strategy of the third area.
  • the third area includes one or more second areas.
  • the number of the third area is one or more.
  • the first strategy in the third area includes one or more background traffic transmission strategies.
  • the background traffic transmission strategy in the embodiment of the present application includes one or more of the following information: recommended time window, fee rate, and maximum aggregate bit rate.
  • the recommended time window refers to the time window recommended by the network to transmit background traffic in the third area.
  • the rate refers to the rate determined by the network to transmit background traffic within the recommended time window, such as the cost per megabyte (MB) of traffic.
  • the maximum aggregate bit rate indicates the maximum bandwidth when background traffic is transmitted during the recommended time window.
  • the terminal in the embodiment of the present application can transmit background traffic when the network is in an idle state. Therefore, the first network element determines the first strategy according to the first network performance information, including: the first network element It is determined according to the first network performance information that the network in the second area is in an idle state during the second time period, and the first network element determines that the recommended time window included in the first policy is the second time period.
  • the first network element determines, according to the first network performance information of the second area, that the number of background traffic that can be transmitted in the second area in time period 1 is 4000, and the second area can accommodate 5500 background traffic in time period 2, then the first network element determines that the recommended time window included in the first strategy is time period 2.
  • the first network element determines from the first network performance information of area 1 that the network of area 1 is idle during the time period of 00:00-01:00, that is, the network of area 1 is 00:00-01:00 There are free resources available to transmit background traffic in the period of time.
  • the first network element can use the time period of 00:00-01:00 as the background traffic transmission strategy of area 1.
  • the first network element determines through the first network performance information of area 2 that the network of area 2 is idle during the time period of 01:00-03:00, that is, the network of area 2 is in the time period of 01:00-03:00 There are free resources that can be used to transmit background traffic.
  • the first network element can use the time period of 01:00-03:00 as the background traffic transmission strategy of area 2.
  • multiple background traffic transmission strategies included in the same area are different.
  • the recommended time window included in background traffic transmission strategy 1 is time window 1
  • the recommended time window included in background traffic transmission strategy 2 Is time window 2.
  • the first network performance information of the second area includes the network performance information of the second area in time period 1 and the network performance information of the second area in time period 2, then the first network element may be in time period 1 according to the second area.
  • the network performance information determines the background traffic transmission strategy 1 in the second area.
  • the first network element determines the background traffic transmission strategy 2 in the second area according to the network performance information of the second area in the time period 2, so that the first network element can determine
  • the first strategy in the third area includes background traffic transmission strategy 1 and background traffic transmission strategy 2.
  • the third area in the embodiment of the present application including a second area can be understood as: the third area and the second area are the same area, in other words, the second area is the third area.
  • the first network element determines the first network performance information of the second area in the second time period as the first network performance information of the third area. Then, the first network element determines the first strategy of the third area according to the first network performance information of the third area in the second time period.
  • the third area includes multiple second areas, and the first network performance information of the multiple second areas in the second time period is the same.
  • the third area including multiple second areas can be understood as: the third area is formed by the aggregation of multiple second areas.
  • the first network performance information of the third area in the second time period may be the common first network performance information of the multiple areas in the second time period.
  • the first area includes multiple second areas, and the second time period is time period 2 as an example.
  • the multiple second areas are TA1, TA2, and TA3, where the first network performance of TA1 in time period 2
  • the information is the same as the first network performance information of TA2 in time period 2
  • the first network performance information of TA3 in time period 2 is different from the first network performance information of TA1 in time period 2
  • TA1 and TA2 can be aggregated to obtain the third Area (for example, TA12), at this time, the first network element can determine the first network performance information of TA1 in time period 2 or the first network performance information of TA2 in time period 2 as the first network performance information of TA12.
  • the first network element determines the first strategy of TA12 according to the first network performance information of TA12. After that, the terminals in TA1 and TA2 can transmit background traffic according to the first strategy of TA12. In addition, the first network element may use TA3 as the third area, and determine the first strategy of TA3 according to the first network performance information of TA3 in time period 2.
  • the first area includes multiple second areas.
  • the multiple second areas are TA1, TA2, and TA3.
  • the first network performance information of TA1, TA2, and TA3 is different, but the first network performance information of TA1 is different. Is the lowest or highest first network performance information of TA1, TA2, and TA3, then the first network element can use the first network performance information of TA1 as the first network performance information of TA2 and TA3, at this time, TA1 ⁇ TA3 Then have the same network performance information.
  • An embodiment of the present application provides a method for determining a strategy, in which a first network element uses a first request to request network performance information of a first area in a first time period from a data analysis network element. After that, the data analysis network element feeds back to the first network element the first network performance information of each of the one or more second areas included in the first area according to the first request, and the first network performance information is included in the second area.
  • the first information in the second area during the time period or the number of terminals in the second area during the second time period is convenient for the first network element to determine the first strategy according to the first network performance information of the sub-area.
  • the first network element requests the data analysis network element for network performance information in a large range (for example, the first area or the first time period).
  • what the data analysis network element provides to the first network element is a different area included in the first area (for example, one or more second areas) or a different second time period included in the first time period (for example, one or more second time periods).
  • the first network performance information of the second time period which can assist the first network element to take the sub-area as the granularity.
  • the first strategy can be formulated more accurately to ensure that the sub-area is in
  • the background traffic transmission strategy formulated in the sub-period meets the needs of the sub-areas in the sub-period, solves the problem of network resource congestion or waste of network resources in some areas in a certain period of time, saves resources, and improves transmission efficiency.
  • the data analysis network element can send the first network performance information and part of the second area information associated with the first network performance information to the first network element, so that the first network element can determine the part
  • the second area has the same first network performance information. Compared with whether the first network performance information of the second area is the same, sending the first network performance information of each second area can save signaling overhead.
  • the information of the first area in the first request can be replaced by the information of one or more second areas,
  • the first network element requests the data analysis network element for the network performance information of each of the one or more sub-areas included in the first area.
  • FIG. 6 shows a process for a data analysis network element to determine first network performance information of a second area according to an embodiment of the present application, and the method includes:
  • Step 601 The data analysis network element queries the NRF network element for address information of one or more AMF network elements in the second area according to the information of the second area.
  • the data analysis network element sends a query request message 1 to the NRF network element, and the query request message 1 includes the information of the second area.
  • the query request message 1 is used to query the address information or identification of one or more AMF network elements in the second area.
  • Step 602 The data analysis network element queries the NRF network element for the first information of one or more AMF network elements.
  • the data analysis network element sends a query request message 2 to the NRF network element, and the query request message 2 includes the information of the second area.
  • the query request message 2 is used to query the first information of one or more AMF network elements in the second area, or the query request message 2 includes identifiers of one or more AMF network elements.
  • Step 603 The data analysis network element queries the network elements in the network in the second area from the OAM network elements (including core network elements (such as UPF network elements or AMF network elements or SMF network elements) or access network elements ( For example, next Generation Node B (gNB)) first information in the second time period or the first time period or other different time periods.
  • OAM network elements including core network elements (such as UPF network elements or AMF network elements or SMF network elements) or access network elements ( For example, next Generation Node B (gNB)) first information in the second time period or the first time period or other different time periods.
  • core network elements such as UPF network elements or AMF network elements or SMF network elements
  • access network elements For example, next Generation Node B (gNB)
  • Step 604 The data analysis network element collects the number of terminals in the second area from one or more AMF network elements.
  • the number of terminals in the second area can be understood as the number of terminals accessing or accessing or registering to the network of the second area.
  • the number of terminals in the second area may be understood as the number of terminals that access or access the network of the second area in a specified time period (for example, the first time period or the second time period).
  • Step 605 The data analysis network element according to the first information of the network element (including core network element (such as UPF network element or AMF network element or SMF network element) or access network element (such as gNB)) in the second time period And/or the number of terminals on one or more AMF network elements to generate the network performance information of the second area.
  • core network element such as UPF network element or AMF network element or SMF network element
  • access network element such as gNB
  • the method provided in the embodiment of the present application may further include: the first network element determines that it is necessary to obtain the network performance information of the first area in the first time period.
  • the first network element determines that it needs to obtain the network performance information of the first area in the first time period. This can be achieved in the following manner: the first network element has demand information, and the demand information is used for Indicates that the network performance information of the first area in the first time period needs to be obtained.
  • the demand information includes information of the first time period and information of the first area.
  • the first network element determines that it needs to obtain the network performance information of the first area in the first time period, which can be implemented through the following step 701:
  • the method provided in this embodiment of the present application includes step 701 to step 715.
  • the requesting device sends a second request to the first network element, and correspondingly, the first network element receives the second request from the requesting device.
  • the second request is used to request the background traffic transmission strategy corresponding to the first area, and the second request includes the information of the first area and the information of the first time period.
  • the second request may also include one or more of the following information in the first area: the number of terminals, the size of data transmitted by each terminal, the identification of the requesting device, and the group identification of the terminal .
  • the group identifier of the terminal may be an internal group identifier (internal group id) or an external group identifier (external group id). If it is an external group ID, request the device to send it to the NEF network element, and the NEF network element converts it into an internal group ID.
  • the group identifier of the terminal is used to determine the group to which the terminal belongs.
  • the group to which the terminal belongs includes one or more terminals.
  • the requesting device may be a terminal or an AF network element.
  • the second request carries third indication information, and the third indication information is used to request a background traffic transmission strategy corresponding to the first area.
  • the information of the first area is used to determine the first area.
  • the information of the first area may be an identifier of the first area, or the information of the first area may be an identifier of a terminal in the first area that needs to transmit background traffic.
  • the first network element can determine according to the second request that it needs to obtain the network performance information of the first area in the first time period.
  • the information of the first area included in the second request can be replaced by information of one or more second areas .
  • the information of the first time period included in the second request may be composed of one or more second time periods Information replacement.
  • the first request sent by the first network element to the data analysis network element may carry one or more second area information and/or one or more second time period information, so that the data analysis network The element does not need to be further divided into sub-areas and/or sub-time periods.
  • the first network element may analyze the network performance information of the network elements or these second areas in the second time period from the data.
  • Step 702 to step 705 are the same as step 501 to step 504, and will not be repeated here.
  • the method provided in this embodiment of the present application may further include after step 705:
  • Step 706 The first network element sends to the requesting device the first policy of each third area in one or more third areas and one or more of the following information: the first policy of each third area is associated with each other.
  • the requesting device receives the first strategy of each third area from one or more third areas of the first network element and one or more of the following information : Information of the third area associated with the first strategy of each third area and the identifier of the first strategy.
  • step 706 the first network element sends the information of each third area and the first policy corresponding to each third area to the requesting device.
  • the requesting device determines the first strategy determined by the first network element for each third area.
  • the method provided in this embodiment of the application can also include:
  • Step 707 The first network element determines a first target background traffic transmission strategy for any one of the one or more third areas, and the first target background traffic transmission strategy is one or more background traffic for any third area. One of the transmission strategies.
  • step 707 in the embodiment of the present application can be implemented in the following manner: the first policy of any third area includes a background traffic transmission policy, and the first network element determines a background traffic transmission policy as any A first target background traffic transmission strategy for the third area.
  • step 707 in the embodiment of the present application can be implemented in the following manner: the first strategy in the third area includes multiple background traffic transmission strategies, and the first network element receives the first target background traffic from the requesting device Transmission strategy.
  • the first strategy in the third area includes multiple background traffic transmission strategies
  • the first target background traffic transmission strategy is selected by the requesting device.
  • Step 708 The first network element sends the first target background traffic transmission strategy and one or more of the following information to the network storage network element: the identifier of the first target background traffic transmission strategy or the first target background traffic transmission strategy associated with the first target background traffic transmission strategy. Information of the three regions.
  • the network storage network element receives the first target background traffic transmission strategy from the first network element and one or more of the following information: the identifier of the first target background traffic transmission strategy or the first target background traffic transmission strategy. Information about the third area.
  • the requesting device may send the first target traffic transmission to one or more terminals in the third area Strategy, so that one or more terminals in the third area transmit background traffic using the first target traffic transmission strategy.
  • the requesting device retrieves the first target background traffic transmission strategy from the network storage network element through the first network element according to the identifier of the first target background traffic transmission strategy and/or the third area information, and then the first network element selects the route through the UE
  • the policy (UE route selection policy, URSP) sends the first target transmission policy to the terminal.
  • the first network element stores the first target background traffic transmission strategy of each third area in the network storage network element.
  • the first network element stores the first target background traffic transmission strategy of any third area in the network storage network element, which is convenient for subsequent query of the first target of any third area from the network storage network element. Background traffic transmission strategy.
  • the first network element may obtain the first target background of the third area from the network storage network element according to the identifier of the first target background traffic transmission strategy and/or the information of the third area Traffic transmission strategy. Then the first network element feeds back the first target background traffic transmission strategy of the third area to the terminal A.
  • the method provided in the embodiment of the present application may further include:
  • Step 709 The data analysis network element sends the second network performance information of the second area to the first network element.
  • the first network element receives the second network performance information of the second area from the data analysis network element.
  • the second network performance information is the updated network performance information of the second area.
  • the second network performance information is network performance information of the second area after being updated relative to the first network performance information.
  • the updated network performance information includes upgraded network performance information or downgraded network performance information.
  • the network performance of the second area reflected by the second network performance information in the embodiment of the present application is lower than the network performance of the second area reflected by the first network performance information.
  • the second network performance information is compared with the first network performance.
  • the information is the degraded network performance information.
  • the first network performance information reflects the average load (or resource usage rate) of the gNB or UPF network element in the second area of the network in the second time period, where the resource is memory or CPU or hard disk or physical resource block (physical resource block).
  • the second network performance information reflects the average load (or resource usage rate) of the gNB or UPF of the network in the second area during the second time period, where the resource is memory or CPU or hard disk or PRB) is 90%.
  • the network in the second area reflected by the first network performance information has 500 terminals in the second time period
  • the network in the second area reflected by the second network performance information has 800 terminals in the second time period.
  • the second area in step 709 is an area where network performance information changes in one or more second areas.
  • the second network performance information is the network performance information of the second area after the first network performance information is updated in the third time period, where the third time period may not be a sub-period of the first time period. Time period, or not within the first time period.
  • Step 710 The first network element determines a second strategy for the third area according to the second network performance information, where the second strategy for the third area includes one or more background traffic transmission strategies.
  • the second strategy in the third area is an updated strategy in the third area.
  • the first network element needs to check one or the first network element.
  • the three areas are re-aggregated to obtain the fourth area, then the first network element determines the second strategy of the fourth area according to the second network performance information, and the second strategy of the fourth area includes one or more background traffic transmission strategies.
  • the third area in step 711 to step 715 can be replaced with the fourth area, which will not be described in detail below.
  • the first network element determines one or more updated background traffic transmission strategies for part of the second area based on the network performance information of part of the second area, and the background traffic transmission strategies of the remaining areas where no changes in network performance information have occurred will not change .
  • the aggregated TA is obtained by the aggregation of TA1 and TA2. If one or more background traffic transmission strategies of the aggregated TA include BDT1 and BDT2, if the network performance information of TA2 is subsequently degraded, the first network element will update the network according to TA2 For performance information, determine that the BDT strategy of TA2 is BDT3 and BDT4, while the BDT strategy of TA1 is still BDT1 and BDT2. This is because the network performance information of TA1 has not changed, so the BDT strategy of the aggregate TA to which it belongs can be determined as TA1 BDT strategy.
  • the first network element determines that the network performance information of TA1 is the same as the updated network performance information of TA2 according to the updated network performance information of TA2.
  • TA1 and TA2 can still be aggregated , Get polymerized TA. Then the BDT strategy of the aggregate TA is determined according to the updated network performance information of TA2.
  • the above example describes the method of only updating the BDT policy of the aggregate TA or the sub-TA when the network performance information of the sub-TA included in a certain aggregate TA is reduced.
  • the first network element does not update the BDT policy of other aggregate TAs .
  • the first network element may also re-aggregate all aggregated TAs to determine the updated BDT policy of each aggregated TA after re-aggregation.
  • the method provided in the embodiment of the present application further includes: if the first network element determines that the first policy of the third area is unavailable according to the second network performance information, but it cannot be based on the second network performance If the information determines the second strategy in the third area, the first network element may not delete the first strategy in the third area stored in the network storage network element. In other words, the first network element needs to be stored in the network storage network element. The first strategy of the third area. In this way, in the case that the first network element cannot determine the second strategy of the third area, the first strategy of the third area is still available.
  • the first network element can determine the second strategy for the third area according to the second network performance information, referring to FIG. include:
  • Step 711 The first network element sends the second policy of the third area and time information to the requesting device.
  • the requesting device receives the second policy and time information from the third area of the first network element.
  • the first network element sets the time information, and accordingly, the requesting device receives the second policy of the third area from the first network element.
  • the time information (such as a timer or a time window) is used to indicate the maximum response time of the requesting device to the second strategy of the third area.
  • the second strategy of the third area and the time information can be carried in the same message or in different messages.
  • the time information in step 711 may be omitted.
  • the method provided in the embodiment of the present application may further include step 712 to step 713:
  • step 712 within the maximum response time, the first network element receives the second target background traffic transmission strategy fed back by the requesting device, and the second target background traffic transmission strategy is among the multiple background traffic transmission strategies included in the second strategy one of.
  • the first network element receives a confirmation message fed back by the requesting device, and the confirmation message is used to indicate that the requesting device selects the second target background traffic transmission strategy from the multiple background traffic transmission strategies included in the second strategy .
  • Step 713 The first network element sends the second target background traffic transmission strategy and one or more of the following information to the network storage network element: the identifier of the second target background traffic transmission strategy or the information of the third area.
  • the first network element can update the second target background traffic transmission strategy to (or cover) the first target background traffic through the identification of the second target background traffic transmission strategy or the information of the third area. Transmission strategy.
  • the method provided in the embodiment of the present application may further include step 714 and step 715.
  • the first network element determines to delete the first target background traffic transmission strategy of the third area.
  • step 714 in the embodiment of the present application can be implemented in the following manner: within the maximum response time, the first network element does not receive from the requesting device from the requesting device from the multiple backgrounds included in the second policy. If the second target background traffic transmission strategy is selected in the traffic transmission strategy, the first network element determines to delete the first target background traffic transmission strategy in the third area.
  • step 714 in the embodiment of the present application can be implemented in the following manner: the requesting device sends first indication information to the first network element, and the first indication information is used to indicate that the requesting device has not received the first indication from the first network element.
  • the target background traffic transmission strategy is selected from the multiple background traffic transmission strategies included in the second strategy.
  • the first network element determines to delete the first network element according to the first indication information.
  • the first target background traffic transmission strategy for the three regions.
  • the above-mentioned first indication information is sent by the requesting device to the first network element within the maximum response time.
  • the first network element determines, according to the first indication information, the first target background traffic transmission strategy for deleting the third area. It should be understood that if the first network element does not send time information to the requesting device when sending the second strategy for the third area to the requesting device, then the requesting device does not need to make the second strategy for the third area within the maximum response time. Feedback.
  • the first network element determining to delete the first target background traffic transmission strategy of the third area includes: after the first network element sends the second strategy of the third area to the requesting device, if the first network element sends the second strategy of the third area to the requesting device, if the first When the network element determines that the requesting device does not select the target background traffic transmission strategy from the second strategy in the third area, the first network element determines to delete the first target background traffic transmission strategy in the third area.
  • the first network element determines that the requesting device does not select the target background traffic transmission strategy from the second strategy in the third area, including: the first network element determines that the request device does not select the target background from the second strategy in the third area Based on the feedback of the traffic transmission strategy, the first network element determines that the requesting device has not selected the target background traffic transmission strategy from the second strategy in the third area. Alternatively, the first network element determines, according to the first indication information, that the requesting device does not select the target background traffic transmission strategy from the second strategy in the third area.
  • the updated second network performance information in the second area in step 709 is the network performance information updated in the second area relative to the first network performance information in the third time period, where The third time period may not be a sub-time period of the first time period, or not within the range of the first time period, then in step 710, one or more background traffic in the second strategy in the third area determined by the first network element
  • the recommended transmission time window in the transmission strategy may not be a sub-time period of the first time period or not within the range of the first time period, so the requesting device may not select the second target background traffic transmission from the second strategy in the third area Therefore, the requesting device sends the above-mentioned first indication information or does not send the second target background traffic transmission policy to the first network element within the maximum response time period.
  • Step 715 The first network element sends a first deletion message to the network storage network element, and correspondingly, the network storage network element receives the first deletion message from the first network element.
  • the first deletion message is used to notify the network storage network element to delete the first target background traffic transmission strategy of the third area.
  • the first deletion message may include fourth indication information, and the fourth indication information is used to notify the network storage network element to delete the first target background traffic transmission strategy of the third area.
  • the first deletion message may also carry the identifier of the first target background traffic transmission strategy, or the information of the third area.
  • the network storage network element may delete the first target background traffic transmission strategy in the third area. It should be noted that if the network storage network element is a storage device inside the first network element, the action of deleting the first target background traffic transmission strategy in the third area may be executed by the first network element.
  • Figure 8 takes the requesting device as the AF network element, the data analysis network element as the NWDAF network element, the first network element is the PCF network element, the network storage network element is the UDR network element, and the first area is network area 1.
  • the second area is any one or more of sub-area 1 to sub-area N. In other words, the number of sub-areas is N as an example.
  • a method for determining a background traffic transmission strategy is specifically described. The method includes:
  • Step 801 The AF network element sends a background traffic transmission policy negotiation establishment request (Nnef_BDTPNegotiation_CreateRequest) service to the NEF network element.
  • the NEF network element receives the Nnef_BDTPNegotiation_Create Request service from the AF network element.
  • the Nnef_BDTPNegotiation_Create Request service means that the AF network element can trigger the BDTP Negotiation_Create Request service operation (service operation) to the NEF network element through the interface with the NEF network element.
  • the AF network element can communicate with the NEF network element through it.
  • the interface between the network elements triggers the BDTPNegotiation_Create Request service to the NEF network element.
  • the description is: Nnef_BDTPNegotiation_CreateRequest service operation.
  • the BDTPNegotiation_Create Request service is used to request a background traffic transmission policy (Background Data Transfer Policy), and the BDTPNegotiation_Create Request service carries background traffic transmission requirement information.
  • the background traffic transmission requirement information is used to indicate the background traffic transmission strategy expected by the AF network element.
  • the BDTP Negotiation_Create Request service is a form for the AF network element to send background traffic transmission demand information to the NEF network element.
  • the background traffic transmission demand information can also be carried in the Nnef_Trigger_Delivery request service or between the AF network element and the NEF network element. Among other information exchanged between, the embodiment of the present application does not limit this.
  • the content of the background traffic transmission demand information is shown in Table 1:
  • the BDTP Negotiation_Create Request service also carries indication information x (corresponding to the foregoing third indication information), and the indication information x is used to indicate a request for a background traffic transmission strategy.
  • the NEF network element is an example of a network open function network element, and the NEF network element in step 801 and step 802 can also be replaced with other network function open network elements, which is not limited in the embodiment of the present application.
  • Step 802 The NEF network element sends a background traffic transmission policy control establishment request (Npcf_BDTPolicyControl_CreateRequest) service to the PCF network element.
  • the PCF network element receives the Npcf_BDTPolicyControl_CreateRequest service from the NEF network element.
  • the background traffic transmission policy control establishment request service carries the BDTP Negotiation_Create Request service.
  • the AF network element does not send network area information to the PCF network element, it means that the AF network element requests the PCF network element for the background traffic transmission strategy of the entire network, which means that the AF network element requests the PCF network element for the entire operator The background traffic transmission strategy corresponding to all the network areas served by the AF network element in the network. If the AF network element provides network area information to the PCF network element, it means that the AF network element requests the PCF network element for the background traffic transmission strategy in the network area 1 determined by the network area information.
  • the AF network element sends the background traffic transmission demand information to the PCF network element and is transferred from the NEF network element as an example.
  • the AF network element can also send the background to the PCF network element through the interface with the PCF network element. Traffic transmission demand information.
  • Step 803 If the PCF network element does not have the background traffic transmission strategy corresponding to the ASP ID locally, the PCF network element obtains the background traffic transmission strategy corresponding to the ASP ID from the UDR network element.
  • the historical background traffic transmission strategy is mainly retrieved from the PCF network element to the UDR network element according to the ASP ID, so that the PCF network element can determine whether these historical background traffic transmission strategies are still valid according to the first network performance information.
  • the background traffic transmission strategy taken out here can be used as input for formulating one or more background traffic transmission strategies in step 808.
  • the PCF network element obtains the background traffic transmission strategy corresponding to the ASP ID from the UDR network element, which can be implemented in the following way: the PCF network element triggers the data management query request (Nudr_DM_Query Request) service operation to the UDR network element, correspondingly Yes, the UDR network element receives the Nudr_DM_Query Request service operation from the PCF network element.
  • the Nudr_DM_QueryRequest service is used to request the background traffic transmission strategy corresponding to the ASP ID.
  • the Nudr_DM_Query Request service carries the ASP Identifier from the AF network element.
  • the UDR network element sends a data management query response (Nudr_DM_Query Response) service to the PCF network element, and correspondingly, the PCF network element receives the data management query response from the UDR network element.
  • the data management query response includes the background data transfer policy (Background Data Transfer Policy) being used by the server corresponding to the ASP ID.
  • step 803 can be omitted.
  • Step 804 The PCF network element sends a message for requesting network performance data analysis results (Network Performance Analytics) to the NWDAF network element.
  • the NWDAF network element receives a message from the PCF network element for requesting the network performance data analysis result.
  • the message used to request the network performance data analysis result may be a data analysis open subscription (Nnwdaf_AnalyticsExposure_Subscribe) service, or the message used to request the network performance data analysis result may be the Npcf_PolicyAuthorization_Create Request service.
  • the message used to request the analysis result of the network performance data carries the analysis ID (Analytics ID), the analysis filter (Analytics Filter), the expected time window, and the target analysis report (Target of Analytics Reporting).
  • Analytics ID is used to indicate that the content requested by the PCF network element is Network Performance information
  • Analytics Filter Network Area 1
  • the target analysis report is access or access to one or more of Network Area 1. Terminal information.
  • the message for requesting the network performance data analysis result is used by the PCF network element to request the NWDAF network element for the network performance data analysis result corresponding to NetworkArea1 within the expected time window.
  • the message for requesting the network performance data analysis result may also carry indication information y, and the indication information y (corresponding to the second indication information in the foregoing embodiment) is used to indicate the request for the network performance data analysis result.
  • Step 805 The NWDAF network element collects data of the network area 1 (including the N sub-areas) according to the expected time window and the network area 1 requested by the PCF network element.
  • the NWDAF network element obtains the data in the sub-time periods included in the expected time window for each of the N sub-areas from the OAM network element, the NRF network element, and the AMF network element.
  • the data collected by the NWDAF network element in step 805 is shown in Table 2:
  • Step 806 The NWDAF network element generates a network performance data analysis result according to the data collected in step 805.
  • the NWDAF network element divides the network area 1 into N sub-areas (for example, sub-areas 1...sub-areas N). Then the NWDAF network element determines the network performance analysis results of the network in each of the N sub-areas at different time periods (Network Performance Analysis) (including the status information of the base station (gNB status information), and the resource usage rate of the base station (gNB resource usage) , Network element load (NF Load), number of terminals (Number of UEs), communication performance (Communication Performance) and mobility performance (Mobility performance), information of each sub-area (per Area Subset) and the number of terminals in each sub-area (Number of UE per Area Subset).
  • Network Performance Analysis including the status information of the base station (gNB status information), and the resource usage rate of the base station (gNB resource usage)
  • Network element load NF Load
  • number of terminals Number of UEs
  • Communication Performance Communication Performance
  • Mobility performance Mobility performance
  • the network performance data analysis result includes the network performance information 1 of the network of each sub-area in sub-area 1...sub-area N in time period 1.
  • Step 807 The NWDAF network element sends the network performance data analysis result to the PCF network element.
  • the PCF network element receives the network performance data analysis result from the NWDAF network element.
  • the NWDAF network element triggers the Nnwdaf_AnalyticsSubscription_Notify service operation to the PCF network element, where the Nnwdaf_AnalyticsSubscription_Notify carries the network performance information 1 of each sub-area of sub-area 1...sub-area N in time period 1.
  • time period 1 is a sub-time period of the expected time window. For example, if the expected time window is from April 1, 2019 to April 30, 2019, time period 1 can be from April 1, 2019 to From 11:00 in the evening every day of April 30, 2019 to 7:00 in the morning of the next day.
  • the N sub-areas may have different time periods 1 corresponding to some sub-areas, and there may also be other sub-areas corresponding to the same period 1 of time.
  • the time period 1 of the subregion 1 may be from 11:00 in the evening of each day from April 1, 2019 to April 3, 2019 to 7:00 in the morning of the next day.
  • the time period 1 of the sub-region 2 can be from 11:00 in the evening of each day from April 2, 2019 to April 4, 2019 to 7:00 in the morning of the next day.
  • the time period 1 corresponding to the different sub-areas in the N sub-areas can also be the same.
  • the NWDAF network element provides the PCF network element 1 with the network of each sub-area in sub-area 1 to sub-area N from April 1, 2019 to 2019.
  • the results of network performance analysis between 11:00 in the evening of each day on April 30 and 7:00 in the morning of the next day.
  • the number of time periods 1 may also be one or more, and the one or more time periods 1 may be continuous or discontinuous.
  • NWDAF network element provides PCF network element 1 with the network of sub-area 1 between 11:00 in the evening of each day and 7:00 in the morning of the next day from April 1, 2019 to April 15, 2019.
  • Step 808 The PCF network element determines one or more BDT strategies for each sub-area according to the network performance information 1 of each sub-area in the sub-area 1...sub-area N in the time period 1.
  • the network performance information 1 of each sub-area in the time period 1 in the embodiment of the present application may be obtained by analyzing the NWDAF network element.
  • the PCF network element determines the target network performance information from the network performance information 1 of the N sub-areas, and the PCF network element determines the target network performance information as the network performance information 1 of the N sub-areas.
  • the target network performance information may be the worst network performance information among the network performance information 1 of the N sub-regions.
  • step 808 in the embodiment of the present application can be implemented in the following manner: the PCF network element determines one or more BDT policies of the sub-area 1 according to the network performance information 1 of the sub-area 1 in the time period 1.
  • the manner in which the PCF network element determines one or more BDT strategies in other sub-areas in sub-area 1...sub-area N can refer to the manner in which the PCF network element determines one or more BDT strategies in sub-area 1, which will not be repeated here.
  • the content of one or more BDT strategies for each sub-area may be as shown in Table 4:
  • the PCF network element determines one or more BDT strategies of the first sub-area according to the network performance information 1 of the first sub-area in different time periods.
  • the PCF network element allocates a BDT Reference ID to each of the one or more BDT policies in the first sub-area.
  • the first subregion in the embodiment of the present application is any one of one or more subregions, and does not have any indicative meaning.
  • one or more BDT strategies in different sub-regions are different, and multiple BDT strategies in the same sub-region may also be different.
  • the recommended time window included in BDT strategy 1 is time window 1
  • the recommended time window included in BDT strategy 2 is time window 2.
  • the recommended time window included in BDT strategy 1 is time window 1
  • the maximum aggregate bit rate is X
  • the rate is N
  • the recommended time window included in BDT strategy 2 is time window 1
  • the maximum aggregate bit rate is Y
  • the rate is M, where X is greater than Y, and N is greater than M.
  • Step 809 The PCF network element sends the second information to the AF network element.
  • the AF network element receives the second information from the PCF network element.
  • the second information may include ⁇ subarea 1, one or more BDT strategies, BDT Reference ID of each BDT strategy in one or more BDT strategies>, ⁇ subarea 2, one or more BDT strategies, one or The BDT Reference ID of each BDT strategy in multiple BDT strategies>, ..., ⁇ sub-area N, one or more BDT strategies, and the BDT Reference ID of each BDT strategy in one or more BDT strategies>.
  • the second information may be carried in the background traffic transmission policy negotiation establishment response (BDTP Negotiation_Create Response) service
  • the BDTP Negotiation_Create Response service may be sent by the PCF network element to the AF network element through the NEF network element.
  • the PCF network element sends a background traffic transmission policy control establishment response (Npcf_BDTPolicyControl_Create response) service to the NEF network element.
  • Npcf_BDTPolicyControl_Create response carries the BDTPNegotiation_Create Response service, and then the NEF network element sends the Nnef_BDTPNegotiation_CreateResponse service to the AF network element.
  • one or more BDT policies in different sub-regions, the BDT Reference ID of each BDT policy, and the information of the sub-region can be carried in the same message.
  • one or more BDT policies in different sub-regions, each The BDT Reference ID of the BDT strategy and the information of the sub-area can be carried in different messages.
  • Step 810 The AF network element determines the respective target BDT strategy 1 of each sub-area according to one or more BDT strategies of each sub-area in sub-area 1...sub-area N.
  • the target BDT strategy 1 of the sub-area is the strategy used when terminals accessing or visiting the sub-area transmit background traffic.
  • Step 811 The AF network element sends the respective target BDT strategy 1 of each sub-area to the PCF network element, and correspondingly, the PCF network element receives the respective target BDT strategy 1 of each sub-area from the AF network element.
  • step 811 determines a BDT strategy for each subarea as each subarea.
  • the AF network element can select from multiple BDT strategies in the first sub-area.
  • One of the strategies is selected as the target BDT strategy 1 of the first sub-area.
  • the AF network element in the embodiment of the present application may be triggered by the PCF network element to decide to send the target BDT strategy 1 of each sub-area to the PCF network element.
  • the PCF network element sends a background traffic transmission policy negotiation update request (Nnef_BDTPNegotiation_updateRequest) service to the AF network element.
  • the background traffic transmission strategy negotiation update request is used to instruct the AF network element to feed back the target BDT strategy 1 of each sub-area to the PCF network element.
  • the PCF network element sends the background traffic transmission policy negotiation update request service to the AF network element through the following methods: the PCF network element triggers the background traffic transmission policy control update request to the NEF network element (Npcf_BDTPolicyControl_update request) Service, the Npcf_BDTPolicyControl_update request service carries the BDTP Negotiation_update Request service. After that, the NEF network element uses the interface between the NEF network element and the AF network element to trigger the Nnef_BDTPNegotiation_update Request service to the AF network element.
  • Npcf_BDTPolicyControl_update request the NEF network element uses the interface between the NEF network element and the AF network element to trigger the Nnef_BDTPNegotiation_update Request service to the AF network element.
  • the Nnef_BDTPNegotiation_updateRequest service may carry indication information y, and the indication information y is used to instruct the AF network element to feed back the target BDT strategy 1 of each sub-area to the PCF network element.
  • the PCF network element sends the first information to the AF network element and also sends the indication information y to the AF network element
  • the PCF network element sends the Npcf_BDTPolicyControl_update request service to the NEF network element and the NEF network element sends the AF network element
  • the process of sending Nnef_BDTPNegotiation_update Request service can be omitted.
  • the AF network element in the embodiment of this application can negotiate with the PCF network element in advance. If the PCF network element feeds back multiple BDT strategies for each sub-area, the AF network element needs to feed back its selected Target BDT strategy 1.
  • step 811 in the embodiment of the present application may be implemented in the following manner: the AF network element sends a background traffic transmission policy negotiation update response (BDTP Negotiation_update response) service to the PCF network element.
  • the background traffic transmission strategy negotiation update response service carries the target BDT strategy 1 of each sub-area.
  • the AF network element uses the interface between the AF network element and the NEF network element to trigger the Nnef_BDTPNegotiation_update response service to the NEF network element, and then the NEF network element uses the interface with the PCF network element to trigger the background traffic transmission to the PCF network element Policy update response (Npcf_BDTPolicyControl_update response) service.
  • the Npcf_BDTPolicyControl_update response service carries BDTPNegotiation_update response.
  • each BDT Reference ID corresponds to a set of selected target BDT strategy 1:
  • the AF network element may send one or more background traffic transmission identifiers to the PCF network element, which facilitates the PCF network element to determine the target background traffic transmission strategy for each sub-area according to the one or more background traffic transmission identifiers.
  • the AF network element not only sends one or more background traffic transmission identifiers to the PCF network element, but also sends the content of the target background traffic transmission strategy for each sub-area to the PCF network element.
  • the target background traffic transmission strategy is the strategy used by the terminals in each area to transmit the background traffic that has been negotiated between the PCF network element and the AF network element.
  • the AF network element can send the target background traffic transmission strategy of the first sub-area to the terminal in the first sub-area to facilitate the first sub-area.
  • the terminal in the sub-area transmits the background traffic according to the target background traffic transmission strategy of the first sub-area.
  • the AF network element retrieves the corresponding BDT policy from the UDR network element through the PCF network element according to the identifier of the target background traffic transmission strategy or the third area, and then the PCF network element uses the user equipment routing selection policy (URSP) Send the BDT strategy to the terminal.
  • the PCF retrieves the corresponding BDT strategy from the UDR network element according to the identifier of the target background traffic transmission strategy or the third area, and then the PCF network element sends the BDT strategy to the terminal through the URSP.
  • URSP user equipment routing selection policy
  • Step 812 The PCF network element sends one or more target background traffic transmission strategies 1 to the UDR network element, and information about the area corresponding to each target background traffic transmission strategy in the one or more target background traffic transmission strategies or each target background The background traffic transmission identifier of traffic transmission strategy 1.
  • the UDR network element receives one or more target background traffic transmission strategies 1 from the PCF network element, and the information of the sub-area corresponding to each target background traffic transmission strategy 1 in one or more target background traffic transmission strategies 1, or The background traffic transmission identifier corresponding to each target background traffic transmission strategy 1.
  • Step 813 The UDR network element stores one or more target background traffic transmission strategies 1, and the information of the sub-area corresponding to each target background traffic transmission strategy 1, or the background traffic transmission identifier corresponding to each target background traffic transmission strategy.
  • the UDR network element stores one or more target background traffic transmission strategies 1, the information of the sub-regions associated with each target background traffic transmission strategy 1, and the background traffic associated with each target background traffic transmission strategy 1. Transmission identification.
  • the UDR network element may refer to the storage format shown in Table 6 to store one or more target background traffic transmission strategies.
  • the UDR in the embodiment of the present application stores one or more target background traffic transmission strategies, and the information or information about the area corresponding to each target background traffic transmission strategy in the one or more target background traffic transmission strategies.
  • a response message can also be sent to the PCF network element to indicate that one or more target background traffic transmission strategies and one or more target background traffic transmission strategies have been successfully stored
  • the PCF network element may update one or more background traffic transmission strategies of the sub-area. Based on this, in a possible embodiment, after step 813, the method provided in the embodiment of the present application may further include:
  • Step 814 The NWDAF network element sends the network performance information 2 of the first sub-area of one or more sub-areas to the PCF network element, and correspondingly, the PCF network element receives the network performance information 2 of the any one of the sub-area from the NWDAF network element.
  • the NWDAF network element in the embodiment of the present application can actively send the network performance information of the first sub-area to the PCF network element when it discovers that the network performance information of the first sub-area in one or more sub-areas has changed. 2 .
  • the NWDAF network element in the embodiment of the present application may send the network performance information 2 of the first sub-area to the PCF network element at the request of the PCF network element.
  • the PCF network element in the embodiment of this application can send a subscription request to the NWDAF network element.
  • the subscription request is used to subscribe to the changed network performance information 2 of each sub-area in one or more sub-areas, so that once the NWDAF When the network element determines that the network performance information of the first sub-area has changed, it can feed back the network performance information of the first sub-area 2 to the PCF network element in time.
  • step 814 in the embodiment of this application can be implemented in the following manner: the NWDAF network element sends an analysis subscription notification (Nnwdaf_AnalyticsSubscription_Notify) service to the PCF network element, where the analysis subscription notification service includes the first sub-area Information and network performance information of the first sub-area2.
  • an analysis subscription notification (Nnwdaf_AnalyticsSubscription_Notify) service to the PCF network element, where the analysis subscription notification service includes the first sub-area Information and network performance information of the first sub-area2.
  • the first sub-region may represent one or more sub-regions.
  • the network performance information 2 of the first sub-region is degraded relative to the first performance information of the network performance information of the first sub-region.
  • Step 815 The PCF network element obtains the target BDT strategy 1 of the first sub-area from the UDR network element according to the information of the first sub-area. As described in step 803, the function of the PCF network element extracting the historical target BDT strategy from the UDR network element is used as an input for generating a new BDT strategy, for example, to determine whether these BDT strategies have expired.
  • the PCF network element sends the Nudr_DM_Query Request service to the UDR network element, and the Nudr_DM_Query Request includes the information of the first sub-area or the background traffic transmission identifier of the target BDT strategy 1 of the first sub-area.
  • the UDR network element serves the Nudr_DM_Query response, and the Nudr_DM_Query response service includes the target BDT policy 1 of the first sub-area.
  • the PCF network element has the mapping relationship between the background traffic transmission identifier of the target BDT strategy 1 of the first sub-area and the first sub-area, and the PCF can obtain the target of the first sub-area according to the information of the first sub-area.
  • the background traffic transmission identifier of the BDT strategy 1 can then be used to obtain the target BDT strategy 1 of the first sub-area from the UDR network element through the background traffic transmission identifier of the target BDT strategy 1 of the first sub-area.
  • Step 816 The PCF network element determines one or more updated BDT policies in the first sub-area according to the network performance information 2 of the first sub-area.
  • the NWDAF network element in the embodiment of the present application sends the network performance information 2 of the first sub-area to the PCF network element, it may indicate to the PCF network element that the network performance information of the first sub-area is degraded. Or the PCF network element determines that the network performance information of the first sub-area is degraded according to the network performance information 2 of the first sub-area and the network performance information 1 of the first sub-area. Or the PCF network element determines that the target BDT strategy 1 of the first sub-area needs to be updated according to the network performance information 2 of the first sub-area, and therefore executes step 816.
  • the PCF network element determines that the target BDT strategy 1 of the first sub-area is unavailable according to the network performance information 2 of the first sub-area, it cannot be determined according to the network performance information 2 of the first sub-area After one or more BDT policies in the first sub-area are updated, the PCF network element cannot delete the target BDT policy 1 of the first sub-area stored in the UDR network element. In other words, the PCF network element needs to retain the UDR network element The stored target BDT strategy 1 of the first sub-area. In this way, in the case that the PCF network element cannot determine one or more BDT strategies after the update of the first sub-area, the target BDT strategy 1 of the first sub-area is still available.
  • Step 817 The PCF network element sends one or more updated BDT policies and time information of the first sub-area to the AF network element, and the AF network element receives one or more updated BDT policies in the first sub-area from the PCF network element And time information. Or, when the PCF network element sends one or more BDT policies after the first subarea update to the AF network element, the PCF network element sets the time information, and accordingly, the AF network element receives the first subarea update from the PCF network element One or more BDT strategies afterwards.
  • the time information (such as a timer or a time window) is used to indicate the maximum response time of the AF network element to one or more BDT policies after the update of the first sub-area.
  • Step 818 Within the maximum response time, the PCF network element receives the target BDT strategy 2 selected by the AF network element from one or more BDT strategies updated in the first subarea, and the PCF network element sends the target BDT to the UDR network element Strategy 2 and the information of the first sub-area or the background traffic transmission identifier of the target BDT strategy 2.
  • the PCF network element can update the target BDT strategy 2 to (or cover) the target BDT strategy 1 through the information of the first subarea or the background traffic transmission identifier of the target BDT strategy 1.
  • Step 819 Within the maximum response time, if the PCF network element does not receive the target BDT strategy 2 selected by the AF network element from one or more BDT strategies updated in the first sub-area, the PCF network element sends the first BDT strategy to the UDR network element.
  • a delete message the first delete message is used to notify the UDR network element to delete the target background traffic transmission strategy 1 of the first sub-area.
  • the PCF network element will send the updated one or more BDT strategies to the AF network element, and Send time information, or the PCF network element sets a timer locally, so that if the PCF network element receives the target background traffic transmission strategy 2 from the AF network element within the maximum response time, it means that the AF agrees to use the target background traffic transmission strategy 2 Transmit the background traffic, so that the PCF network element updates the target BDT strategy of the first sub-area in the UDR network element, avoiding the system abnormality caused by rashly transmitting the target BDT strategy 1 of the first sub-area without the consent of the AF network element.
  • step 819 in the embodiment of the present application can be replaced by the following method: the PCF network element determines the target BDT strategy 1 for deleting the first sub-area, and the PCF network element sends the first deletion message to the UDR network element .
  • the PCF network element determining to delete the target BDT strategy 1 of the first sub-area includes: after the PCF network element sends one or more updated BDT policies in the first sub-area to the AF network element, if the PCF network element determines that the AF network element If the target BDT strategy 2 is not selected from the updated one or more BDT strategies of the first sub-area, the first network element determines to delete the target BDT strategy 1 of the first sub-area.
  • the PCF network element determines that the AF network element does not select the target BDT strategy 2 from one or more BDT strategies updated in the first subarea, including: the PCF network element determines that it has not received the AF network element update from the first subarea The PCF network element determines that the AF network element has not selected the target BDT strategy 2 from the one or more BDT strategies updated in the first sub-area.
  • the PCF network element receives the indication information a (corresponding to the above-mentioned first indication information) from the AF network element, and the PCF network element determines according to the indication information a that the AF network element has not been updated from one or more BDT policies in the first sub-area Select target BDT strategy 2.
  • the indication information a is used to indicate that the AF network element has not selected the target BDT strategy 2 from one or more BDT strategies updated in the first sub-area.
  • the network performance information 2 of the first sub-area in one or more sub-areas is the network performance information 1 of the first sub-area in the one or more sub-areas updated in time period 2.
  • the time period 2 may not be a sub-time period of the expected time window, or not within the range of the expected time window
  • the PCF network element determines the first
  • the recommended transmission time period in one or more BDT strategies after the update of the sub-area may not be a sub-time period of the expected time window, or may not be within the range of the expected time window, and the AF network element may not start from the first sub-time period.
  • the target BDT strategy 2 is selected from the one or more BDT strategies after the area update, so that the AF network element sends the above indication information a or cannot send the target BDT strategy 2 to the PCF network element within the maximum response time period.
  • Step 820 If the PCF network element finds that some terminals in the first area have used the target background traffic transmission strategy 1 to transmit background traffic, the PCF network element sends the target background traffic transmission strategy 2 to some terminals in the first area through the URSP.
  • the expected time window in the embodiment shown in FIG. 8 corresponds to the first time period in the foregoing embodiment
  • time period 1 corresponds to the second time period in the foregoing embodiment
  • the first sub-region corresponds to the occurrence of network performance information in the foregoing embodiment.
  • the network performance information 2 corresponds to the second network performance information in the foregoing embodiment.
  • the network performance information 1 corresponds to the first network performance information in the foregoing embodiment.
  • the target BDT strategy 1 corresponds to the first target background traffic transmission strategy in the foregoing embodiment.
  • the target BDT strategy 2 corresponds to the second target background traffic transmission strategy in the foregoing embodiment.
  • the updated one or more BDT strategies of the first sub-area correspond to the second strategy of the third area in the foregoing embodiment.
  • One or more BDT strategies in any sub-area correspond to the first strategy in the third area in the foregoing embodiment.
  • FIG. 9 shows another method for determining a background traffic transmission strategy of the present application.
  • the element determines one or more BDT strategies for each sub-area.
  • the PCF network element can aggregate N sub-areas based on the Network Performance of the N sub-areas to obtain one or more aggregated areas, and then the PCF network element determines One or more BDT strategies for each of one or more aggregated areas.
  • the method includes:
  • Steps 901 to 907 are the same as steps 801 to 807, and will not be repeated here.
  • Step 908 The PCF network element obtains one or more aggregation areas and network performance information 1 of each aggregation area according to the network performance information 1 of the N sub-areas.
  • step 908 in the embodiment of the present application can be implemented in the following manner: the PCF network element aggregates the sub-areas with the same network performance information 1 among the N sub-areas to obtain one or more aggregation areas.
  • the network performance information 1 of any aggregation area is the same as the network performance information 1 of the sub-area corresponding to the aggregation area.
  • the PCF network element aggregates TA1, TA2, TA8, TA9, and TA10 to get the aggregation Area 1. If TA3, TA4, TA5, TA6, and TA7 have the same network performance information 1, the PCF network element aggregates TA3, TA4, TA5, TA6, and TA7 to obtain aggregation area 1.
  • the NWDAF network element performs area aggregation, the NWDAF network element sends the network performance information 1 of one or more aggregation areas to the PCF network element in step 907.
  • Step 909 The PCF network element determines one or more BDT strategies for each aggregation area according to the network performance information 1 of each aggregation area in the one or more aggregation areas. For example, the PCF network element determines one or more BDT strategies for the aggregation area 1 according to the network performance information 1 of the aggregation area 1.
  • Step 910 to step 921 are the same as step 809 to step 820, except that the sub-areas in the embodiment involved in step 809 to step 820 can be replaced with the aggregation area.
  • the expected time window in the embodiment shown in FIG. 9 corresponds to the first time period in the foregoing embodiment, and the time period 1 corresponds to the second time period in the foregoing embodiment.
  • the first sub-region corresponds to the second region where the network performance information changes in the foregoing embodiment.
  • the network performance information 2 corresponds to the second network performance information in the foregoing embodiment.
  • the network performance information 1 corresponds to the first network performance information in the foregoing embodiment.
  • the target BDT strategy 1 corresponds to the first target background traffic transmission strategy in the foregoing embodiment.
  • the target BDT strategy 2 corresponds to the second target background traffic transmission strategy in the foregoing embodiment.
  • One or more BDT strategies after the update of the first aggregation area correspond to the second strategy of the third area in the foregoing embodiment.
  • One or more BDT strategies in any aggregation area correspond to the first strategy in the third area in the foregoing embodiment.
  • the aggregation area in the embodiment shown in FIG. 9 corresponds to the third area.
  • FIG. 10 shows another method for determining a strategy provided by an embodiment of the present application, and the method includes:
  • Step 1001 The first network element sends a first request for requesting network performance information to a data analysis network element.
  • the data analysis network element receives a first request from the first network element for requesting network performance information.
  • the first request includes information of the first area.
  • step 1001 For details of step 1001, refer to the related description at step 501. The difference is that the first request in step 1001 does not carry the information of the first time period.
  • the information of the first region in the first request may be composed of one or more second regions.
  • the information of the area is replaced.
  • the first network element requests the data analysis network element for the network performance information of each of the one or more sub-areas included in the first area.
  • Step 1002 The data analysis network element determines the first network performance information of the second area according to the first request.
  • the first area includes one or more second areas.
  • the second area is the first area.
  • the data analysis network element determines the first network performance information of each second area in the multiple second areas.
  • the first network performance information of the second area includes one or more of the first information in the second area or the number of terminals in the second area.
  • the second area is a sub-area of the first area, and the number of the second area is one or more.
  • Step 1003 The data analysis network element sends the first network performance information of the second area to the first network element.
  • the first network element receives the first network performance information of the second area from the data analysis network element.
  • the first network performance information includes: one or more of the first information or the number of terminals.
  • the second area is a sub-area of the first area, and the number of the second area is one or more.
  • Step 1004 The first network element determines the first strategy for the third area according to the first network performance information, the third area includes one or more second areas, the number of third areas is multiple, and the third area is the first A sub-region of a region.
  • Step 1005 The first network element sends the first policy corresponding to each of the multiple third areas to the requesting device.
  • step 1006 is the same as step 701
  • step 1007 to step 1015 are the same as step 707 to step 715, and will not be repeated here.
  • the first request carries the information of the first time period, or after the first network element sends the first request to the data analysis network element, it also sends the first time period to the data analysis network element.
  • the first network performance information includes: one or more of the first information in the second area in the second time period, or the number of terminals in the second area in the second time period.
  • the second time period may be the first time period, or the second time period may be a sub-time period of the first time period.
  • the number of the second time period may be multiple.
  • the updated second network performance information in the second area in step 1109 is the network performance information updated in the second area relative to the first network performance information in the third time period, where The third time period may not be a sub-time period of the first time period, or not within the range of the first time period, then in step 1110, one or more background traffic in the second strategy in the third area determined by the first network element
  • the recommended transmission time period in the transmission strategy may not be a sub-time period of the first time period or not within the range of the first time period, so the requesting device may not select the second target background traffic from the second strategy in the third area Transmission strategy, so that the requesting device sends the foregoing first indication information or cannot send the second target background traffic transmission strategy to the first network element within the maximum response time period.
  • the data analysis network element can autonomously determine the first time period of each second area in the multiple second areas. Information about the time period corresponding to the network performance information. Therefore, the data analysis network element may also send to the first network element information about the time period corresponding to the first network performance information of each second area. This is that the data of each second area may include a relatively long time period X (for example, 2019.1.1 ⁇ 2019.12.31). If the data analysis network element obtains data from any second area in the entire time period X The first network performance information of any second area will increase the processing burden of the data analysis network element.
  • the data analysis network element can autonomously select a sub-time period Y that is closer to the current time from the time period X, and based on The data of any second area in the sub-time period Y obtains the first network performance information of the any second area.
  • the first network element requests the network performance information of the TA list (including TA1 and TA2) from the data analysis network element.
  • the data in T2 determines the first network performance information of TA2.
  • the data analysis network element may send the first network performance information of TA1 corresponding to T1 to the first network element, and send the first network performance information of TA2 corresponding to T2 to the first network element, so that it is convenient for the first network element to determine TA1
  • the first network performance information of is the network performance information of TA1 in T1, and it is determined that the first network performance information of TA2 is the network performance information of TA2 in T2.
  • steps 1 to 20 may also correspond to a specific embodiment, and the specific embodiment includes: steps 1 to 20, where steps 1 to 20 can correspond to each other with reference to FIG. 8.
  • the difference between steps 801 to 820 in the illustrated embodiment is that the message for requesting network performance data analysis results sent by the PCF network element to the NWDAF network element in step 4 does not carry the expected time window, then the NWDAF network What the element obtains from OAM network element, NRF network element and AMF network element in step 5 is the data of each sub-area. At this time, the data of each sub-region includes at least the data of each sub-region in the expected time window.
  • the network performance data analysis result generated by the NWDAF network element in step 6 includes the network performance information of each sub-area in sub-area 1...sub-area N.
  • the PCF network element is based on the network performance of each sub-area.
  • Information 1 obtains one or more BDT strategies for each sub-area.
  • the NWDAF network element obtains it from the OAM network element, the NRF network element, and the AMF network element in step 5.
  • the data of each sub-region is: the data of each sub-region in the expected time window or the data in the sub-time periods included in each sub-region in the expected time window.
  • the network performance data analysis result generated by the NWDAF network element in step 6 includes the network performance information 1 of the network of each sub-area in sub-area 1...sub-area N in the sub-time period of the expected time window.
  • each network element such as the first network element, the data analysis network element, etc.
  • each network element includes a hardware structure and/or software module corresponding to each function.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
  • the embodiment of this application can divide the functional units according to the above-mentioned method example, the first network element and the data analysis network element.
  • each functional unit can be divided corresponding to each function, or two or more functions can be integrated in one processing.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit. It should be noted that the division of units in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
  • FIG. 11 shows the device for determining a strategy involved in the foregoing embodiment, and the device for determining a strategy may include: a communication unit 102 and a processing unit 101.
  • the device for determining the strategy is the first network element, or a chip applied to the first network element.
  • the communication unit 102 is configured to support the device for determining the strategy to execute the sending action performed by the first network element in step 501 in FIG. 5 of the foregoing embodiment.
  • the communication unit 102 is configured to support the device for determining the strategy to execute the receiving action performed by the first network element in step 503 of FIG. 5.
  • the processing unit is also used to support the communication device to execute step 504 in the foregoing embodiment.
  • the communication unit 102 is further configured to support the device for determining the strategy to execute step 702, step 706, step 711, step 713, step 715, and step 708 in the above-mentioned embodiment.
  • the communication unit 102 is further configured to support the device for determining the strategy to execute the receiving action performed by the first network element in step 701, step 704, and step 709 in the foregoing embodiment.
  • the processing unit 101 is further configured to support the device for determining the strategy to execute step 707, step 710, step 712, and step 714 in the foregoing embodiment.
  • the device for determining the strategy is a data analysis network element, or a chip applied to the data analysis network element.
  • the communication unit 102 a device for supporting the determination strategy, executes the receiving action performed by the data analysis network element in step 501 in the foregoing embodiment.
  • the processing unit 101 is configured to support the device for determining the strategy to execute step 502 in the foregoing embodiment.
  • the communication unit 102 is further configured to support the device for determining the strategy to execute the sending action performed by the data analysis network element in step 503 in the foregoing embodiment.
  • the communication unit 102 is further configured to support the device for determining the strategy to execute the sending action performed by the data analysis network element in step 709 in the foregoing embodiment.
  • the device for determining the strategy is the first network element, or a chip applied to the first network element.
  • the communication unit 102 is configured to support the device for determining the strategy to execute the sending action performed by the first network element in step 1001 and step 1005 in FIG. 10 of the foregoing embodiment.
  • the communication unit 102 is configured to support the device for determining the strategy to execute the receiving action performed by the first network element in step 1003 in FIG. 10.
  • the processing unit is also used to support the communication device to execute step 1004 in the foregoing embodiment.
  • the communication unit 102 is further configured to support the device for determining the strategy to execute step 1002, step 1006, step 1011, step 1013, step 1015, and step 1008 in the above-mentioned embodiment by the first network element The sending action performed.
  • the communication unit 102 is further configured to support the device for determining the strategy to execute the receiving action performed by the first network element in step 1006, step 1004, and step 1009 in the foregoing embodiment.
  • the processing unit 101 is further configured to support the device for determining the strategy to execute step 1007, step 1010, step 1012, and step 1014 in the foregoing embodiment.
  • the device for determining the strategy is a data analysis network element, or a chip applied to the data analysis network element.
  • the communication unit 102 is configured to support the device for determining the strategy to execute the receiving action performed by the data analysis network element in step 1001 in the foregoing embodiment.
  • the processing unit 101 is configured to support the device for determining the strategy to execute step 1002 in the foregoing embodiment.
  • the communication unit 102 is further configured to support the device for determining the strategy to execute the sending action performed by the data analysis network element in step 1003 in the foregoing embodiment.
  • the communication unit 102 is further configured to support the device for determining the strategy to execute the sending action performed by the data analysis network element in step 1009 in the foregoing embodiment.
  • FIG. 12 shows a schematic diagram of a possible logical structure of the device for determining a strategy involved in the foregoing embodiment.
  • the device for determining the strategy includes: a processing module 112 and a communication module 113.
  • the processing module 112 is used to control and manage the actions of the device that determines the strategy.
  • the processing module 112 is used to perform information/data processing steps on the device that determines the strategy.
  • the communication module 113 is used to support the steps of information/data sending or receiving by the device for determining the strategy.
  • the device for determining the strategy may further include a storage module 111 for storing program codes and data of the device for determining the strategy.
  • the device for determining the strategy is the first network element, or a chip applied to the first network element.
  • the communication module 113 is configured to support the device for determining the strategy to execute the sending action performed by the first network element in step 501 of FIG. 5 in the foregoing embodiment.
  • the communication module 113 is configured to support the device for determining the strategy to execute the receiving action performed by the first network element in step 503 of FIG. 5.
  • the processing unit is also used to support the communication device to execute step 504 in the foregoing embodiment.
  • the communication module 113 is further configured to support the device for determining the strategy to execute the steps 702, 706, 711, 713, 715, and 708 in the above-mentioned embodiment by the first network element The sending action performed.
  • the communication module 113 is also used to support the device for determining the strategy to execute the receiving actions performed by the first network element in step 701, step 704, and step 709 in the foregoing embodiment.
  • the processing module 112 is also used to support the device for determining the strategy to execute step 707, step 710, step 712, and step 714 in the foregoing embodiment.
  • the device for determining the strategy is a data analysis network element, or a chip applied to the data analysis network element.
  • the communication module 113 is configured to support the device for determining the strategy to execute the receiving action performed by the data analysis network element in step 501 in the foregoing embodiment.
  • the processing module 112 is configured to support the device for determining the strategy to execute step 502 in the foregoing embodiment.
  • the communication module 113 is further configured to support the device for determining the strategy to execute the sending action performed by the data analysis network element in step 503 in the foregoing embodiment.
  • the communication module 113 is further configured to support the device for determining the strategy to execute the sending action performed by the data analysis network element in step 709 in the foregoing embodiment.
  • the processing module 112 may be a processor or a controller, for example, a central processing unit, a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic devices, transistor logic devices, Hardware components or any combination thereof. It can implement or execute various exemplary logical blocks, modules, and circuits described in conjunction with the disclosure of this application.
  • the processor may also be a combination of computing functions, for example, a combination of one or more microprocessors, a combination of a digital signal processor and a microprocessor, and so on.
  • the communication module 113 may be a transceiver, a transceiver circuit, or a communication interface.
  • the storage module 111 may be a memory.
  • the processing module 112 is the processor 41 or the processor 45
  • the communication module 113 is the communication interface 43
  • the storage module 111 is the memory 42
  • the device for determining the strategy involved in this application may be the communication device shown in FIG. 13.
  • FIG. 13 is a schematic diagram of the hardware structure of a communication device provided by an embodiment of the application.
  • the communication device includes a processor 41, a communication line 44, and at least one communication interface (FIG. 13 is only an example and the communication interface 43 is included as an example for description).
  • the communication device may further include a memory 42.
  • the processor 41 can be a general-purpose central processing unit (central processing unit, CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more programs for controlling the execution of the program of this application. integrated circuit.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • the communication line 44 may include a path to transmit information between the aforementioned components.
  • the communication interface 43 uses any device such as a transceiver to communicate with other devices or communication networks, such as Ethernet, radio access network (RAN), wireless local area networks (WLAN), etc. .
  • RAN radio access network
  • WLAN wireless local area networks
  • the memory 42 may be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types that can store information and instructions
  • the dynamic storage device can also be electrically erasable programmable read-only memory (EEPROM), compact disc read-only memory (CD-ROM) or other optical disk storage, optical disc storage (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program codes in the form of instructions or data structures and can be used by a computer Any other media accessed, but not limited to this.
  • the memory can exist independently and is connected to the processor through the communication line 44. The memory can also be integrated with the processor.
  • the memory 42 is used to store computer-executable instructions for executing the solution of the present application, and the processor 41 controls the execution.
  • the processor 41 is configured to execute computer-executable instructions stored in the memory 42 to implement the method for determining a strategy provided in the following embodiments of the present application.
  • the computer-executable instructions in the embodiments of the present application may also be referred to as application program codes, which are not specifically limited in the embodiments of the present application.
  • the processor 41 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 12.
  • the communication device may include multiple processors, such as the processor 41 and the processor 45 in FIG. 12.
  • processors can be a single-CPU (single-CPU) processor or a multi-core (multi-CPU) processor.
  • the processor here may refer to one or more devices, circuits, and/or processing cores for processing data (for example, computer program instructions).
  • the communication device is a first network element, or a chip applied in the first network element.
  • the communication interface 43 is used to support the communication device to execute the sending action performed by the first network element in step 501 of FIG. 5 in the above-mentioned embodiment.
  • the communication interface 43 is configured to support the communication device to perform the receiving action performed by the first network element in step 503 in FIG. 5.
  • the processing unit is also used to support the communication device to execute step 504 in the foregoing embodiment.
  • the communication interface 43 is also used to support the communication device to perform step 702, step 706, step 711, step 713, step 715, and step 708 performed by the first network element in the foregoing embodiment.
  • Send action The communication interface 43 is also used to support the communication device to perform the receiving actions performed by the first network element in step 701, step 704, and step 709 in the foregoing embodiment.
  • the processor 41 and the processor 45 are further configured to support the communication device to execute step 707, step 710, step 712, and step 714 in the foregoing embodiment.
  • the communication device is a data analysis network element, or a chip applied to a data analysis network element.
  • the communication interface 43 is used to support the communication device to execute the receiving action performed by the data analysis network element in step 501 in the foregoing embodiment.
  • the processor 41 and the processor 45 are configured to support the communication device to execute step 502 in the foregoing embodiment.
  • the communication interface 43 is also used to support the communication device to execute the sending action performed by the data analysis network element in step 503 in the foregoing embodiment.
  • the communication interface 43 is also used to support the communication device to execute the sending action performed by the data analysis network element in step 709 in the foregoing embodiment.
  • the communication device is a first network element, or a chip applied in the first network element.
  • the communication interface 43 is used to support the communication device to perform the sending actions performed by the first network element in step 1001 and step 1005 in FIG. 10 of the foregoing embodiment.
  • the communication interface 43 is configured to support the communication device to perform the receiving action performed by the first network element in step 1003 in FIG. 10.
  • the processing unit is also used to support the communication device to execute step 1004 in the foregoing embodiment.
  • the communication interface 43 is also used to support the communication device to perform step 1002, step 1006, step 1011, step 1013, step 1015, and step 1008 performed by the first network element in the above embodiment. Send action.
  • the communication interface 43 is also used to support the communication device to execute the receiving action performed by the first network element in step 1006, step 1004, and step 1009 in the foregoing embodiment.
  • the processor 41 and the processor 45 are further configured to support the communication device to execute step 1007, step 1010, step 1012, and step 1014 in the foregoing embodiment.
  • the communication device is a data analysis network element, or a chip applied to a data analysis network element.
  • the processor 41 and the processor 45 are used to support the communication device to execute step 1002 in the foregoing embodiment.
  • the communication interface 43 is also used to support the communication device to execute the sending action performed by the data analysis network element in step 1003 in the foregoing embodiment.
  • the communication interface 43 is also used to support the communication device to execute the sending action performed by the data analysis network element in step 1009 in the foregoing embodiment.
  • FIG. 14 is a schematic structural diagram of a chip 150 provided by an embodiment of the present application.
  • the chip 150 includes one or more (including two) processors 1510 and a communication interface 1530.
  • the chip 150 further includes a memory 1540.
  • the memory 1540 may include a read-only memory and a random access memory, and provides operation instructions and data to the processor 1510.
  • a part of the memory 1540 may also include a non-volatile random access memory (NVRAM).
  • NVRAM non-volatile random access memory
  • the memory 1540 stores the following elements, execution modules or data structures, or their subsets, or their extended sets.
  • the corresponding operation is executed by calling the operation instruction stored in the memory 1540 (the operation instruction may be stored in the operating system).
  • One possible implementation is that the chips used in the first network element and the data analysis network element have similar structures, and different devices can use different chips to implement their respective functions.
  • the processor 1510 controls processing operations of any one of the first network element and the data analysis network element.
  • the processor 1510 may also be referred to as a central processing unit (CPU).
  • the memory 1540 may include a read-only memory and a random access memory, and provides instructions and data to the processor 1510. A part of the memory 1540 may also include NVRAM.
  • the memory 1540, the communication interface 1530, and the memory 1540 are coupled together by a bus system 1520, where the bus system 1520 may include a power bus, a control bus, and a status signal bus in addition to a data bus.
  • bus system 1520 may include a power bus, a control bus, and a status signal bus in addition to a data bus.
  • various buses are marked as the bus system 1520 in FIG. 14.
  • the method disclosed in the foregoing embodiments of the present application may be applied to the processor 1510 or implemented by the processor 1510.
  • the processor 1510 may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the above method can be completed by an integrated logic circuit of hardware in the processor 1510 or instructions in the form of software.
  • the aforementioned processor 1510 may be a general-purpose processor, a digital signal processing (digital signal processing, DSP), an ASIC, an off-the-shelf programmable gate array (field-programmable gate array, FPGA) or other programmable logic devices, discrete gates or transistors. Logic devices, discrete hardware components.
  • DSP digital signal processing
  • ASIC application-the-shelf programmable gate array
  • FPGA field-programmable gate array
  • Logic devices discrete hardware components.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory 1540, and the processor 1510 reads the information in the memory 1540, and completes the steps of the foregoing method in combination with its hardware.
  • the communication interface 1530 is used to perform the steps of receiving and sending the first network element and the data analysis network element in the embodiment shown in FIGS. 5-9.
  • the processor 1510 is configured to execute the processing steps of the first network element and the data analysis network element in the embodiments shown in FIGS. 5-9.
  • the above communication unit may be a communication interface of the device for receiving signals from other devices.
  • the transceiver unit is a communication interface for the chip to receive signals or send signals from other chips or devices.
  • a computer-readable storage medium is provided, and instructions are stored in the computer-readable storage medium.
  • the instructions are executed, the functions of the first network element as shown in FIGS. 5 to 7 are realized.
  • a computer-readable storage medium is provided, and instructions are stored in the computer-readable storage medium.
  • the instructions are executed, the functions of the data analysis network element shown in Figs. 5-7 are realized.
  • a computer program product including instructions.
  • the computer program product includes instructions. When the instructions are executed, the functions of the first network element shown in FIGS. 5 to 7 are realized.
  • a computer program product including instructions.
  • the computer program product includes instructions. When the instructions are executed, the functions of the data analysis network element shown in Figs. 5-7 are realized.
  • a chip is provided.
  • the chip is applied to a first network element.
  • the chip includes at least one processor and a communication interface.
  • the communication interface is coupled to the at least one processor.
  • the function of the first network element in 7.
  • a chip is provided.
  • the chip is applied to a data analysis network element.
  • the chip includes at least one processor and a communication interface.
  • the communication interface is coupled to the at least one processor.
  • An embodiment of the present application provides a communication system, which includes: a first network element and a data analysis network element.
  • the first network element is used to perform the functions of any of the first network elements in FIGS. 5 to 7
  • the data analysis network element is used to perform the steps performed by any of the data analysis network elements in FIGS. 5 to 7.
  • the communication system may also include an AF network element.
  • the AF network element is used to perform the function performed by the requesting device in FIG. 7.
  • the computer program product includes one or more computer programs or instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, network equipment, user equipment, or other programmable devices.
  • the computer program or instruction may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer program or instruction may be downloaded from a website, computer, The server or data center transmits to another website site, computer, server or data center through wired or wireless means.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center that integrates one or more available media.
  • the usable medium may be a magnetic medium, such as a floppy disk, a hard disk, and a magnetic tape; it may also be an optical medium, such as a digital video disc (digital video disc, DVD); and it may also be a semiconductor medium, such as a solid state drive (solid state drive). , SSD).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供一种确定策略的方法、装置及系统,涉及通信技术领域,用于更准确地制定子区域的第一策略。该方案包括:第一网元向数据分析网元发送用于请求网络性能信息的第一请求。其中,第一请求包括第一区域的信息和第一时间段的信息。第一网元从数据分析网元接收第二区域的第一网络性能信息,第一网络性能信息包括一项或多项:在第二时间段内第二区域中的第一信息、或在第二时间段内第二区域中的终端数量,第二时间段为第一时间段的子时间段,第二区域为第一区域的子区域,第二区域的数量为一个或多个;第一网元根据第一网络性能信息,确定第一策略。该方案可以以子区域为粒度,根据子区域的第一网络性能信息,精确地确定第一策略。

Description

一种确定策略的方法、装置及系统
本申请要求于2020年4月10日提交国家知识产权局、申请号为202010281629.3、申请名称为“一种确定策略的方法、装置及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及通信技术领域,尤其涉及一种确定策略的方法、装置及系统。
背景技术
大数据时代,终端侧会产生海量数据,这类数据有时候需上传给云服务器。虽然这类数据对时效性没要求,但对资费很敏感,因此云服务器可能需要与运营商网络协商在网络空闲时间传输这类数据,在避免网络资源浪费的同时,可以降低传输这类数据带来的流量费用。通常,这类数据在传输过程中产生的流量称之为背景流量(background data),比如针对车企,可以使用运营商网络上传地图信息给云服务器,用于制定高清地图。
在背景流量传输之前,第三方应用功能(application function,AF)网元会向运营商网络请求背景流量传输策略,然后由运营商网络中的策略控制功能(policy control function,PCF)网元根据来自AF网元的需求信息,制定AF网元请求的区域的背景流量传输策略。便于后续AF网元可以将PCF网元提供的背景流量传输策略发送给终端,以由请求的区域中的终端按照PCF网元提供的背景流量传输策略进行背景流量传输。
虽然PCF网元可以根据AF网元请求的区域制定背景流量传输策略,但是由于AF网元请求的区域和时间段中在不同的部分区域和部分时间段内终端分布并不平衡,这时如果请求的区域中的所有终端均按照PCF网元为请求的区域和时间段制定背景流量传输策略传输背景流量,可能会导致AF网元请求的区域中部分区域在部分时间段的网络资源拥塞或者部分区域在部分时间段的网络资源浪费。
发明内容
本申请实施例提供一种确定策略的方法、装置及系统,用于按照不同区域各自的网络性能信息,准确地制定不同区域各自的第一策略。
为达到上述目的,本申请采用如下技术方案:
第一方面,本申请实施例提供一种确定策略的方法,包括:第一网元向数据分析网元发送用于请求网络性能信息的第一请求。其中,第一请求包括第一区域的信息和第一时间段的信息。第一网元从数据分析网元接收第二区域的第一网络性能信息。该第一网络性能信息包括一项或多项:在第二时间段内第二区域中的第一信息、或在第二时间段内第二区域中的终端数量,第二时间段为第一时间段的子时间段,第二区域为第一区域的子区域,第二区域的数量为一个或多个。第一网元根据第一网络性能信息,确定第一策略。
本申请实施例提供一种确定策略的方法,该方法中通过第一网元利用第一请求向数据分析网元请求第一区域在第一时间段内的网络性能信息。之后,数据分析网元根据第一请求向第一网元反馈第一区域包括的一个或多个第二区域中每个第二区域的第一网络性能信息,第一网络性能信息包括在第二时间段内第二区域中的第一信息、或在第二时间段内 第二区域中的终端数量,这样便于第一网元根据第一网络性能信息,确定第一策略,该方案中第一网元向数据分析网元请求一个大范围(例如,第一区域或者第一时间段)内的网络性能信息。但是,数据分析网元向第一网元提供的是第一区域包括的不同区域(例如,一个或多个第二区域)或者第一时间段包括的不同第二时间段(例如,一个或者多个第二时间段)的第一网络性能信息,这样可以辅助第一网元以子区域为粒度,根据子区域的第一网络性能信息更准确地制定第一策略,可以保障为子区域在子时间段制定的背景流量传输策略符合该子区域在子时间段的需求,解决了部分区域在部分时间段内的网络资源拥塞或者网络资源浪费问题,节省了资源,提高了传输效率。
在一种可能的实现方式中,第一信息包括第二区域中的网络在第二时间段内的以下一项或多项信息:会话的创建成功率、终端切换成功的比率、终端注册成功的比率、基站或者核心网网元的资源使用率、基站或者核心网网元的使用占比、基站或者核心网网元的负载。本申请实施例中,第一信息还可以是负载信息,用于描述第二区域中的网络在第二时间段内的负载。
在一种可能的实现方式中,第一策略为第三区域的第一策略,第三区域包括一个或多个第二区域,第三区域的数量为一个或多个,第三区域的第一策略包括一个或者多个背景流量传输策略。
在一种可能的实现方式中,第三区域包括一个第二区域时,第三区域为第二区域。
在一种可能的实现方式中,第三区域包括多个第二区域时,第三区域包括的多个第二区域具有相同的第一网络性能信息。
在一种可能的实现方式中,本申请实施例提供的方法还包括:第一网元确定第三区域的第一目标背景流量传输策略,该第一目标背景流量传输策略为一个或者多个背景流量传输策略中的一个。第一网元向网络存储网元发送第一目标背景流量传输策略以及以下信息中的一个或多个:第一目标背景流量传输策略的标识或第三区域的信息。本申请实施例中将第一目标背景流量传输策略与以下信息中的一个或多个:第一目标背景流量传输策略的标识以及第三区域的信息存储在网络存储网元中,可以在后续第三区域的网络性能发生变化后,第一网元只需从网络存储网元中取出第三区域的第一目标背景流量传输策略,无需取出所有的背景流量传输(background data transfer,BDT)策略,降低了网络存储网元与第一网元的后续交互压力。
在一种可能的实现方式中,当第三区域的第一策略包括一个背景流量传输策略时,本申请实施例中第一网元确定第三区域的第一目标背景流量传输策略,包括:第一网元确定一个背景流量传输策略为第一目标背景流量传输策略。
在一种可能的实现方式中,当第三区域的第一策略包括多个背景流量传输策略时,本申请实施例提供的方法还包括:第一网元从请求设备处接收第一目标背景流量传输策略。
在一种可能的实现方式中,本申请实施例提供的方法还包括:第一网元接收来自数据分析网元的第二区域的网络的第二网络性能信息,该第二网络性能信息为第二区域更新后的网络性能信息。第一网元根据第二网络性能信息,确定第三区域的第二策略,第三区域的第二策略包括一个或者多个背景流量传输策略。
在一种可能的实现方式中,第二网络性能为第二区域相对于第一网络性能更新后的网络性能信息,其中,更新后的网络性能信息包括升级后的网络性能信息或者降级后的网络 性能信息。
在一种可能的实现方式中,本申请实施例提供的方法还包括:第一网元向请求设备发送第三区域的第二策略,以及时间信息;或者,第一网元向请求设备发送第三区域的第二策略时,第一网元设置时间信息,其中,该时间信息用于表示请求设备针对第三区域的第二策略的最大响应时间。在第一网元确定第三区域的第一目标背景流量传输策略不可用后,通过设置时间信息(如定时器或者时间窗)保障第一网元与请求设备之间策略协商的时间段,提高了方案的可靠性。可以理解的是,第一网元设置时间信息可以理解为:第一网元设置定时器或者时间窗,该定时器的时间长度与时间信息表示的时间长度相等。
在一种可能的实现方式中,本申请实施例提供的方法还包括:在最大响应时间内,第一网元接收到请求设备反馈的第二目标背景流量传输策略,第二目标背景流量传输策略为第二策略包括的多个背景流量传输策略中的一个。第一网元向网络存储网元发送第二目标背景流量传输策略以及以下信息中的一个或多个:第一目标背景流量传输策略的标识或第三区域的信息。该方案中,网络存储网元接收到第二目标背景流量传输策略后,可以根据第一目标背景流量传输策略的标识或者第三区域的信息将第一目标背景流量传输策略更新为第二目标背景流量传输策略。
在一种可能的实现方式中,本申请实施例提供的方法还包括:第一网元确定删除第三区域的第一目标背景流量传输策略。第一网元向网络存储网元发送第一删除消息,该第一删除消息用于通知网络存储网元删除第三区域的第一目标背景流量传输策略。
在一种可能的实现方式中,第一网元确定删除第三区域的第一目标背景流量传输策略,包括:在最大响应时间内,第一网元未从请求设备接收到请求设备从第二策略包括的多个背景流量传输策略中选择的第二目标背景流量传输策略,第一网元确定删除第三区域的第一目标背景流量传输策略。该方案中在第一网元在最大响应时间内,未接收到来自请求设备从第三区域的第二策略中选择的第二目标背景流量传输策略,再通知网络存储网元删除第三区域的第一目标背景流量传输策略这样比起现有技术中第一网元在第三区域的策略从第一策略变化为第二策略的情况下,第一网元未与请求设备协商而直接将网络存储网元中的第三区域的第一目标流量传输策略删掉,本申请实施例提供的方案要柔性很多,避免在重协商过程中用户无法获取第一目标背景流量传输策略。
在一种可能的实现方式中,第一网元确定删除第三区域的第一目标背景流量传输策略,包括:第一网元接收到请求设备的第一指示信息,该第一指示信息用于表示请求设备未从第二策略包括的多个背景流量传输策略中选择目标背景流量传输策略。第一网元根据第一指示信息,确定删除第三区域的第一目标背景流量传输策略。
可以理解的是,第一指示信息为第一网元在最大响应时间内接收到的。
在一种可能的实现方式中,第一网元确定删除第三区域的第一目标背景流量传输策略,包括:在第一网元向请求设备发送第三区域的第二策略之后,如果第一网元确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略,则第一网元确定删除第三区域的第一目标背景流量传输策略。
例如,第一网元确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略,包括:第一网元确定未接收到请求设备从第三区域的第二策略中选择目标背景流量传输策略的反馈,则第一网元确定请求设备未从第三区域的第二策略中选择目标背景流量传输策 略。或者,第一网元根据第一指示信息确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略。
在一种可能的实现方式中,本申请实施例提供的方法还包括:第一网元确定要获取第一区域对应的背景流量传输策略。
在一种可能的实现方式中,第一网元确定要获取第一区域对应的背景流量传输策略,包括:第一网元接收来自请求设备的用于请求第一区域对应的背景流量传输策略的第二请求,该第二请求包括第一区域的信息和第一时间段的信息。第一网元根据第二请求,确定要获取第一区域对应的背景流量传输策略。
在一种可能的实现方式中,第二请求还可以包括第一区域中以下信息中的一个或者多个:终端的数量、每个终端传输的数据大小、请求设备的标识、终端的群组标识。
在一种可能的实现方式中,本申请实施例提供的方法还包括:第一网元向请求设备发送第一策略以及以下信息中的一个或多个:第三区域的信息或第一策略的标识。
在一种可能的实现方式中,本申请实施例提供的方法还包括:若第一网元根据第二网络性能信息,确定第三区域的第一策略不可用,但是无法根据第二网络性能信息确定第三区域的第二策略,则第一网元将不删除网络存储网元中存储的第三区域的第一策略,换句话说,第一网元需要保留网络存储网元中存储的第三区域的第一策略。这样,在第一网元无法确定第三区域中的第二策略情况下,第三区域的第一策略仍然可用。
第二方面,本申请实施例提供一种确定策略的方法,该方法包括:数据分析网元接收来自第一网元的用于请求网络性能信息的第一请求,该第一请求包括第一区域的信息和第一时间段的信息。数据分析网元向第一网元发送一个或多个第二区域中每个第二区域的第一网络性能信息,该任一个第二区域的第一网络性能信息包括一项或多项:在第二时间段内该任一个第二区域中的第一信息,或者在第二时间段内第二区域中的终端数量,第二时间段为第一时间段的子时间段,第二区域为第一区域的子区域。
在一种可能的实现方式中,第一信息包括第二区域中的网络在第二时间段内的以下一项或多项信息:会话的创建成功率、终端切换成功的比率、终端注册成功的比率、基站或者核心网网元的资源使用率、基站或者核心网网元的使用占比、基站或者核心网网元的负载。本申请实施例中,第一信息还可以是负载信息,用于描述第二区域中的网络在第二时间段内的负载。
在一种可能的实现方式中,数据分析网元向第一网元发送第二区域的第二网络性能信息,该第二网络性能信息为第二区域更新后的网络性能信息。
在一种可能的实现方式中,第二网络性能为第二区域相对于第一网络性能更新后的网络性能信息,其中,更新后的网络性能信息包括升级后的网络性能信息或者降级后的网络性能信息。
第三方面,本申请实施例提供一种确定策略的方法,该方法包括:请求设备接收来自第一网元的第三区域的第一策略,以及以下信息中的一个或多个:第三区域的信息或第一策略的标识。请求设备根据第三区域的第一策略,确定第三区域的第一目标背景流量传输策略。请求设备根据第三区域的第一目标背景流量传输策略传输背景流量,第三区域的数量为一个或多个,该第三区域包括一个或多个第二区域,第二区域为第一区域的子区域。
在一种可能的实现方式中,第三区域的第一策略包括一个或者多个背景流量传输策略。
在一种可能的实现方式中,第三区域包括一个第二区域时,第三区域为第二区域。
在一种可能的实现方式中,第三区域包括多个第二区域时,多个第二区域具有相同的第一网络性能信息。
在一种可能的实现方式中,当第三区域的第一策略包括一个背景流量传输策略时,请求设备确定第三区域的第一目标背景流量传输策略,包括:请求设备确定该一个背景流量传输策略为第三区域的第一目标背景流量传输策略。
在一种可能的实现方式中,当第三区域的第一策略包括多个背景流量传输策略时,请求设备确定第三区域的第一目标背景流量传输策略,包括:请求设备将从多个背景流量传输策略中选择的背景流量传输策略确定为第三区域的第一目标背景流量传输策略。
在一种可能的实现方式中,本申请实施例提供的方法还可以包括:请求设备向第一网元发送响应消息,该响应消息用于反映请求设备从第三区域的多个背景流量传输策略中选择的第一目标背景流量传输策略。
在一种可能的实现方式中,本申请实施例提供的方法还可以包括:请求设备向第一网元发送用于请求第一区域对应的背景流量传输策略的第二请求,该第二请求包括第一区域的信息和第一时间段的信息。
在一种可能的实现方式中,第二请求还可以包括第一区域中以下信息中的一个或者多个:终端的数量、每个终端传输的数据大小、请求设备的标识、终端的群组标识。
在一种可能的实现方式中,本申请实施例提供的方法还可以包括:请求设备接收来自第一网元的第三区域的第二策略,以及时间信息。其中,该时间信息用于表示请求设备针对第三区域的第二策略的最大响应时间。在最大响应时间内,请求设备向第一网元反馈请求设备从第三区域的第二策略中选择的第二目标背景流量传输策略。该第二策略包括一个或多个传输策略。
在一种可能的实现方式中,本申请实施例提供的方法还可以包括:请求设备向第一网元发送第一指示信息,该第一指示信息用于表示请求设备未从第二策略包括的多个背景流量传输策略中选择目标背景流量传输策略。
在一种可能的实现方式中,本申请实施例中的请求设备在最大响应时间内向第一网元发送第一指示信息。
在一种可能的实现方式中,请求设备为应用功能网元。
第四方面,本申请实施例提供一种确定策略的装置,该确定策略的装置可以实现第一方面或第一方面的任意一种可能的实现方式中描述的一种确定策略的方法,因此也可以实现第一方面或第一方面任意一种可能的实现方式中的有益效果。该确定策略的装置可以为第一网元,也可以为可以支持第一网元实现第一方面或第一方面的任意一种可能的实现方式中的装置。例如应用于第一网元中的芯片。该确定策略的装置可以通过软件、硬件、或者通过硬件执行相应的软件实现上述方法。
一种示例,本申请实施例提供一种确定策略的装置,包括:通信单元,用于向数据分析网元发送用于请求网络性能信息的第一请求。其中,第一请求包括第一区域的信息和第一时间段的信息。通信单元,用于从数据分析网元接收第二区域的第一网络性能信息。该第一网络性能信息包括一项或多项:在第二时间段内第二区域中的第一信息、或在第二时间段内第二区域中的终端数量,第二时间段为第一时间段的子时间段,第二区域为第一区 域的子区域,第二区域的数量为一个或多个。处理单元,用于根据第一网络性能信息,确定第一策略。
在一种可能的实现方式中,第一信息包括第二区域中的网络在第二时间段内的以下一项或多项信息:会话的创建成功率、终端切换成功的比率、终端注册成功的比率、基站或者核心网网元的资源使用率、基站或者核心网网元的使用占比、基站或者核心网网元的负载。本申请实施例中,第一信息还可以是负载信息,用于描述第二区域中的网络在第二时间段内的负载。
在一种可能的实现方式中,第一策略为第三区域的第一策略,该第三区域包括一个或多个第二区域,第三区域的数量为一个或多个,第三区域的第一策略包括一个或者多个背景流量传输策略。
在一种可能的实现方式中,第三区域包括一个第二区域时,第三区域为第二区域。
在一种可能的实现方式中,第三区域包括多个第二区域时,多个第二区域的网络具有相同的第一网络性能信息。
在一种可能的实现方式中,处理单元,还用于确定第三区域的第一目标背景流量传输策略,该第一目标背景流量传输策略为一个或者多个背景流量传输策略中的一个。通信单元,还用于向网络存储网元发送第一目标背景流量传输策略以及以下信息中的一个或多个:第一目标背景流量传输策略的标识或第三区域的信息。该第一目标背景流量传输策略可以由该确定策略的装置从第三区域的第一策略中确定,也可以由请求设备从第三区域的第一策略中确定。
在一种可能的实现方式中,当第三区域的第一策略包括一个背景流量传输策略时,处理单元,用于确定一个背景流量传输策略为第一目标背景流量传输策略。
在一种可能的实现方式中,当第三区域的第一策略包括多个背景流量传输策略时,处理单元,还用于利用通信单元从请求设备处接收第一目标背景流量传输策略。
在一种可能的实现方式中,通信单元,用于接收来自数据分析网元的第二区域的网络的第二网络性能信息,该第二网络性能信息为第二区域更新后的网络性能信息。处理单元,用于根据第二网络性能信息,确定第三区域的第二策略,该第三区域的第二策略包括一个或者多个背景流量传输策略。
在一种可能的实现方式中,第二网络性能为第二区域相对于第一网络性能更新后的网络性能信息,其中,更新后的网络性能信息包括升级后的网络性能信息或者降级后的网络性能信息。
在一种可能的实现方式中,通信单元,还用于向请求设备发送第三区域的第二策略,以及时间信息;或者,第一网元向请求设备发送第三区域的第二策略时,第一网元设置时间信息,其中,该时间信息用于表示请求设备针对第三区域的第二策略的最大响应时间。在第一网元确定第三区域的第一目标背景流量传输策略不可用后,通过设置时间信息(如定时器或者时间窗)保障第一网元与请求设备之间策略协商的时间段,提高了方案的可靠性。
在一种可能的实现方式中,处理单元,还用于在最大响应时间内,利用通信单元从请求设备接收到请求设备反馈的第二目标背景流量传输策略,第二目标背景流量传输策略为第二策略包括的多个背景流量传输策略中的一个。通信单元,还用于向网络 存储网元发送第二目标背景流量传输策略以及以下信息中的一个或多个:第一目标背景流量传输策略的标识或第三区域的信息。
在一种可能的实现方式中,处理单元,还用于确定删除第三区域的第一目标背景流量传输策略;通信单元,还用于向网络存储网元发送第一删除消息,第一删除消息用于通知网络存储网元删除第三区域的第一目标背景流量传输策略。
在一种可能的实现方式中,处理单元,用于确定在最大响应时间内,通信单元未从请求设备接收到请求设备从第二策略包括的多个背景流量传输策略中选择的第二目标背景流量传输策略,第一网元确定删除第三区域的第一目标背景流量传输策略。
在一种可能的实现方式中,通信单元,还用于接收来自请求设备的第一指示信息,该第一指示信息用于表示请求设备未从第二策略包括的多个背景流量传输策略中选择目标背景流量传输策略;处理单元,用于根据第一指示信息,确定删除第三区域的第一目标背景流量传输策略。
在一种可能的实现方式中,第一指示信息为通信单元在最大响应时间内接收到的。
在一种可能的实现方式中,处理单元,用于确定删除第三区域的第一目标背景流量传输策略,包括:在通信单元向请求设备发送第三区域的第二策略之后,如果处理单元确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略,则处理单元,用于确定删除第三区域的第一目标背景流量传输策略。
例如,处理单元确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略,包括:处理单元确定未接收到请求设备从第三区域的第二策略中选择目标背景流量传输策略的反馈,则处理单元确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略。或者,处理单元根据第一指示信息确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略。
在一种可能的实现方式中,处理单元,还用于确定需要获取第一区域对应的背景流量传输策略。
在一种可能的实现方式中,通信单元,还用于接收来自请求设备的用于请求第一区域对应的背景流量传输策略的第二请求,该第二请求包括第一区域的信息和第一时间段的信息。处理单元,用于根据第二请求,确定需要获取第一区域对应的背景流量传输策略。
在一种可能的实现方式中,第二请求还可以包括第一区域中以下信息中的一个或者多个:终端的数量、每个终端传输的数据大小、请求设备的标识、终端的群组标识。
在一种可能的实现方式中,通信单元,还用于向请求设备发送第一策略以及以下信息中的一个或多个:第三区域的信息以及第一策略的标识。
在一种可能的实现方式中,若处理单元根据第二网络性能信息,确定第三区域的第一策略不可用,但是无法根据第二网络性能信息确定第三区域的第二策略,则处理单元将不会删除网络存储网元中存储的第三区域的第一策略,换句话说,处理单元需要保留网络存储网元中存储的第三区域的第一策略。这样,在处理单元无法确定第三区域中的第二策略情况下,第三区域的第一策略仍然可用。
另一种示例,本申请实施例提供一种确定策略的装置,该确定策略的装置可以是第一网元,也可以是第一网元内的芯片。该确定策略的装置可以包括:处理单元和通信单元。当该确定策略的装置是第一网元时,该处理单元可以是处理器。通信单元可以为接口电路。 该确定策略的装置还可以包括存储单元。该存储单元可以是存储器。该存储单元,用于存储计算机程序代码,计算机程序代码包括指令。该处理单元执行该存储单元所存储的指令,以使该确定策略的装置实现第一方面或第一方面的任意一种可能的实现方式中描述的方法。当该确定策略的装置是第一网元内的芯片时,该处理单元可以是处理器,该通信单元可以统称为:通信接口。例如,通信接口可以为输入/输出接口、管脚或电路等。该处理单元执行存储单元所存储的计算机程序代码,以使该第一网元实现第一方面或第一方面的任意一种可能的实现方式中描述的方法,该存储单元可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该第一网元内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
可选的,处理器、通信接口和存储器相互耦合。
第五方面,本申请实施例提供一种确定策略的装置,该确定策略的装置可以实现第二方面或第二方面的任意一种可能的实现方式中描述的一种确定策略的方法,因此也可以实现第二方面或第二方面任意一种可能的实现方式中的有益效果。该确定策略的装置可以为数据分析网元,也可以为可以支持数据分析网元实现第二方面或第二方面的任意一种可能的实现方式中的装置。例如应用于数据分析网元中的芯片。该确定策略的装置可以通过软件、硬件、或者通过硬件执行相应的软件实现上述方法。
一种示例,本申请实施例提供一种确定策略的装置,该装置包括:通信单元,用于接收来自第一网元的用于请求网络性能信息的第一请求,该第一请求包括第一区域的信息和第一时间段的信息。处理单元,用于确定一个或多个第二区域中每个第二区域的第一网络性能信息。通信单元,还用于向第一网元发送一个或多个第二区域中每个第二区域的第一网络性能信息,该任一个第二区域的第一网络性能信息包括一项或多项:在第二时间段内该任一个第二区域中的第一信息,或者在第二时间段内第二区域中的终端数量,第二时间段为第一时间段的子时间段,第二区域为第一区域的子区域。
在一种可能的实现方式中,第一信息包括网络在第二时间段内的以下信息中的一个或多个:会话的创建成功率、终端切换成功的比率、终端注册成功的比率、基站或者核心网网元的资源使用率、基站或者核心网网元的使用占比、基站或者核心网网元的负载。本申请实施例中,第一信息还可以是负载信息,用于描述第二区域中的网络在第二时间段内的负载。
在一种可能的实现方式中,通信单元,还用于向第一网元发送第二区域的第二网络性能信息,该第二网络性能信息为第二区域更新后的网络性能信息。
在一种可能的实现方式中,第二网络性能为第二区域相对于第一网络性能更新后的网络性能信息,其中,更新后的网络性能信息包括升级后的网络性能信息或者降级后的网络性能信息。
另一种示例,本申请实施例提供一种确定策略的装置,该确定策略的装置可以是数据分析网元,也可以是数据分析网元内的芯片。该确定策略的装置可以包括:处理单元和通信单元。当该确定策略的装置是数据分析网元时,该处理单元可以是处理器。通信单元可以为接口电路。该确定策略的装置还可以包括存储单元。该存储单元可以是存储器。该存储单元,用于存储计算机程序代码,计算机程序代码包括指令。该处理单元执行该存储单元所存储的指令,以使该确定策略的装置实现第二方面或第二方面的任意一种可能的实现 方式中描述的方法。当该确定策略的装置是数据分析网元内的芯片时,该处理单元可以是处理器,该通信单元可以统称为:通信接口。例如,通信接口可以为输入/输出接口、管脚或电路等。该处理单元执行存储单元所存储的计算机程序代码,以使该数据分析网元实现第二方面或第二方面的任意一种可能的实现方式中描述的方法,该存储单元可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该数据分析网元内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
可选的,处理器、通信接口和存储器相互耦合。
第六方面,本申请实施例提供一种确定策略的装置,该确定策略的装置可以实现第三方面或第三方面的任意一种可能的实现方式中描述的一种确定策略的方法,因此也可以实现第三方面或第三方面任意一种可能的实现方式中的有益效果。该确定策略的装置可以为请求设备,也可以为可以支持请求设备实现第三方面或第三方面的任意一种可能的实现方式中的装置。例如应用于请求设备中的芯片。该确定策略的装置可以通过软件、硬件、或者通过硬件执行相应的软件实现上述方法。
一种示例,本申请实施例提供一种确定策略的装置,该装置包括:通信单元,用于接收来自第一网元的第三区域的第一策略,以及以下信息中的一个或多个:第三区域的信息或第一策略的标识。处理单元,用于根据第三区域的第一策略,确定第三区域的第一目标背景流量传输策略。处理单元,用于根据第三区域的第一目标背景流量传输策略传输背景流量,第三区域的数量为一个或多个,该第三区域包括一个或多个第二区域,第二区域为第一区域的子区域。
在一种可能的实现方式中,第三区域的第一策略包括一个或者多个背景流量传输策略。
在一种可能的实现方式中,第三区域包括一个第二区域时,第三区域为第二区域。
在一种可能的实现方式中,第三区域包括多个第二区域时,多个第二区域具有相同的第一网络性能信息。
在一种可能的实现方式中,当第三区域的第一策略包括一个背景流量传输策略时,处理单元,用于确定该一个背景流量传输策略为第三区域的第一目标背景流量传输策略。
在一种可能的实现方式中,当第三区域的第一策略包括多个背景流量传输策略时,处理单元,用于将从多个背景流量传输策略中选择的背景流量传输策略确定为第三区域的第一目标背景流量传输策略。
在一种可能的实现方式中,通信单元,还用于向第一网元发送响应消息,该响应消息用于反映请求设备从第三区域的多个背景流量传输策略中选择的第一目标背景流量传输策略。
在一种可能的实现方式中,通信单元,还用于向第一网元发送用于请求第一区域对应的背景流量传输策略的第二请求,该第二请求包括第一区域的信息和第一时间段的信息。
在一种可能的实现方式中,第二请求还可以包括第一区域中以下信息中的一个或者多个:终端的数量、每个终端传输的数据大小、请求设备的标识、终端的群组标识。
在一种可能的实现方式中,通信单元,还用于接收来自第一网元的第三区域的第二策略,以及时间信息;或者,第一网元向请求设备发送第三区域的第二策略时,第一网元设置时间信息,其中,该时间信息用于表示请求设备针对第三区域的第二策略的最大响应时间。在最大响应时间内,通信单元,还用于向第一网元反馈请求设备从第三区域的第二策 略中选择的第二目标背景流量传输策略。
在一种可能的实现方式中,通信单元,还用于向第一网元发送第一指示信息,该第一指示信息用于表示请求设备未从第二策略包括的多个背景流量传输策略中选择目标背景流量传输策略。
在一种可能的实现方式中,通信单元,还用于在最大响应时间内,向第一网元发送第一指示信息。
在一种可能的实现方式中,该确定策略的装置为应用功能网元。
另一种示例,本申请实施例提供一种确定策略的装置,该确定策略的装置可以是请求设备,也可以是请求设备内的芯片。该确定策略的装置可以包括:处理单元和通信单元。当该确定策略的装置是请求设备时,该处理单元可以是处理器。通信单元可以为接口电路。该确定策略的装置还可以包括存储单元。该存储单元可以是存储器。该存储单元,用于存储计算机程序代码,计算机程序代码包括指令。该处理单元执行该存储单元所存储的指令,以使该确定策略的装置实现第三方面或第三方面的任意一种可能的实现方式中描述的方法。当该确定策略的装置是请求设备内的芯片时,该处理单元可以是处理器,该通信单元可以统称为:通信接口。例如,通信接口可以为输入/输出接口、管脚或电路等。该处理单元执行存储单元所存储的计算机程序代码,以使该请求设备实现第三方面或第三方面的任意一种可能的实现方式中描述的方法,该存储单元可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该请求设备内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
可选的,处理器、通信接口和存储器相互耦合。
第七方面,本申请实施例提供一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序或指令,当计算机程序或指令在计算机上运行时,使得计算机执行如第一方面至第一方面的任意一种可能的实现方式中描述的确定策略的方法。
第八方面,本申请实施例提供一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序或指令,当计算机程序或指令在计算机上运行时,使得计算机执行如第二方面至第二方面的任意一种可能的实现方式中描述的确定策略的方法。
第九方面,本申请实施例提供一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序或指令,当计算机程序或指令在计算机上运行时,使得计算机执行如第三方面至第三方面的任意一种可能的实现方式中描述的确定策略的方法。
第十方面,本申请实施例提供一种包括指令的计算机程序产品,当指令在计算机上运行时,使得计算机执行第一方面或第一方面的各种可能的实现方式中描述的一种确定策略的方法。
第十一方面,本申请提供一种包括指令的计算机程序产品,当指令在计算机上运行时,使得计算机执行第二方面或第二方面的各种可能的实现方式中描述的一种确定策略的方法。
第十二方面,本申请提供一种包括指令的计算机程序产品,当指令在计算机上运行时,使得计算机执行第三方面或第三方面的各种可能的实现方式中描述的一种确定策略的方法。
第十三方面,本申请实施例提供一种通信系统,该通信系统包括如下中任一个或多个: 第四方面及各种可能的实现方式中描述的确定策略的装置,第五方面及第五方面的各种可能的实现方式中描述的确定策略的装置。
在一种可能的实现方式中,该系统还可以包括:第六方面及第六方面的各种可能的实现方式中描述的确定策略的装置。
第十四方面,本申请实施例提供一种通信装置,该通信装置包括处理器和存储介质,存储介质存储有指令,指令被处理器运行时,实现如第一方面或第一方面的各种可能的实现方式描述的确定策略的方法。
第十五方面,本申请实施例提供一种通信装置,该通信装置包括处理器和存储介质,存储介质存储有指令,指令被处理器运行时,实现如第二方面或第二方面的各种可能的实现方式描述的确定策略的方法。
第十六方面,本申请实施例提供一种通信装置,该通信装置包括处理器和存储介质,存储介质存储有指令,指令被处理器运行时,实现如第三方面或第三方面的各种可能的实现方式描述的确定策略的方法。
第十七方面,本申请实施例提供了一种通信装置,该通信装置包括一个或者多个模块,用于实现上述第一方面、第二方面、第三方面、第二十四方面的方法,该一个或者多个模块可以与上述第一方面、第二方面、第三方面、第二十四方面的方法中的各个步骤相对应。
第十八方面,本申请实施例提供一种芯片,该芯片包括处理器和通信接口,通信接口和处理器耦合,处理器用于运行计算机程序或指令,以实现第一方面或第一方面的各种可能的实现方式中所描述的一种确定策略的方法。通信接口用于与芯片之外的其它模块进行通信。
第十九方面,本申请实施例提供一种芯片,该芯片包括处理器和通信接口,通信接口和处理器耦合,处理器用于运行计算机程序或指令,以实现第二方面或第二方面的各种可能的实现方式中所描述的一种确定策略的方法。通信接口用于与芯片之外的其它模块进行通信。
第二十方面,本申请实施例提供一种芯片,该芯片包括处理器和通信接口,通信接口和处理器耦合,处理器用于运行计算机程序或指令,以实现第三方面或第三方面的各种可能的实现方式中所描述的一种确定策略的方法。通信接口用于与芯片之外的其它模块进行通信。
具体的,本申请实施例中提供的芯片还包括存储器,用于存储计算机程序或指令。
第二十一方面,本申请实施例提供一种通信装置,该通信装置包括至少一个处理器,该至少一个处理器用于运行存储器中存储的计算机程序或指令,以实现第一方面或第一方面的各种可能的实现方式中所描述的一种确定策略的方法。
第二十二方面,本申请实施例提供一种通信装置,该通信装置包括至少一个处理器,该至少一个处理器用于运行存储器中存储的计算机程序或指令,以实现第二方面或第二方面的各种可能的实现方式中所描述的一种确定策略的方法。
第二十三方面,本申请实施例提供一种通信装置,该通信装置包括至少一个处理器,该至少一个处理器用于运行存储器中存储的计算机程序或指令,以实现第三方面或第三方面的各种可能的实现方式中所描述的一种确定策略的方法。
第二十四方面,本申请实施例提供一种确定策略的方法,该方法包括:第一网元向数 据分析网元发送用于请求网络性能信息的第一请求。该第一请求包括第一区域的信息。第一网元从数据分析网元接收第二区域的第一网络性能信息,该第一网络性能信息包括:第一信息或终端数量中的一项或多项。第二区域为第一区域的子区域,第二区域的数量为一个或多个。第一网元根据第一网络性能信息,确定第三区域的第一策略,第三区域包括一个或多个第二区域,第三区域的数量为多个,该第三区域为第一区域的子区域。第一网元向请求设备发送多个第三区域中每个第三区域对应的第一策略。
在一种可能的实现方式中,第三区域对应的第一策略包括一个或者多个背景流量传输策略。
在一种可能的实现方式中,第三区域包括多个第二区域时,第三区域包括的多个第二区域具有相同的第一网络性能信息。
在一种可能的实现方式中,第三区域包括一个第二区域时,第三区域为第二区域。
在一种可能的实现方式中,本申请实施例提供的方法还包括:第一网元确定多个第三区域中任一个第三区域的第一目标背景流量传输策略,任一个第三区域的第一目标背景流量传输策略为该任一个第三区域的一个或者多个背景流量传输策略中的一个。第一网元向网络存储网元发送任一个第三区域的第一目标背景流量传输策略以及以下信息中的一个或多个:第一目标背景流量传输策略的标识或任一个第三区域的信息。
在一种可能的实现方式中,第一网元确定多个第三区域中任一个第三区域的第一目标背景流量传输策略,包括:该任一个第三区域的第一策略包括一个背景流量传输策略,第一网元确定一个背景流量传输策略为该任一个第三区域的第一目标背景流量传输策略。或者,该任一个第三区域的第一策略包括多个背景流量传输策略,第一网元从请求设备处接收该任一个第三区域的第一目标背景流量传输策略。
在一种可能的实现方式中,本申请实施例提供的方法还包括:第一网元从数据分析网元接收第二区域的第二网络性能信息,第二网络性能信息为第二区域更新后的网络性能信息。第一网元根据第二网络性能信息,确定第三区域的第二策略,第三区域的第二策略包括一个或者多个背景流量传输策略。
在一种可能的实现方式中,本申请实施例提供的方法还包括:第一网元向请求设备发送第三区域的第二策略,以及时间信息。或者,第一网元向请求设备发送第三区域的第二策略时,第一网元设置时间信息。其中,时间信息用于表示请求设备针对第三区域的第二策略的最大响应时间。
在一种可能的实现方式中,本申请实施例提供的方法还包括:在最大响应时间内,第一网元接收到请求设备反馈的第二目标背景流量传输策略,第二目标背景流量传输策略为第二策略包括的多个背景流量传输策略中的一个。第一网元向网络存储网元发送第二目标背景流量传输策略以及以下信息中的一个或多个:第一目标背景流量传输策略的标识或第三区域的信息。
在一种可能的实现方式中,本申请实施例提供的方法还包括:第一网元确定删除第三区域的第一目标背景流量传输策略。第一网元向网络存储网元发送第一删除消息,该第一删除消息用于通知网络存储网元删除第三区域的第一目标背景流量传输策略。
在一种可能的实现方式中,第一网元确定删除第三区域的第一目标背景流量传输策略,包括:在最大响应时间内,第一网元未从请求设备接收到请求设备从第二策略包括的多个 背景流量传输策略中选择的第二目标背景流量传输策略,第一网元确定删除第三区域的第一目标背景流量传输策略。该方案中在第一网元在最大响应时间内,未接收到来自请求设备从第三区域的第二策略中选择的第二目标背景流量传输策略,再通知网络存储网元删除第三区域的第一目标背景流量传输策略这样比起现有技术中第一网元在第三区域的策略从第一策略变化为第二策略的情况下,第一网元未与请求设备协商而直接将网络存储网元中的第三区域的第一目标流量传输策略删掉,本申请实施例提供的方案要柔性很多,避免在重协商过程中用户无法获取第一目标背景流量传输策略。
在一种可能的实现方式中,第一网元确定删除第三区域的第一目标背景流量传输策略,包括:第一网元接收到请求设备的第一指示信息,该第一指示信息用于表示请求设备未从第二策略包括的多个背景流量传输策略中选择目标背景流量传输策略。第一网元根据第一指示信息,确定删除第三区域的第一目标背景流量传输策略。
可以理解的是,第一指示信息为第一网元在最大响应时间内接收到的。
在一种可能的实现方式中,第一网元确定删除第三区域的第一目标背景流量传输策略,包括:在第一网元向请求设备发送第三区域的第二策略之后,如果第一网元确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略,则第一网元确定删除第三区域的第一目标背景流量传输策略。
例如,第一网元确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略,包括:第一网元确定未接收到请求设备从第三区域的第二策略中选择目标背景流量传输策略的反馈,则第一网元确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略。或者,第一网元根据第一指示信息确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略。
在一种可能的实现方式中,本申请实施例提供的方法在第一网元向数据分析网元发送用于请求网络性能信息的第一请求之前,还可以包括:第一网元接收来自请求设备的用于请求第一区域对应的背景流量传输策略的第二请求,该第二请求包括第一区域的信息和第一时间段的信息。第一网元根据第二请求,确定要获取第一区域对应的背景流量传输策略。相应的,第一网络性能信息包括:在第二时间段内第二区域中的第一信息、或在第二时间段内第二区域中的终端数量中的一项或多项。
在一种可能的实现方式中,第二请求还可以包括第一区域中以下信息中的一个或者多个:终端的数量、每个终端传输的数据大小、请求设备的标识、终端的群组标识。
在一种可能的实现方式中,本申请实施例提供的方法还包括:若第一网元根据第二网络性能信息,确定第三区域的第一策略不可用,但是又无法根据第二网络性能信息确定第三区域的第二策略,则第一网元将不会删除网络存储网元中存储的第三区域的第一策略,换句话说,第一网元需要保留网络存储网元中存储的第三区域的第一策略。这样,在第一网元无法确定第三区域中的第二策略情况下,第三区域的第一策略仍然可用。
第二十五方面,本申请实施例提供一种确定策略的装置,该确定策略的装置可以实现第二十四方面或第二十四方面的任意一种可能的实现方式中描述的一种确定策略的方法,因此也可以实现第二十四方面或第二十四方面任意一种可能的实现方式中的有益效果。该确定策略的装置可以为第一网元,也可以为可以支持第一网元实现第二方面或第二方面的任意一种可能的实现方式中的装置。例如应用于第一网元中的芯片。该确定策略的装置可 以通过软件、硬件、或者通过硬件执行相应的软件实现上述方法。
一种示例,本申请实施例提供一种确定策略的装置,该装置包括:通信单元,用于向数据分析网元发送用于请求网络性能信息的第一请求。该第一请求包括第一区域的信息。通信单元,还用于从数据分析网元接收第二区域的第一网络性能信息,该第一网络性能信息包括:第一信息或终端数量中的一项或多项。第二区域为第一区域的子区域,第二区域的数量为一个或多个。处理单元,还用于根据第一网络性能信息,确定第三区域的第一策略,第三区域包括一个或多个第二区域,第三区域的数量为多个,该第三区域为第一区域的子区域。第一网元向请求设备发送多个第三区域中每个第三区域对应的第一策略。
在一种可能的实现方式中,第三区域对应的第一策略包括一个或者多个背景流量传输策略。
在一种可能的实现方式中,第三区域包括多个第二区域时,第三区域包括的多个第二区域具有相同的第一网络性能信息。
在一种可能的实现方式中,第三区域包括一个第二区域时,第三区域为第二区域。
在一种可能的实现方式中,处理单元,还用于确定多个第三区域中任一个第三区域的第一目标背景流量传输策略,任一个第三区域的第一目标背景流量传输策略为该任一个第三区域的一个或者多个背景流量传输策略中的一个。通信单元,还用于向网络存储网元发送任一个第三区域的第一目标背景流量传输策略以及以下信息中的一个或多个:第一目标背景流量传输策略的标识或任一个第三区域的信息。
在一种可能的实现方式中,该任一个第三区域的第一策略包括一个背景流量传输策略,处理单元,还用于确定一个背景流量传输策略为该任一个第三区域的第一目标背景流量传输策略。或者,该任一个第三区域的第一策略包括多个背景流量传输策略,处理单元,还用于通过通信单元从请求设备处接收该任一个第三区域的第一目标背景流量传输策略。
在一种可能的实现方式中,通信单元,还用于从数据分析网元接收第二区域的第二网络性能信息,第二网络性能信息为第二区域更新后的网络性能信息。处理单元,还用于根据第二网络性能信息,确定第三区域的第二策略,第三区域的第二策略包括一个或者多个背景流量传输策略。
在一种可能的实现方式中,通信单元,还用于向请求设备发送第三区域的第二策略,以及时间信息。或者,在向请求设备发送第三区域的第二策略时,处理单元,还用于设置时间信息。其中,时间信息用于表示请求设备针对第三区域的第二策略的最大响应时间。
在一种可能的实现方式中,在最大响应时间内,处理单元,还用于在接收到请求设备反馈的第二目标背景流量传输策略的情况下,向网络存储网元发送第二目标背景流量传输策略以及以下信息中的一个或多个:第一目标背景流量传输策略的标识或第三区域的信息,第二目标背景流量传输策略为第二策略包括的多个背景流量传输策略中的一个。
在一种可能的实现方式中,处理单元,还用于确定删除第三区域的第一目标背景流量传输策略;通信单元,还用于向网络存储网元发送第一删除消息,第一删除消息用于通知网络存储网元删除第三区域的第一目标背景流量传输策略。
在一种可能的实现方式中,处理单元,用于确定在最大响应时间内,通信单元未从请求设备接收到请求设备从第二策略包括的多个背景流量传输策略中选择的第二目标背景流量传输策略,第一网元确定删除第三区域的第一目标背景流量传输策略。
在一种可能的实现方式中,通信单元,还用于接收来自请求设备的第一指示信息,该第一指示信息用于表示请求设备未从第二策略包括的多个背景流量传输策略中选择目标背景流量传输策略;处理单元,用于根据第一指示信息,确定删除第三区域的第一目标背景流量传输策略。
在一种可能的实现方式中,第一指示信息为通信单元在最大响应时间内接收到的。
在一种可能的实现方式中,处理单元,用于确定删除第三区域的第一目标背景流量传输策略,包括:在通信单元向请求设备发送第三区域的第二策略之后,如果处理单元确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略,则处理单元,用于确定删除第三区域的第一目标背景流量传输策略。
例如,处理单元确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略,包括:处理单元确定未接收到请求设备从第三区域的第二策略中选择目标背景流量传输策略的反馈,则处理单元确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略。或者,处理单元根据第一指示信息确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略。
在一种可能的实现方式中,通信单元,还用于在第一网元向数据分析网元发送用于请求网络性能信息的第一请求之前接收来自请求设备的用于请求第一区域对应的背景流量传输策略的第二请求,该第二请求包括第一区域的信息和第一时间段的信息。处理单元,还用于根据第二请求,确定要获取第一区域对应的背景流量传输策略。相应的,第一网络性能信息包括:在第二时间段内第二区域中的第一信息、或在第二时间段内第二区域中的终端数量中的一项或多项。
在一种可能的实现方式中,第二请求还可以包括第一区域中以下信息中的一个或者多个:终端的数量、每个终端传输的数据大小、请求设备的标识、终端的群组标识。
在一种可能的实现方式中,若处理单元根据第二网络性能信息,确定第三区域的第一策略不可用,但是无法根据第二网络性能信息确定第三区域的第二策略,则处理单元将不会删除网络存储网元中存储的第三区域的第一策略,换句话说,处理单元需要保留网络存储网元中存储的第三区域的第一策略。这样,在处理单元无法确定第三区域中的第二策略情况下,第三区域的第一策略仍然可用。
另一种示例,本申请实施例提供一种确定策略的装置,该确定策略的装置可以是第一网元,也可以是第一网元内的芯片。该确定策略的装置可以包括:处理单元和通信单元。当该确定策略的装置是第一网元时,该处理单元可以是处理器。通信单元可以为接口电路。该确定策略的装置还可以包括存储单元。该存储单元可以是存储器。该存储单元,用于存储计算机程序代码,计算机程序代码包括指令。该处理单元执行该存储单元所存储的指令,以使该确定策略的装置实现第二十四方面或第二十四方面的任意一种可能的实现方式中描述的方法。当该确定策略的装置是第一网元内的芯片时,该处理单元可以是处理器,该通信单元可以统称为:通信接口。例如,通信接口可以为输入/输出接口、管脚或电路等。该处理单元执行存储单元所存储的计算机程序代码,以使该第一网元实现第二十四方面或第二十四方面的任意一种可能的实现方式中描述的方法,该存储单元可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是该第一网元内的位于该芯片外部的存储单元(例如,只读存储器、随机存取存储器等)。
可选的,处理器、通信接口和存储器相互耦合。
第二十六方面,本申请实施例提供一种通信装置,该通信装置包括处理器和存储介质,存储介质存储有指令,指令被处理器运行时,实现如第二十四方面或第二十四方面的各种可能的实现方式描述的确定策略的方法。
第二十七方面,本申请实施例提供一种芯片,该芯片包括处理器和通信接口,通信接口和处理器耦合,处理器用于运行计算机程序或指令,以实现第二十四方面或第二十四方面的各种可能的实现方式中所描述的一种确定策略的方法。通信接口用于与芯片之外的其它模块进行通信。
第二十八方面,本申请实施例提供一种包括指令的计算机程序产品,当指令在计算机上运行时,使得计算机执行第二十四方面或第二十四方面的各种可能的实现方式中描述的一种确定策略的方法。
第二十九方面,本申请实施例提供一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序或指令,当计算机程序或指令在计算机上运行时,使得计算机执行如第二十四方面至第二十四方面的任意一种可能的实现方式中描述的确定策略的方法。
第三十方面,本申请实施例提供一种通信装置,该通信装置包括至少一个处理器,该至少一个处理器用于运行存储器中存储的计算机程序或指令,以实现第二十四方面或第二十四方面的各种可能的实现方式中所描述的一种确定策略的方法。
上述提供的任一种装置或计算机存储介质或计算机程序产品或芯片或通信系统均用于执行上文所提供的对应的方法,因此,其所能达到的有益效果可参考上文提供的对应的方法中对应方案的有益效果,此处不再赘述。
附图说明
图1为本申请实施例提供的一种通信系统的架构图;
图2为本申请实施例提供的一种5G网络的系统架构图;
图3为本申请实施例提供的另一种5G网络的系统架构图;
图4为本申请实施例提供的一种终端分布示意图;
图5为本申请实施例提供的一种确定策略的方法的流量示意图;
图6为本申请实施例提供的一种数据分析网元确定网络性能信息的流程示意图;
图7为本申请实施例提供的另一种确定策略的方法的流量示意图;
图8为本申请实施例提供的一种确定背景流量传输策略的具体实施例的示意图;
图9为本申请实施例提供的另一种确定背景流量传输策略的具体实施例的示意图;
图10为本申请实施例提供的再一种确定策略的方法的流量示意图;
图11为本申请实施例提供的一种确定策略的装置的结构示意图;
图12为本申请实施例提供的另一种确定策略的装置的结构示意图;
图13为本申请实施例提供的一种通信设备的结构示意图;
图14为本申请实施例提供的一种芯片的结构示意图。
具体实施方式
为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。例如,第一请求和第二请求仅仅是为了区分不同的请求,并不对其先后顺序进行限定。本领域技术人员可以理 解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。
需要说明的是,本申请中,“示例性的”或者“例如”等词用于表示作例子、例证或说明。本申请中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其他实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念。
本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
本申请中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。
在介绍本申请实施例之前,首先对本申请实施例涉及到的相关名词作如下解释:
1、前景流量(Foreground Traffic),或者前台流量,为终端交互型流量,比如支付业务或者即时通讯软件(例如,微信)在运行时所产生的流量,前景流量传输对于实时性要求高,如果不能及时交互,会影响用户体验。通常情况下,前景流量为终端前台业务产生的流量,也就是终端通过屏幕能看到的或者正在使用的业务产生的流量。
2、背景流量(Background Data),也可以称为后台流量,大数据时代,终端侧会产生海量数据,这些数据需上传给云服务器。这些需要上传至云服务器的数据对时效性没要求,但对资费很敏感。比如,车企上传地图信息给云服务器,该地图信息用于云服务器制定高清地图。背景流量传输由于没有服务水平协议(service level agreement,SLA)要求,因此可利用网络的空闲资源来传输,运营商可以适当降低资费,实现第三方和运营商双赢。
如图1所示,图1示出了本申请实施例提供的一种通信系统的架构图,该系统包括:策略控制网元10、与策略控制网元10通信的数据分析网元20。
在一种可能的实现方式中,该通信系统还可以包括:网络存储网元30以及业务网元40。
其中,业务网元40可以利用与策略控制网元10之间的接口向策略控制网元10请求背景流量传输策略。或者,该业务网元40可以通过中间网元(例如,网络能力开放功能网元)向策略控制网元10发送用以请求背景流量传输策略的请求。策略控制网元10用于向数据分析网元20请求第一区域在第一时间段的网络性能信息。数据分析网元20可以向策略控制网元10提供第一区域包括的一个或多个第二区域中每个第二区域在第二时间段的第一网络性能信息,以便于策略控制网元10根据每个第二区域在第二时间段的第一网络性能信息,制定第一策略,从而反馈给业务网元40。网络存储网元30用于存储某个子区域的目标背景流量传输策略。
本申请实施例中的数据分析网元20可以为单独部署的网元,当然,该数据分析网元20 也可以和其他网元(例如,策略控制网元10)合设,或者策略控制网元10中具有执行本申请实施例中的数据分析网元20执行的动作的功能。或者数据分析网元20与第二网元合设,且数据分析网元20可以与策略控制网元10交互,此时,策略控制网元10和第二网元不是同一个网元,例如,第二网元可以为5G网络架构中的控制面网元(例如,SMF网元)或者UPF网元。
可选的,图2所示的通信系统可以应用于目前的5G网络架构以及未来出现的其它的网络架构,本申请实施例对此不作具体限定。
下述将以如图1所示的通信系统适用于5G网络架构为例,例如,以图1所示的通信系统适用于如图2所示的5G网络架构为例。
示例性的,以图1所示的通信系统应用于5G网络架构中的基于接口的架构为例,则如图2所示,上述的策略控制网元10所对应的网元或者实体可以为如图2所示的结构中5GC中的策略控制功能(policy control function,PCF)网元,或者会话管理功能(Session Management Function,SMF)网元,或者网管网元。例如,网管网元可以为运行、管理和维护(运维)(operation,administration,and maintenance,OAM)网元(也可以称为运行管理维护网元)。业务网元40所对应的网元或者实体可以为如图2所示的结构中5GC中的应用功能(application function,AF)网元。AF网元可以为运营商AF,比如代理-呼叫会话控制功能(proxy-call session control function,P-CSCF),也可以是第三方AF,比如需要传输背景流量的第三方服务器。比如车企服务器或者腾讯服务器或者微信服务器。
在5G网络中,如图2所示,该数据分析网元20可以为5GC中的网络数据分析功能(network data analytics function,NWDAF)网元,也可以是网管的管理数据分析功能(management data analytics function,MDAF)网元,甚至可以是RAN侧的数据分析网元。
在5G网络中,如图2所示,该网络存储网元30可以是用户数据管理网元或者用户数据存储网元。例如,网络存储网元30可以是统一数据库(unified data repository,UDR)、或者,统一数据管理(unified data management,UDM)。
此外,如图2所示,该5G网络架构中还可以包括:终端、接入设备(例如,接入网络(access network,AN)或者无线接入网络(radio access network,RAN))、用户面功能(userplane function,UPF)网元、数据网络(data network,DN)、接入和移动性管理功能(access and mobility management function,AMF)网元、鉴权服务器功能(authentication server function,AUSF)网元、会话管理功能(session management function,SMF)网元、网络能力开放功能(network exposure function,NEF)网元等,本申请实施例对此不作具体限定。
其中,终端通过下一代网络(next generation,N1)接口(简称N1)与AMF网元通信。接入设备通过N2接口(简称N2)与AMF网元通信。接入设备通过N3接口(简称N3)与UPF网元通信。UPF网元通过N6接口(简称N6)与DN通信。UPF网元通过N4接口(简称N4)与SMF网元通信。AMF网元通过N11接口(简称N11)与SMF网元通信。AMF网元通过N8接口(简称N8)与UDM网元通信。SMF网元通过N7接口(简称N7)与PCF网元通信。SMF网元通过N10接口(简称N10)与UDM网元通信。AMF网元通过N12接口(简称N12)与AUSF网元通信。UDM网元与UDR网元通信。PCF网元与UDR网元通信。
如图3示出了5G网络架构中基于服务化接口的架构,该架构与图2的区别在于,在图3 中5GC中的控制面网元也可以采用服务化接口进行交互。例如,AMF网元、AUSF网元、SMF网元、UDM网元、UDR网元、NEF网元、或者PCF网元采用服务化接口进行交互。比如,AMF网元对外提供的服务化接口可以为Namf。SMF网元对外提供的服务化接口可以为Nsmf。UDM网元对外提供的服务化接口可以为Nudm。UDR网元对外提供的服务化接口可以为Nudr。PCF网元对外提供的服务化接口可以为Npcf。NEF网元对外提供的服务化接口可以为Nnef。NRF网元对外提供的服务化接口可以为Nnrf。NWDAF网元对外提供的服务化接口可以为Nnwdaf。应理解,图3中各种服务化接口的名称的相关描述可以参考23.501标准中的5G系统架构(5G system architecture)图,在此不予赘述。
需要说明的是,图2和图3仅是示例性的给出一个PCF网元。当然,该5G网络架构中可能包括多个PCF网元,如包括PCF网元1和PCF网元2,本申请实施例对此不作具体限定。其中,各个网元之间的连接方式可参考图2或图3所示的5G网络架构,在此不再一一赘述。
AMF网元主要负责移动网络中的移动性管理,如用户位置更新、用户注册网络、用户切换等。
SMF网元主要负责移动网络中的会话管理,如会话建立、修改、释放。具体功能如为用户分配IP地址、选择提供报文转发功能的UPF网元等。
PCF网元用于制定背景流量传输策略。
UDM网元或者UDR网元用于存储用户数据,如背景流量传输策略。
UPF网元主要负责对用户报文进行处理,如转发、计费等。
DN指的是为终端提供数据传输服务的运营商网络,如IP多媒体业务(IP multi-media service,IMS)、Internet等。
数据分析网元,是能够进行大数据分析的网元设备,可以但不限于是网络数据分析功能网元等,例如,网络数据分析功能网元可以是NWDAF。在本申请实施例中,数据分析网元能够一个或多个子区域中每个子区域的网络性能信息,以辅助PCF网元根据每个子区域的网络性能信息指定背景流量传输策略。
业务网元,可以是应用网元,具体的该应用网元可以但不限于是运营商的AF网元、终端、第三方设备,例如非运营商的AF网元(也可称之为第三方的AF网元)等。其中所述运营商的AF网元可以但不限于是运营商的业务管控服务器;所述第三方的AF网元可以但不限于是第三方的业务服务器。背景流量,通常被定义为非实时交互性流量,具体可以分为上行背景流量和下行背景流量。例如,下行背景流量可以是视频缓存、文件下载、软件更新包、软件通知消息等等传输的流量;上行背景流量可以是车辆保存行驶地图信息等等传输的流量。
图4为本申请实施例提供的一种终端分布的场景示意图。在图4所示的场景中,存在3个跟踪区(tracking area,TA),分别为TA1,TA2和TA3。目前,业务网元可以向PCF网元请求TA列表(例如,如图4所示TA列表中包括TA1、TA2以及TA3)的背景流量传输策略,然后,PCF网元可以根据从NWDAF网元处获取到的TA列表的网络性能信息,制定TA列表的背景流量传输策略。假设AF网元向PCF网元请求在00:00~05:00存在10000个终端需要传输背景流量,在PCF网元得到TA列表的网络性能信息之后,根据TA列表的网络性能信息确定在00:00~05:00中可以传输10000个终端的背景流量。
但是,在实际传输过程中,TA列表中部分区域可能会出现拥塞。例如,如果PCF网元 制定的背景流量传输策略中,TA1在00:00~01:00传输背景流量的终端容量为1000个,但是实际传输背景流量的终端数量需求为1500个。如果PCF网元制定的背景流量传输策略中,TA2在03:00~05:00传输背景流量的终端容量为3000个,但是实际传输背景流量的终端数量需求为3500个。如果PCF网元制定的背景流量传输策略中,TA3在02:00~03:00传输背景流量的终端容量为6000个,但是实际传输背景流量的终端数量需求为5000个。这样会导致TA1和TA2中的终端在传输背景流量时出现拥塞的情况,而网络为TA3分配的用于传输背景流量的资源存在剩余。这是由于PCF网元是按照TA列表为粒度确定背景流量传输策略,而PCF网元并不确定每个TA的需求情况。
应理解,网络建议TA中传输的终端数量为6000个,表示网络为该TA分配的资源可以保障6000个终端可靠的传输背景流量。
基于上述问题,本申请实施例提供一种确定策略的方法,该方法中由PCF网元(对应下述第一网元)根据第一区域包括的子区域(例如,第二区域)和/或第一时间段包括的子时间段(例如,第二时间段)的网络性能信息,为每个子区域或者聚合区域制定背景流量传输策略,这样可以保障为子区域在子时间段制定的背景流量传输策略符合该子区域在子时间段的需求,避免部分区域在部分时间段内的网络资源拥塞或者网络资源浪费问题,节省了资源,提高了传输效率。
本申请实施例中A对应的B可以理解为:A和B关联。
下面将结合图1至图4对本申请实施例提供的确定策略的方法进行具体阐述。
需要说明的是,本申请下述实施例中各个网元之间的消息名字或消息中各参数的名字等只是一个示例,具体实现中也可以是其他的名字,本申请实施例对此不作具体限定。
需要指出的是,本申请各实施例之间可以相互借鉴或参考,例如,相同或相似的步骤,方法实施例、通信系统实施例和装置实施例之间,均可以相互参考,不予限制。
本申请实施例中的一种确定策略的方法的执行主体可以为第一网元,也可以为应用于第一网元中的芯片。一种确定策略的方法的执行主体可以为数据分析网元,也可以为应用于数据分析网元中的芯片。下述实施例将以确定策略的方法的执行主体为数据分析网元和第一网元为例进行说明。
以本申请实施例提供的确定策略的方法应用于图1所示的通信系统为例,如图5所示,为本申请实施例提供的一种确定策略的方法交互的示意图,该方法包括如下步骤:
步骤501、第一网元向数据分析网元发送第一请求。相应的,数据分析网元接收来自第一网元的第一请求。该第一请求用于请求网络性能信息。其中,第一请求包括第一区域的信息和第一时间段的信息。
示例性的,第一区域的信息用于确定第一区域。例如,第一区域可以为跟踪区TA、跟踪区列表(TA list)、路由区域(routing area,RA)、RA列表、小区(cell)、小区列表(Cell list)、全球定位系统(GPS(global position system,物理区域)或者GPS列表(GPS list))中的至少一个,此处统一说明,后续不再赘述。其中,GPS list包括一个或多个物理区域。TA list包括一个或多个TA,Cell list包括一个或多个小区。该第一时间段的信息用于确定第一时间段(例如,00:00~05:00)。例如,第一时间段可以为时间窗(time window)、时间戳(timestamp)、时间段(time interval)中的至少一个。
本申请实施例中的第一请求具体用于向数据分析网元请求第一区域在第一时间段内 的网络性能信息。
示例性的,第一网元可以为用于确定传输背景流量的策略的网元(核心网网元(例如,PCF网元或者SMF网元)或者网管网元(网络切片管理功能(network slice management function,NSMF)),或者第一网元可以为请求背景流量传输策略的网元(例如,AF网元),或者第一网元可以为使用背景流量传输策略进行背景流量传输的网元,本申请实施例对此不作限定。
作为一种可能的实现,第一请求中还可以包括第二指示信息,该第二指示信息用于指示请求网络性能信息。
步骤502、数据分析网元根据第一请求确定第二区域的第一网络性能信息。第一区域包括一个或多个第二区域。
例如,当第一区域包括一个第二区域时,第二区域即为第一区域。当第一区域包括多个第二区域时,数据分析网元确定的是多个第二区域中每个第二区域的第一网络性能信息。
其中,第二区域的第一网络性能信息包括:在第二时间段内第二区域中的第一信息、或在第二时间段内第二区域中的终端数量中的一项或多项。第二时间段为第一时间段的子时间段,第二区域为第一区域的子区域,第二区域的数量为一个或多个。
上述一个或多个第二区域可以由第一网元进行划分,或者上述一个或多个第二区域可以由数据分析网元进行划分,本申请实施例对此不作限定。比如,数据分析网元或者第一网元可以通过TA List中按照TA粒度或者Cell粒度划分;或者数据分析网元通过数据分析将TA List中的不同TA或者Cell按照网络性能是否相近或者相同进行聚类或者分类,每一个类别对应的区域作为第一区域的其中一个子区域。
本申请实施例中的一个或多个第二区域聚合得到的区域可以为第一区域的全部区域或者部分区域,本申请实施例对此不作限定。例如,以数据分析网元对第一区域进行划分为例,如果第一网元提供的第一区域为TA列表,则数据分析网元可以根据TA列表包括的TA为粒度划分子区域。
举例说明,以第一区域为A区域,第一时间段为T1~T10为例,则数据分析网元可以将A区域划分为区域1、区域2以及区域3,这样数据分析网元可以确定区域1在T1~T3时间段内的第一网络性能信息、区域2在T2~T5时间段内的第一网络性能信息、以及区域3在T7~T8时间段内的第一网络性能信息。
或者,再举例说明,以第一区域为B区域,第一时间段为T11~T20为例,则数据分析网元可以将B区域划分为一个区域,也就是说第二区域也为B区域,这样数据分析网元可以确定第二区域在T11~T14时间段内的第一网络性能信息和第二区域在T16~T20时间段内的第一网络性能信息。
本申请实施例中的第一时间段包括一个或多个第二时间段,由于即使同一第二区域在不同时间段内的网络性能也存在差异,因此,同一个第二区域的第一网络性能信息包括该同一个第二区域在一个或多个第二时间段中每个第二时间段的网络性能信息。例如,区域1的第一网络性能信息可以包括区域1在T1~T3时间段内的网络性能信息以及区域1在T5~T6时间段内的网络性能信息。
不同第二区域对应的第二时间段可以相同,也可以不相同。换言之,对于区域1和区域2,数据分析网元可以确定区域1在T1~T3时间段内的第一网络性能信息,以及区域2在 T1~T3时间段内的第一网络性能信息。当然,对于区域1和区域2,数据分析网元可以确定区域1在T1~T4时间段内的第一网络性能信息,以及区域2在T5~T6时间段内的第一网络性能信息。
不同第二区域对应的第二时间段可以为连续时间段,也可以为非连续时间段,本申请实施例对此不作限定。
可以理解的是,第二时间段内第二区域中的第一信息用于表示在第二时间段内第二区域中的网络或者网元(比如核心网网元(如UPF网元、AMF网元或者SMF网元)或者接入网网元(如gNB或者RAN))是否处于空闲态。例如,第二时间段内第二区域中的第一信息包括第二时间段内第二区域中的网络的负载,或者第二时间段内第二区域中的网元的负载。第二时间段内第二区域中的网络的负载用于表示第二时间段内第二区域中的网络是否处于空闲态。如果第二时间段内第二区域中的网络的负载表示第二时间段内第二区域中的网络处于空闲态,则意味着第二时间段内第二区域中的网络具有空闲资源。如果第二时间段内第二区域中的网络的负载表示第二时间段内第二区域中的网络处于非空闲态,则意味着第二时间段内第二区域中的网络不具有空闲资源。
可以理解的是,第一信息还可以是负载信息,用于描述第二区域中的网络在第二时间段内的负载。本申请实施例中其他地方关于第一信息描述都可以通过负载信息代替,不再赘述。
可以理解的是,第二时间段内第二区域中的终端数量用于反映第二时间段内接入或者访问第二区域中的终端的数量。值得说明的是,该终端数量可以是某个时间点(timestamp)的真实值(可以经过特殊处理过,比如归一化处理)或者某个时间段(time window或者time interval或者time period)内的平均值或者方差值,本申请实施例但凡涉及终端数量都可以参考此处的理解,后续不再赘述。
例如,第二时间段内第二区域中的网络的负载可以为第二时间段内第二区域中的网络的拥塞等级、第二时间段内第二区域中的网络的负载等级(slice load level)或者第二时间段内第二区域中的网络性能中的至少一个。关于步骤502的具体实现可以参考图6中的步骤,此处不再赘述。
步骤503、数据分析网元向第一网元发送第二区域的第一网络性能信息,相应的,第一网元从数据分析网元接收第二区域的第一网络性能信息。
可选的,数据分析网元向第一网元发送一个或多个第一网络性能信息,以及一个或多个第一网络性能信息中每个第一网络性能信息所对应的第二区域。相应的,第一网元从数据分析网元接收一个或多个第一网络性能信息,以及一个或多个第一网络性能信息中每个第一网络性能信息所对应的第二区域的信息。
在一种可能的实现方式中,本申请实施例中的第一信息包括第二区域中的网络在第二时间段内的以下一项或多项信息:会话的创建成功率、终端切换成功的比率、终端注册成功的比率、基站或者核心网网元的资源使用率、基站或者核心网网元的使用占比、基站或者核心网网元的负载。值得说明的是,会话的创建成功率、终端切换成功的比率、终端注册成功的比率、基站或者核心网网元的资源使用率、基站或者核心网网元的使用占比、基站或者核心网网元的负载可以是某个时间点(timestamp)的真实值(可以经过特殊处理过,比如归一化处理)或者某个时间段(time window或者time interval或者time period)内的平 均值或者方差值,本申请实施例涉及这些第一信息都可以参考此处的理解,后续不再赘述。
本申请实施例中的会话的创建成功率可以由在第二时间段内网络在第二区域创建的会话总数和成功创建的会话数量得到,例如成功创建的会话数量除以第二时间段内网络在第二区域创建的会话总数,得到会话的创建成功率。终端切换成功的比率可以由第二时间段内在第二区域进行切换的终端数量以及成功切换的终端数量确定。例如,成功切换的终端数量除以切换的终端数量得到终端切换成功的比率。基站或者核心网网元的资源使用率可以由:第二区域内的基站或者核心网网元在第二时间段内具有的资源总数与第二区域的基站或者核心网网元在第二时间段内使用的资源数确定。例如,第二区域的基站或者核心网网元在第二时间段内使用的资源数除以第二区域内的基站或者核心网网元在第二时间段内具有的资源总数,得到基站或者核心网网元的资源使用率。终端注册成功的比率可以由第二时间段内在第二区域内注册的终端总数以及第二区域内成功注册的终端数量确定。例如,第二时间段内在第二区域内成功注册的终端数量除以第二时间段内在第二区域内注册的终端总数得到终端注册成功的比率。
步骤504、第一网元根据第一网络性能信息,确定第一策略。
本申请实施例中的第一策略为终端传输上行背景流量(background data,BD)时使用的策略,或者第一策略为业务服务器向终端传输下行背景流量(background data,BD)时使用的策略。本申请实施例中的背景流量也可以称为背景数据。
举例说明一种上行背景流量传场景,比如某车企的车控中心在车辆出厂时,可以在车辆的车载设备上安装用户身份模块(Subscriber Identity Module,SIM)卡,在车辆运行过程中,车载设备可以保存车辆的行驶地图信息、车辆运行状况等信息,然后传输给车控中心,帮助车控中心制作高清地图、实时跟踪发动机引擎运行状况等,这些信息用于下一步分析,例如,自动驾驶规划车辆行驶路线、改良发动机等。
在本申请的实施例中,无论是上行背景流量还是下行背景流量,均指对传输时效性没要求(或者不敏感)的业务数据在传输过程中所产生的流量。或者该背景流量是指对传输时效性没要求,但对资费要求高(或者敏感)的业务数据在传输过程中所产生的流量。或者用于背景流量传输的网络切片没有SLA要求,即只要网络允许传输背景流量即可,没有传输质量(比如传输时延、传输带宽)要求,因此,可以在网络处于空闲态时传输背景流量。
在一种可能的实现方式中,本申请实施例中的第一策略为第三区域的第一策略。该第三区域包括一个或多个第二区域。第三区域的数量为一个或多个。第三区域的第一策略包括一个或者多个背景流量传输策略。
本申请实施例中的背景流量传输策略中包括以下信息中的一个或多个:推荐时间窗、费率、最大聚合比特率。推荐时间窗指网络建议在该第三区域内传输背景流量的时间窗。费率指网络确定的在推荐时间窗内传输背景流量时的费率,比如每兆(MByte,MB)的流量产生的费用。最大聚合比特率表示在该推荐时间窗传输背景流量时的最大带宽。
为了降低背景流量传输产生的资费,本申请实施例中终端可以在网络处于空闲态时传输背景流量,因此,第一网元根据第一网络性能信息,确定第一策略,包括:第一网元根据第一网络性能信息确定第二区域中网络在第二时间段处于空闲态,则第一网元确定第一策略包括的推荐时间窗为第二时间段。此外,如果第二区域中需要传输背景流量的终端数 量为5000个,而第一网元根据第二区域的第一网络性能信息确定第二区域在时间段1内可容纳传输背景流量的数量为4000个,而第二区域在时间段2内可容纳传输背景流量的数量为5500个,则第一网元确定第一策略包括的推荐时间窗为时间段2。
具体的,第一网元通过区域1的第一网络性能信息确定区域1的网络在00:00-01:00的时间段内处于空闲态,即区域1的网络在00:00-01:00的时间段内存在可用于传输背景流量的空闲资源。第一网元便可以将00:00-01:00的时间段作为区域1的背景流量传输策略。第一网元通过区域2的第一网络性能信息确定区域2的网络在01:00-03:00的时间段内处于空闲态,即区域2的网络在01:00-03:00的时间段内存在可用于传输背景流量的空闲资源。第一网元便可以将01:00-03:00的时间段作为区域2的背景流量传输策略。
本申请实施例中同一个区域包括的多个背景流量传输策略不同。以多个背景流量传输策略包括背景流量传输策略1和背景流量传输策略2为例,则背景流量传输策略1中包括的推荐时间窗为时间窗1,背景流量传输策略2中包括的推荐时间窗为时间窗2。
例如,第二区域的第一网络性能信息包括第二区域在时间段1的网络性能信息以及第二区域在时间段2的网络性能信息,则第一网元可以根据第二区域在时间段1的网络性能信息确定第二区域的背景流量传输策略1,第一网元根据第二区域在时间段2的网络性能信息确定第二区域的背景流量传输策略2,这样第一网元便可以确定第三区域的第一策略包括背景流量传输策略1和背景流量传输策略2。
作为一种可能的实现,本申请实施例中第三区域包括一个第二区域可以理解为:第三区域和第二区域为同一个区域,换言之第二区域即为第三区域。这样第一网元将第二区域在第二时间段的第一网络性能信息确定为第三区域的第一网络性能信息。然后第一网元根据第三区域在第二时间段的第一网络性能信息,确定第三区域的第一策略。
作为一种可能的实现,本申请实施例中包括第三区域包括多个第二区域,且该多个第二区域在第二时间段的第一网络性能信息相同。其中,第三区域包括多个第二区域可以理解为:该第三区域由多个第二区域聚合而成。这时,第三区域在第二时间段的第一网络性能信息便可以为该多个区域在第二时间段具有的共同的第一网络性能信息。
举例说明,第一区域包括多个第二区域,第二时间段为时间段2为例,例如,多个第二区域为TA1、TA2以及TA3,其中,TA1在时间段2的第一网络性能信息和TA2在时间段2的第一网络性能信息相同,而TA3在时间段2的第一网络性能信息与TA1在时间段2的第一网络性能信息不同,则TA1和TA2可以聚合得到第三区域(例如,TA12),这时第一网元便可以将TA1在时间段2的第一网络性能信息或TA2在时间段2的第一网络性能信息,确定为TA12的第一网络性能信息。然后第一网元根据TA12的第一网络性能信息确定TA12的第一策略。之后,TA1和TA2中的终端便可以根据TA12的第一策略传输背景流量。此外,第一网元可以将TA3作为第三区域,根据TA3在时间段2的第一网络性能信息确定TA3的第一策略。
举例说明,第一区域包括多个第二区域,例如,多个第二区域为TA1、TA2以及TA3,TA1、TA2以及TA3的第一网络性能信息各不相同,但是TA1的第一网络性能信息为TA1、TA2以及TA3的第一网络性能信息中最低的或者最高的,则第一网元可以使用TA1的第一网络性能信息作为TA2以及TA3的第一网络性能信息,这时,TA1~TA3便具有相同的网络性能信息。
本申请实施例提供一种确定策略的方法,该方法中通过第一网元利用第一请求向数据分析网元请求第一区域在第一时间段内的网络性能信息。之后,数据分析网元根据第一请求向第一网元反馈第一区域包括的一个或多个第二区域中每个第二区域的第一网络性能信息,第一网络性能信息包括在第二时间段内第二区域中的第一信息、或在第二时间段内第二区域中的终端数量,这样便于第一网元根据子区域的第一网络性能信息,确定第一策略,该方案中虽然第一网元向数据分析网元请求一个大范围(例如,第一区域或者第一时间段)内的网络性能信息。但是,数据分析网元向第一网元提供的是第一区域包括的不同区域(例如,一个或多个第二区域)或者第一时间段包括的不同第二时间段(例如,一个或者多个第二时间段)的第一网络性能信息,这样可以辅助第一网元以子区域为粒度,根据子区域的第一网络性能信息,更准确地制定第一策略,可以保障为子区域在子时间段制定的背景流量传输策略符合该子区域在子时间段的需求,解决了部分区域在部分时间段内的网络资源拥塞或者网络资源浪费问题,节省了资源,提高了传输效率。
值得说明的是,如果第一区域包括的多个第二区域中存在部分第二区域的第一网络性能信息相同,而另外一部分第二区域的第一网络性能信息不同,则对于具有相同第一网络性能信息的第二区域,数据分析网元可以向第一网元发送第一网络性能信息,以及与第一网络性能信息关联的部分第二区域的信息,这样第一网元便可以确定部分第二区域具有相同的第一网络性能信息,相比于无论第二区域的第一网络性能信息是否相同,均发送每个第二区域的第一网络性能信息可以节约信令开销。
如果多个子区域可以聚合成第一区域,而第一区域由第一网元划分成多个子区域,则第一请求中的第一区域的信息可以由一个或多个第二区域的信息替代,换言之第一网元向数据分析网元请求第一区域包括的一个或多个子区域中每个子区域的网络性能信息。
如图6所示,图6示出了本申请实施例提供的一种数据分析网元确定第二区域的第一网络性能信息的过程,该方法包括:
步骤601、数据分析网元根据第二区域的信息向NRF网元查询该第二区域内的一个或多个AMF网元的地址信息。
示例性的,数据分析网元向NRF网元发送查询请求消息1,该查询请求消息1包括第二区域的信息。该查询请求消息1用于查询该第二区域内的一个或多个AMF网元的地址信息,或者标识。
步骤602、数据分析网元向NRF网元查询一个或多个AMF网元的第一信息。
示例性的,数据分析网元向NRF网元发送查询请求消息2,该查询请求消息2包括第二区域的信息。该查询请求消息2用于查询该第二区域内的一个或多个AMF网元的第一信息,或者该查询请求消息2包括一个或多个AMF网元的标识。
步骤603、数据分析网元从OAM网元处查询第二区域内的网络中的网元(包括核心网网元(如UPF网元或者AMF网元或者SMF网元)或者接入网网元(如下一代传输节点B(nextGeneration Node B,gNB))在第二时间段或者第一时间段或者其他不同时间段的第一信息。
步骤604、数据分析网元从一个或多个AMF网元处收集在第二区域内的终端的数量。
可以理解的是,在第二区域内的终端的数量可以理解为在访问或接入或注册第二区域的网络的终端的数量。或者在第二区域内的终端的数量可以理解为在指定时间段(例如, 第一时间段或者第二时间段)内访问或接入第二区域的网络的终端的数量。
步骤605、数据分析网元根据网元(包括核心网网元(如UPF网元或者AMF网元或者SMF网元)或者接入网网元(如gNB))在第二时间段的第一信息和/或一个或多个AMF网元上终端的数量,生成第二区域的网络性能信息。
在一种可能的实施例中,本申请实施例提供的方法在步骤501之前还可以包括:第一网元确定需要获取第一区域在第一时间段内的网络性能信息。
在一种可能的实施例中,第一网元确定需要获取第一区域在第一时间段内的网络性能信息,可以通过以下方式实现:第一网元处具有需求信息,该需求信息用于指示需要获取第一区域在第一时间段内的网络性能信息。例如,该需求信息包括第一时间段的信息和第一区域的信息。
在一种可能的实施例中,第一网元确定需要获取第一区域在第一时间段内的网络性能信息,可以通过以下步骤701实现:
在一种可能的实施例中,如图7所示,本申请实施例提供的方法包括步骤701~步骤715。其中,步骤701、请求设备向第一网元发送第二请求,相应的,第一网元接收来自请求设备的第二请求。该第二请求用于请求第一区域对应的背景流量传输策略,第二请求包括第一区域的信息和第一时间段的信息。
在一种可能的实现方式中,第二请求还可以包括第一区域中以下信息中的一个或者多个:终端的数量、每个终端传输的数据大小、请求设备的标识、终端的群组标识。
可以理解的是,终端的群组标识可以是内部群组标识(internal group id),也可以是外部群组标识(external group id)。如果是外部群组标识,请求设备将其发送到NEF网元,由NEF网元将其转换成内部群组标识。终端的群组标识用于确定终端所属的群组。终端所属的群组中包括一个或多个终端。
示例性的,请求设备可以为终端或者AF网元。第二请求中携带第三指示信息,该第三指示信息用于请求第一区域对应的背景流量传输策略。或者,第一区域的信息用于确定第一区域,例如,第一区域的信息可以为第一区域的标识,或者第一区域的信息为第一区域内需要传输背景流量的终端的标识。
可以理解的是,通过步骤701第一网元便可以根据第二请求确定需要获取第一区域在第一时间段内的网络性能信息。
需要说明的是,如果第一区域由第一网元(如PCF网元)或者NEF网元划分,则第二请求中包括的第一区域的信息可以由一个或多个第二区域的信息替代。
需要说明的是,如果第一时间段由第一网元(如PCF网元)或者NEF网元划分,则第二请求中包括的第一时间段的信息可以由一个或多个第二时间段的信息替代。
相应的,步骤501,第一网元向数据分析网元发送的第一请求中可以携带一个或者多个第二区域的信息和/或一个或者多个第二时间段的信息,这样数据分析网元不需要进一步划分子区域和/或子时间段,此外,第一网元可以从数据分析网元或者这些第二区域在第二时间段内的网络性能信息。
步骤702~步骤705、同步骤501~步骤504,此处不再赘述。
在一种可能的实现方式中,如果第一网元为PCF网元,而请求设备为AF网元或者终端,则本申请实施例提供的方法在步骤705之后还可以包括:
步骤706、第一网元向请求设备发送一个或多个第三区域中每个第三区域的第一策略以及以下信息中的一个或多个:每个第三区域的第一策略各自关联的第三区域的信息以及第一策略的标识,相应的,请求设备接收来自第一网元的一个或多个第三区域中每个第三区域的第一策略以及以下信息中的一个或多个:每个第三区域的第一策略各自关联的第三区域的信息以及第一策略的标识。
可以理解的是,步骤706中第一网元向请求设备发送每个第三区域的信息以及每个第三区域各自对应的第一策略。通过执行步骤706便于请求设备确定第一网元为每个第三区域确定的第一策略。
在一种可能的实施例中,待第一网元向请求设备提供一个或多个第三区域中每个第三区域的第一策略之后,如图7所示,本申请实施例提供的方法还可以包括:
步骤707、第一网元确定一个或多个第三区域中任一个第三区域的第一目标背景流量传输策略,第一目标背景流量传输策略为任一个第三区域的一个或者多个背景流量传输策略中的一个。
作为一种可能的实现,本申请实施例中的步骤707可以通过以下方式实现:任一个第三区域的第一策略包括一个背景流量传输策略,则第一网元确定一个背景流量传输策略为任一个第三区域的第一目标背景流量传输策略。
作为一种可能的实现,本申请实施例中的步骤707可以通过以下方式实现:第三区域的第一策略包括多个背景流量传输策略,第一网元从请求设备处接收第一目标背景流量传输策略。换言之,当第三区域的第一策略包括多个背景流量传输策略时,第一目标背景流量传输策略由请求设备选择。
步骤708、第一网元向网络存储网元发送第一目标背景流量传输策略以及以下信息中的一个或多个:第一目标背景流量传输策略的标识或第一目标背景流量传输策略关联的第三区域的信息。相应的,网络存储网元接收来自第一网元的第一目标背景流量传输策略以及以下信息中的一个或多个:第一目标背景流量传输策略的标识或第一目标背景流量传输策略关联的第三区域的信息。
在一种可能的实现方式中,如果请求设备为AF网元,则请求设备确定第一目标流量传输策略之后,请求设备可以向第三区域中的一个或多个终端发送该第一目标流量传输策略,以便于第三区域中的一个或多个终端以该第一目标流量传输策略传输背景流量。或者,请求设备根据第一目标背景流量传输策略的标识和/或第三区域的信息通过第一网元向网络存储网元取出第一目标背景流量传输策略,然后第一网元通过UE路由选择策略(UE route selectionpolicy,URSP)将该第一目标传输策略发送给终端。
可以理解的是,如果第三区域的数量为多个,则第一网元在网络存储网元中存储每个第三区域的第一目标背景流量传输策略。本申请实施例中第一网元通过将任一个第三区域的第一目标背景流量传输策略存储在网络存储网元中,便于后续从网络存储网元中查询任一个第三区域的第一目标背景流量传输策略。例如,对于新加入第三区域的终端A,第一网元可以根据第一目标背景流量传输策略的标识和/或第三区域的信息从网络存储网元中获取第三区域的第一目标背景流量传输策略。然后第一网元将第三区域的第一目标背景流量传输策略反馈给终端A。
在一种可能的实施例中,如图7所示,本申请实施例提供的方法还可以包括:
步骤709、数据分析网元向第一网元发送第二区域的第二网络性能信息,相应的,第一网元从数据分析网元接收第二区域的第二网络性能信息。该第二网络性能信息为第二区域更新后的网络性能信息。
在一种可能的实现方式中,第二网络性能信息为第二区域相对于第一网络性能信息更新后的网络性能信息。其中,更新后的网络性能信息包括升级后的网络性能信息或者降级后的网络性能信息。
比如,本申请实施例中第二网络性能信息反映的第二区域的网络性能低于第一网络性能信息反映的第二区域的网络性能,换言之,第二网络性能信息相比于第一网络性能信息为降级后的网络性能信息。例如,第一网络性能信息反映的第二区域的网络在第二时间段内的gNB或者UPF网元的平均负载(或者资源使用率,其中资源为内存或者CPU或者硬盘或者物理资源块(physical resource block,PRB))为80%,而第二网络性能信息反映的第二区域的网络在第二时间段内的gNB或者UPF的平均负载(或者资源使用率,其中资源为内存或者CPU或者硬盘或者PRB)为90%。或者第一网络性能信息反映的第二区域的网络在第二时间段内终端数量为500个,而第二网络性能信息反映的第二区域的网络在第二时间段内终端数量为800个。
可以理解的是,步骤709中的第二区域为一个或多个第二区域中网络性能信息发生变化的区域。
在一种可能的实现方式中,第二网络性能信息为第二区域相对于第一网络性能信息在第三时间段更新后的网络性能信息,其中第三时间段可以不是第一时间段的子时间段,或者不在第一时间段的范围内。
步骤710、第一网元根据第二网络性能信息,确定第三区域的第二策略,该第三区域的第二策略包括一个或者多个背景流量传输策略。
可以理解的是,第三区域的第二策略为第三区域更新后的策略。
值得注意的是,如果第三区域是由多个第二区域聚合得到的,但是多个第二区域中仅存在部分第二区域的网络性能信息发生降级,那么第一网元需要对一个或者第三区域重新进行聚合得到第四区域,那么第一网元根据第二网络性能信息,确定第四区域的第二策略,该第四区域的第二策略包括一个或者多个背景流量传输策略。在这种情况下,步骤711~步骤715中的第三区域可以换为第四区域,下面不再赘述。或者,第一网元根据部分第二区域的网络性能信息,确定部分第二区域更新后的一个或者多个背景流量传输策略,其余未发生网络性能信息变化的区域的背景流量传输策略不发生变化。
举例说明,聚合TA由TA1、TA2聚合得到,如果聚合TA的一个或者多个背景流量传输策略包括BDT1以及BDT2,后续若TA2的网络性能信息发生降级,则第一网元根据TA2更新后的网络性能信息,确定TA2的BDT策略为BDT3和BDT4,而TA1的BDT策略依旧为BDT1以及BDT2,这是由于TA1的网络性能信息未发生变化,因此可以将其所属的聚合TA的BDT策略确定为TA1的BDT策略。或者,若TA2的网络性能信息发生降级,则第一网元根据TA2更新后的网络性能信息,确定TA1的网络性能信息与TA2更新后的网络性能信息相同,这时依旧可以将TA1和TA2聚合,得到聚合TA。然后根据TA2更新后的网络性能信息确定聚合TA的BDT策略。
上述举例描述的是,某个聚合TA包括的子TA发生网络性能信息降低的情况时,仅更 新聚合TA或者子TA的BDT策略的方式,换言之,第一网元不更新其他聚合TA的BDT策略。当然,当某个聚合TA包括的子TA发生网络性能信息降低的情况时,第一网元也可以对全部聚合TA进行重新聚合,以确定重新聚合后的每个聚合TA更新后的BDT策略。
在一种可能的实现方式中,本申请实施例提供的方法还包括:若第一网元根据第二网络性能信息,确定第三区域的第一策略不可用,但是又无法根据第二网络性能信息确定第三区域的第二策略,则第一网元可以不删除网络存储网元中存储的第三区域的第一策略,换句话说,第一网元需要保留在网络存储网元中存储的第三区域的第一策略。这样,在第一网元无法确定第三区域的第二策略情况下,第三区域的第一策略仍然可用。
在一种可能的实施例中,在第一网元可以根据第二网络性能信息确定第三区域的第二策略的情况下,参考图7,本申请实施例提供的方法在步骤710之后还可以包括:
步骤711、第一网元向请求设备发送第三区域的第二策略,以及时间信息。相应的,请求设备接收来自第一网元的第三区域的第二策略,以及时间信息。或者,第一网元向请求设备发送第三区域的第二策略时,第一网元设置该时间信息,相应的,请求设备接收来自第一网元的第三区域的第二策略。该时间信息(如定时器或者时间窗)用于表示请求设备针对第三区域的第二策略的最大响应时间。
作为一种可能的实现方式,第三区域的第二策略,以及时间信息可以携带在同一个消息中,也可以携带在不同的消息中。本申请实施例中如果第一网元和请求设备提前协商最大响应时间,或者协议预定义了最大响应时间,则步骤711中的时间信息可以省略。
在一种可能的实施例中,如图7所示,本申请实施例提供的方法还可以包括步骤712~步骤713:
其中,步骤712、在最大响应时间内,第一网元接收到请求设备反馈的第二目标背景流量传输策略,该第二目标背景流量传输策略为第二策略包括的多个背景流量传输策略中的一个。
例如,在最大响应时间内,第一网元接收到请求设备反馈的确认消息,该确认消息用于表示请求设备从第二策略包括的多个背景流量传输策略中选择第二目标背景流量传输策略。
步骤713、第一网元向网络存储网元发送第二目标背景流量传输策略以及以下信息中的一个或多个:第二目标背景流量传输策略的标识或第三区域的信息。
可以理解的是,通过步骤713,第一网元可以通过第二目标背景流量传输策略的标识或第三区域的信息将第二目标背景流量传输策略更新到(或者覆盖到)第一目标背景流量传输策略。
在一种可能的实施例中,如图7所示,本申请实施例提供的方法还可以包括步骤714以及步骤715。其中,步骤714、第一网元确定删除第三区域的第一目标背景流量传输策略。
在一种可能的实现方式中,本申请实施例中的步骤714可以通过以下方式实现:在最大响应时间内,第一网元未从请求设备接收到请求设备从第二策略包括的多个背景流量传输策略中选择的第二目标背景流量传输策略,则第一网元确定删除第三区域的第一目标背景流量传输策略。
在另一种可能的实现方式中,本申请实施例中的步骤714可以通过以下方式实现:请求设备向第一网元发送第一指示信息,该第一指示信息用于表示请求设备未从第二策略包 括的多个背景流量传输策略中选择目标背景流量传输策略,相应的,如果第一网元接收到来自请求设备的第一指示信息,则第一网元根据第一指示信息确定删除第三区域的第一目标背景流量传输策略。
作为一种可能的实现方式中,上述第一指示信息由请求设备在最大响应时间内向第一网元发送,换言之,如果第一网元在最大响应时间内接收到来自请求设备的第一指示信息,则第一网元根据第一指示信息确定删除第三区域的第一目标背景流量传输策略。应理解,如果第一网元向请求设备发送第三区域的第二策略时,未向请求设备发送时间信息,则请求设备便无需在最大响应时间内做出针对第三区域的第二策略的反馈。
在一种可能的实现方式中,第一网元确定删除第三区域的第一目标背景流量传输策略,包括:在第一网元向请求设备发送第三区域的第二策略之后,如果第一网元确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略,则第一网元确定删除第三区域的第一目标背景流量传输策略。
例如,第一网元确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略,包括:第一网元确定未接收到请求设备从第三区域的第二策略中选择目标背景流量传输策略的反馈,则第一网元确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略。或者,第一网元根据第一指示信息确定请求设备未从第三区域的第二策略中选择目标背景流量传输策略。
在一种可能的实现方式中,如果在步骤709中第二区域中更新后的第二网络性能信息为第二区域相对于第一网络性能信息在第三时间段更新后的网络性能信息,其中第三时间段可以不是第一时间段的子时间段,或者不在第一时间段的范围内,那么步骤710第一网元确定的第三区域中的第二策略中的一个或者多个背景流量传输策略中的推荐传输时间窗可能不是第一时间段的子时间段或者不在第一时间段的范围内,进而在请求设备可以不从第三区域的第二策略中选择第二目标背景流量传输策略,从而该请求设备发送上述第一指示信息或者在最大响应时间段内不向第一网元发送第二目标背景流量传输策略。
步骤715、第一网元向网络存储网元发送第一删除消息,相应的,网络存储网元接收来自第一网元的第一删除消息。
该第一删除消息用于通知网络存储网元删除第三区域的第一目标背景流量传输策略。
示例性的,第一删除消息可以包括第四指示信息,该第四指示信息用于通知网络存储网元删除第三区域的第一目标背景流量传输策略。例如,第一删除消息中还可以携带第一目标背景流量传输策略的标识,或者第三区域的信息。
应理解,在网络存储网元接收到第一删除消息之后,网络存储网元便可以删除第三区域的第一目标背景流量传输策略。需要说明的是,如果网络存储网元为第一网元内部的存储设备,则删除第三区域的第一目标背景流量传输策略的动作可以由第一网元执行。
如图8所示,图8以请求设备为AF网元,数据分析网元为NWDAF网元,第一网元为PCF网元,网络存储网元为UDR网元,第一区域为网络区域1,第二区域为子区域1~子区域N中的任一个或多个,换言之子区域的数量为N个为例,具体描述了一种确定背景流量传输策略的方法,该方法包括:
步骤801、AF网元向NEF网元发送背景流量传输策略协商建立请求(Nnef_BDTPNegotiation_Create Request)服务。相应的,NEF网元接收来自AF网元的 Nnef_BDTPNegotiation_Create Request服务。
其中,Nnef_BDTPNegotiation_Create Request服务表示AF网元可以通过与NEF网元之间的接口触发到NEF网元的BDTPNegotiation_Create Request服务操作(service operation),换言之,本申请实施例中可以将AF网元通过其与NEF网元之间的接口触发到NEF网元的BDTPNegotiation_Create Request服务描述为:Nnef_BDTPNegotiation_Create Request服务操作。其他网元之间交互的各种服务可以参考此处的描述,后续不再赘述。
其中,该BDTPNegotiation_Create Request服务用于请求背景流量传输策略(Background Data Transfer Policy),BDTPNegotiation_Create Request服务中携带背景流量传输需求信息。背景流量传输需求信息用于表示AF网元期待的背景流量传输策略。
可以理解的是,BDTPNegotiation_Create Request服务为AF网元向NEF网元发送背景流量传输需求信息的一种形式,当然背景流量传输需求信息也可以携带在Nnef_Trigger_De livery request服务或者AF网元和NEF网元之间交互的其他信息中,本申请实施例对此不做限定。
例如,背景流量传输需求信息的内容如表1所示:
表1背景流量传输需求信息
Figure PCTCN2021086727-appb-000001
可选的,BDTPNegotiation_Create Request服务中还携带指示信息x(对应上述第三指示信息),该指示信息x用于表示请求背景流量传输策略。
可以理解的是,NEF网元是一种网络开放功能网元的举例,步骤801和步骤802中的NEF网元还可以用其他网络功能开放网元替换,本申请实施例对此不作限定。
步骤802、NEF网元向PCF网元发送背景流量传输策略控制建立请求(Npcf_BDTPolicyControl_Create Request)服务,相应的,PCF网元接收来自NEF网元的Npcf_BDTPolicyControl_Create Request服务。
其中,背景流量传输策略控制建立请求服务中携带BDTPNegotiation_Create Request服务。
需要说明的是,如果AF网元未向PCF网元发送network area information,则表示AF网元向PCF网元请求全网的背景流量传输策略,即表示AF网元向PCF网元请求整个运营商网络中所有该AF网元服务的网络区域对应的背景流量传输策略。如果AF网元向PCF网元提供 了network area information,则表示AF网元向PCF网元请求该network area information确定的网络区域1内的背景流量传输策略。
可以理解的是,上述步骤以AF网元向PCF网元发送背景流量传输需求信息由NEF网元中转为例,当然AF网元也可以通过与PCF网元之间的接口向PCF网元发送背景流量传输需求信息。
步骤803、如果PCF网元本地没有ASP ID对应的背景流量传输策略,则PCF网元从UDR网元处获取ASP ID对应的背景流量传输策略。
可以理解的是,这里主要是从PCF网元根据ASP ID向UDR网元取出历史的背景流量传输策略,便于PCF网元根据第一网络性能信息确定这些历史背景流量传输策略是否还有效。换句话说,这里取出的背景流量传输策略可以作为步骤808制定一个或者多个背景流量传输策略的输入。
作为一种示例,PCF网元从UDR网元处获取ASP ID对应的背景流量传输策略,可以通过以下方式实现:PCF网元触发到UDR网元的数据管理查询请求(Nudr_DM_Query Request)服务操作,相应的,UDR网元接收来自PCF网元的Nudr_DM_Query Request服务操作。其中,Nudr_DM_Query Request服务用于请求ASP ID对应的背景流量传输策略。例如,Nudr_DM_Query Request服务中携带来自AF网元的ASP Identifier。之后,UDR网元向PCF网元发送数据管理查询响应(Nudr_DM_Query Response)服务,相应的,PCF网元接收来自UDR网元的数据管理查询响应。其中,数据管理查询响应中包括ASP ID对应的服务器正在使用的背景流量传输策略(Background Data Transfer Policy)。
需要说明的是,如果PCF网元具有ASP ID对应的背景流量传输策略,则步骤803可以省略。
步骤804、PCF网元向NWDAF网元发送用于请求网络性能数据分析结果(Network Performance Analytics)的消息。相应的,NWDAF网元接收来自PCF网元的用于请求网络性能数据分析结果的消息。
例如,用于请求网络性能数据分析结果的消息可以为数据分析开放订阅(Nnwdaf_AnalyticsExposure_Subscribe)服务,或者用于请求网络性能数据分析结果的消息可以为Npcf_PolicyAuthorization_Create Request服务。
其中,用于请求网络性能数据分析结果的消息中携带分析标识(Analytics ID),分析过滤器(Analytics Filter),期待的时间窗以及目标分析报告(Target ofAnalytics Reporting)。
例如,Analytics ID用于表示PCF网元请求的内容为网络性能(Network Performance)信息,Analytics Filter=网络区域(Network Area)1,目标分析报告为接入或访问网络区域1中的一个或多个终端的信息。
可以理解的是,用于请求网络性能数据分析结果的消息用于PCF网元向NWDAF网元请求在期待的时间窗内的NetworkArea1对应的网络性能数据分析结果。
例如,用于请求网络性能数据分析结果的消息中还可以携带指示信息y,该指示信息y(对应上述实施例中的第二指示信息)用于表示请求网络性能数据分析结果。
步骤805、NWDAF网元根据期待的时间窗以及PCF网元请求的网络区域1,收集网络区域1(包括的N个子区域)的数据。
具体的,NWDAF网元从OAM网元、NRF网元以及AMF网元上获取N个子区域中每个 子区域在期待的时间窗包括的子时间段中的数据。
例如,NWDAF网元在步骤805中收集到的数据如表2所示:
表2用于网络性能分析的输入数据
Figure PCTCN2021086727-appb-000002
步骤806、NWDAF网元根据步骤805收集的数据,生成网络性能数据分析结果。
例如,网络性能数据分析结果如下表3所示:
表3网络性能数据分析结果
Figure PCTCN2021086727-appb-000003
可以理解的是,本申请实施例的步骤806中,NWDAF网元将网络区域1划分为N个子区域(例如,子区域1…子区域N)。然后NWDAF网元确定N个子区域中每个子区域的网络在不同时间段的网络性能分析结果(Network Performance Analytics)(包括基站的状态信息(gNB status information)、基站的资源使用率(gNB resource usage)、网元的负载(NF Load)、终端数量(Number ofUEs)、通信性能(Communication Performance)以及移动性能(Mobility performance))、每个子区域(per Area Subset)的信息和每个子区域的终端的数量(Number of UE per Area Subset)。
可以理解的是,网络性能数据分析结果中包括子区域1…子区域N中每个子区域的网络在时间段1内的网络性能信息1。
步骤807、NWDAF网元向PCF网元发送网络性能数据分析结果。相应的,PCF网元接收来自NWDAF网元的网络性能数据分析结果。
具体的,NWDAF网元触发到PCF网元的Nnwdaf_AnalyticsSubscription_Notify服务操作, 其中,Nnwdaf_AnalyticsSubscription_Notify中携带子区域1…子区域N中每个子区域的网络在时间段1内的网络性能信息1。
举例说明,时间段1为期待的时间窗的子时间段,例如,期待的时间窗为2019年4月1日~2019年4月30日,则时间段1可以为2019年4月1日~2019年4月30日中每一天的晚上11:00~第二天的早上7:00。
需要说明的是,N个子区域中可能存在部分子区域对应的时间段1不同,也可能存在另一部分子区域对应的时间段1相同。例如,子区域1的时间段1可以为2019年4月1日~2019年4月3日中每一天的晚上11:00~第二天的早上7:00。子区域2的时间段1可以为2019年4月2日~2019年4月4日中每一天的晚上11:00~第二天的早上7:00。N个子区域中不同子区域对应的时间段1也可以相同,例如,NWDAF网元向PCF网元1提供子区域1~子区域N中每个子区域的网络在2019年4月1日~2019年4月30日中每一天的晚上11:00~第二天的早上7:00之间的网络性能分析结果。
当然,时间段1的数量也可以是一个或多个,该一个或多个时间段1可以是连续的,也可以是非连续的。例如,NWDAF网元向PCF网元1提供子区域1的网络在2019年4月1日~2019年4月15日中每一天的晚上11:00~第二天的早上7:00之间的网络性能分析结果,以及子区域1的网络在2019年4月1日~2019年4月30日之间每个节假日的网络性能分析结果。
步骤808、PCF网元根据子区域1…子区域N中每个子区域在时间段1内的网络性能信息1,确定每个子区域各自的一个或者多个BDT策略。
作为一种可能的实现,本申请实施例中的每个子区域在时间段1内的网络性能信息1可以为NWDAF网元分析得到的。另一种可能的实现:PCF网元从N个子区域的网络性能信息1中确定目标网络性能信息,PCF网元将目标网络性能信息确定为N个子区域的网络性能信息1。其中,目标网络性能信息可以为N个子区域的网络性能信息1中最差的网络性能信息。
作为一种示例,本申请实施例中的步骤808可以通过以下方式实现:PCF网元根据子区域1在时间段1内的网络性能信息1,确定子区域1的一个或者多个BDT策略。PCF网元确定子区域1…子区域N中其他子区域的一个或者多个BDT策略的方式可以参考PCF网元确定子区域1的一个或者多个BDT策略的方式,此处不再赘述。
可以理解的是,子区域1…子区域N中不同子区域的一个或者多个BDT策略的数量可以相同,也可以不同,本申请实施例对此不作限定。
示例性的,每个子区域各自的一个或者多个BDT策略的内容可以如表4所示:
表4 BDT策略
Figure PCTCN2021086727-appb-000004
Figure PCTCN2021086727-appb-000005
可以理解的是,步骤808中,PCF网元按照第一子区域在不同时间段的网络性能信息1确定第一子区域的一个或多个BDT策略。PCF网元为第一子区域的一个或多个BDT策略中每个BDT策略分配一个BDT Reference ID。本申请实施例中的第一子区域为一个或多个子区域中的任一个,并不具有任何指示性含义。
需要说明的是,不同子区域的一个或多个BDT策略不同,同一个子区域的多个BDT策略也可以不同。例如,以子区域1的多个BDT策略为BDT策略1和BDT策略2为例,BDT策略1包括的推荐时间窗为时间窗1,而BDT策略2包括的推荐时间窗为时间窗2。或者,BDT策略1包括的推荐时间窗为时间窗1,最大聚合比特率为X,费率为N,BDT策略2包括的推荐时间窗为时间窗1,最大聚合比特率为Y,费率为M,其中,X大于Y,N大于M。
步骤809、PCF网元向AF网元发送第二信息,相应的,AF网元接收来自PCF网元的第二信息。
其中,第二信息可以包括<子区域1,一个或多个BDT策略,一个或多个BDT策略中每个BDT策略的BDT Reference ID>、<子区域2,一个或多个BDT策略,一个或多个BDT策略中每个BDT策略的BDT Reference ID>、…、<子区域N,一个或多个BDT策略,一个或多个BDT策略中每个BDT策略的BDT Reference ID>。
例如,第二信息可以携带在背景流量传输策略协商建立响应(BDTPNegotiation_Create Response)服务中,该BDTPNegotiation_Create Response服务可以由PCF网元通过NEF网元发送给AF网元。例如,PCF网元向NEF网元发送背景流量传输策略控制建立响应(Npcf_BDTPolicyControl_Create response)服务。其中,Npcf_BDTPolicyControl_Create response服务中携带BDTPNegotiation_Create Response服务,然后NEF网元向AF网元发送Nnef_BDTPNegotiation_Create Response服务。
另外,不同子区域的一个或多个BDT策略、每个BDT策略的BDT Reference ID以及该子区域的信息可以携带在同一个消息中,当然,不同子区域的一个或多个BDT策略、每个BDT策略的BDT Reference ID以及该子区域的信息可以携带在不同的消息中。
步骤810、AF网元根据子区域1…子区域N中每个子区域的一个或多个BDT策略,确定每个子区域各自的目标BDT策略1。
子区域的目标BDT策略1即为接入或访问该子区域的终端传输背景流量时使用的策略。
步骤811、AF网元向PCF网元发送每个子区域各自的目标BDT策略1,相应的,PCF网元接收来自AF网元的每个子区域各自的目标BDT策略1。
一方面,如果PCF网元向AF网元提供的每个子区域的BDT策略的数量为1个,则步骤811可以省略,相应的,AF网元将每个子区域的一个BDT策略,确定为每个子区域各自的目标BDT策略1。
另一方面,如果PCF网元向AF网元提供的每个子区域的BDT策略的数量为多个,换言之每个子区域包括多个BDT策略,则AF网元可以从第一子区域的多个BDT策略中选择一个 BDT策略作为该第一子区域的目标BDT策略1。
作为一种具体的实现,本申请实施例中的AF网元可以在PCF网元的触发下,决定向PCF网元发送每个子区域各自的目标BDT策略1。例如,PCF网元向AF网元发送背景流量传输策略协商更新请求(Nnef_BDTPNegotiation_update Request)服务。其中,背景流量传输策略协商更新请求用于指示AF网元向PCF网元反馈每个子区域各自的目标BDT策略1。
作为一种可能的实现方式,PCF网元向AF网元发送背景流量传输策略协商更新请求服务可以通过以下方式实现:PCF网元触发到NEF网元的背景流量传输策略控制更新请求(Npcf_BDTPolicyControl_update request)服务,该Npcf_BDTPolicyControl_update request服务中携带BDTPNegotiation_update Request服务。之后,NEF网元利用NEF网元与AF网元之间的接口触发到AF网元的Nnef_BDTPNegotiation_update Request服务。可选的,Nnef_BDTPNegotiation_update Request服务中可以携带指示信息y,该指示信息y用于指示AF网元向PCF网元反馈每个子区域各自的目标BDT策略1。
需要说明的是,如果PCF网元向AF网元发送第一信息时,还向AF网元发送了指示信息y,则PCF网元向NEF网元发送Npcf_BDTPolicyControl_update request服务以及NEF网元向AF网元发送Nnef_BDTPNegotiation_update Request服务的过程便可以省略。
另一种具体的实现,本申请实施例中的AF网元可以与PCF网元提前协商,如果PCF网元反馈的是每个子区域的多个BDT策略,则AF网元需要反馈其所选择的目标BDT策略1。
作为一种具体的实现,本申请实施例中的步骤811可以通过以下方式实现:AF网元向PCF网元发送背景流量传输策略协商更新响应(BDTPNegotiation_update response)服务。该背景流量传输策略协商更新响应服务中携带每个子区域各自的目标BDT策略1。具体的,AF网元利用AF网元与NEF网元之间的接口触发到NEF网元的Nnef_BDTPNegotiation_update response服务,然后NEF网元利用与PCF网元之间的接口触发到PCF网元的背景流量传输策略更新响应(Npcf_BDTPolicyControl_update response)服务,该Npcf_BDTPolicyControl_update response服务中携带BDTPNegotiation_update response。
注意,步骤811中AF网元向PCF网元发送的每个子区域的目标BDT策略1的格式如表5所示,每个BDT Reference ID对应一套选中的目标BDT策略1:
表5
Figure PCTCN2021086727-appb-000006
可以理解的是,AF网元可以向PCF网元发送一个或多个背景流量传输标识,这样便于PCF网元根据一个或多个背景流量传输标识确定每个子区域的目标背景流量传输策略。另 一方,AF网元不仅向PCF网元发送一个或多个背景流量传输标识,还向PCF网元发送每个子区域的目标背景流量传输策略的内容。
可以理解的是,目标背景流量传输策略即为PCF网元和AF网元协商好的每个区域内的终端传输背景流量使用的策略。
可以理解的是,PCF网元和AF网元协商好目标背景流量传输策略之后,AF网元便可以向第一子区域中的终端发送第一子区域的目标背景流量传输策略,以便于第一子区域中的终端根据第一子区域的目标背景流量传输策略传输背景流量。或者,AF网元根据目标背景流量传输策略的标识或者第三区域通过PCF网元向UDR网元取出对应的BDT策略,然后PCF网元通过用户设备路由选择策略(user equipment routing selection policy,URSP)将BDT策略发送给终端。或者,PCF根据目标背景流量传输策略的标识或者第三区域从UDR网元取出对应的BDT策略,然后PCF网元通过URSP将BDT策略发送给终端。
步骤812、PCF网元向UDR网元发送一个或多个目标背景流量传输策略1,以及一个或多个目标背景流量传输策略中每个目标背景流量传输策略对应的区域的信息或者每个目标背景流量传输策略1的背景流量传输标识。相应的,UDR网元接收来自PCF网元的一个或多个目标背景流量传输策略1,以及一个或多个目标背景流量传输策略1中每个目标背景流量传输策略1对应的子区域的信息或者每个目标背景流量传输策略1对应的背景流量传输标识。
步骤813、UDR网元存储一个或多个目标背景流量传输策略1,以及每个目标背景流量传输策略1对应的子区域的信息或者每个目标背景流量传输策略对应的背景流量传输标识。
可以理解的是,UDR网元中存储一个或多个目标背景流量传输策略1,与每个目标背景流量传输策略1关联的子区域的信息,以及每个目标背景流量传输策略1关联的背景流量传输标识。
具体的,如表6所示,UDR网元可以参考如表6所示的存储格式存储一个或多个目标背景流量传输策略。
表6
Figure PCTCN2021086727-appb-000007
作为一种可能的实现,本申请实施例中的UDR存储一个或多个目标背景流量传输策略,以及一个或多个目标背景流量传输策略中每个目标背景流量传输策略对应的区域的信息或者每个目标背景流量传输策略对应的背景流量传输标识之后,还可以向 PCF网元发送响应消息,用于表示已成功存储一个或多个目标背景流量传输策略,以及一个或多个目标背景流量传输策略中每个目标背景流量传输策略对应的区域的信息或者每个目标背景流量传输策略对应的背景流量传输标识。
由于一个子区域的网络性能信息并非一直不变,而是随着接入该子区域的终端数量发生变化,因此,在一个子区域的网络性能信息由网络性能信息1变化为网络性能信息2时,为了使得该子区域的背景流量传输策略适应该子区域的网络性能信息,PCF网元可以更新该子区域的一个或多个背景流量传输策略。基于此,在一种可能的实施例中,本申请实施例提供的方法在步骤813之后,还可以包括:
步骤814、NWDAF网元向PCF网元发送一个或多个子区域中第一子区域的网络性能信息2,相应的,PCF网元接收来自NWDAF网元的该任一个子区域的网络性能信息2。
作为一种具体实现,本申请实施例中NWDAF网元可以在发现一个或多个子区域中第一子区域的网络性能信息发生变化时主动向PCF网元发送该第一子区域的网络性能信息2。作为另一种具体实现,本申请实施例中NWDAF网元可以在PCF网元的请求下向PCF网元发送该第一子区域的网络性能信息2。作为再一种具体实现,本申请实施例中PCF网元可以向NWDAF网元发送订阅请求,该订阅请求用于订阅一个或多个子区域中每个子区域变化后的网络性能信息2,这样一旦NWDAF网元确定第一子区域的网络性能信息发生变化,便可以及时向PCF网元反馈该第一子区域的网络性能信息2。
作为一种可能的实现,本申请实施例中的步骤814可以通过以下方式实现:NWDAF网元向PCF网元发送分析订阅通知(Nnwdaf_AnalyticsSubscription_Notify)服务,其中,分析订阅通知服务中包括第一子区域的信息以及该第一子区域的网络性能信息2。
可以理解的是,该第一子区域可以代表一个或多个子区域。
其中,第一子区域的网络性能信息2相对于该第一子区域的网络性能信息第一性能信息降级后的。
步骤815、PCF网元根据第一子区域的信息从UDR网元处获取第一子区域的目标BDT策略1。如步骤803所述,PCF网元从UDR网元取出历史目标BDT策略的作用是作为生成新的BDT策略的输入,比如确定这些BDT策略是否已经失效。
例如,PCF网元向UDR网元发送Nudr_DM_Query Request服务,该Nudr_DM_Query Request中包括第一子区域的信息或者第一子区域的目标BDT策略1的背景流量传输标识。UDR网元向Nudr_DM_Query response服务,该Nudr_DM_Query response服务中包括第一子区域的目标BDT策略1。
可选的,PCF网元处具有第一子区域的目标BDT策略1的背景流量传输标识与第一子区域之间的映射关系,PCF可以根据第一子区域的信息得到第一子区域的目标BDT策略1的背景流量传输标识,进而可以通过第一子区域的目标BDT策略1的背景流量传输标识从UDR网元处获取第一子区域的目标BDT策略1。
步骤816、PCF网元根据第一子区域的网络性能信息2,确定第一子区域更新后的一个或多个BDT策略。
本申请实施例中NWDAF网元向PCF网元发送第一子区域的网络性能信息2时,可以向PCF网元指示该第一子区域的网络性能信息降级。或者PCF网元根据第一子区域的网络性能信息2和第一子区域的网络性能信息1确定该第一子区域的网络性能信息降级。 或者PCF网元根据第一子区域的网络性能信息2确定第一子区域的目标BDT策略1需要更新,因此执行步骤816。
在一种可能的实现方式中,若PCF网元根据第一子区域的网络性能信息2,确定第一子区域的目标BDT策略1不可用,但是无法根据第一子区域的网络性能信息2确定第一子区域更新后的一个或多个BDT策略,则PCF网元不可以删除UDR网元中存储的第一子区域的目标BDT策略1,换句话说,PCF网元需要保留UDR网元中存储的第一子区域的目标BDT策略1。这样,在PCF网元无法确定第一子区域更新后的一个或多个BDT策略情况下,第一子区域的目标BDT策略1仍然可用。
步骤817、PCF网元向AF网元发送第一子区域更新后的一个或多个BDT策略以及时间信息,AF网元接收来自PCF网元的第一子区域更新后的一个或多个BDT策略以及时间信息。或者,PCF网元向AF网元发送第一子区域更新后的一个或多个BDT策略时,PCF网元设置该时间信息,相应的,AF网元接收来自PCF网元的第一子区域更新后的一个或多个BDT策略。该时间信息(如定时器或者时间窗)用于表示AF网元针对第一子区域更新后的一个或多个BDT策略的最大响应时间。
步骤818、在最大响应时间内,PCF网元接收到AF网元从第一子区域更新后的一个或多个BDT策略中选择的目标BDT策略2,则PCF网元向UDR网元发送目标BDT策略2以及第一子区域的信息或者目标BDT策略2的背景流量传输标识。
可以理解的是,通过步骤818,PCF网元可以通过第一子区域的信息或者目标BDT策略1的背景流量传输标识将目标BDT策略2更新到(或者覆盖到)目标BDT策略1。
步骤819、在最大响应时间内,PCF网元未接收到AF网元从第一子区域更新后的一个或多个BDT策略中选择的目标BDT策略2,则PCF网元向UDR网元发送第一删除消息,该第一删除消息用于通知UDR网元删除第一子区域的目标背景流量传输策略1。
需要说明的是,在BDT策略更新阶段,无论第一子区域更新后的BDT策略的数量为一个还是多个,PCF网元均将更新后的一个或多个BDT策略发送给AF网元,并发送时间信息,或者PCF网元在本地设置定时器,这样如果PCF网元在最大响应时间内接收到来自AF网元的反馈的目标背景流量传输策略2,则表示AF同意使用目标背景流量传输策略2传输背景流量,这样PCF网元再更新UDR网元中第一子区域的目标BDT策略,避免了未经AF网元同意便贸然传输第一子区域的目标BDT策略1,导致的系统异常。
在一种可能的实现方式中,本申请实施例中的步骤819可以通过以下方式替换:PCF网元确定删除第一子区域的目标BDT策略1,PCF网元向UDR网元发送第一删除消息。
例如,PCF网元确定删除第一子区域的目标BDT策略1包括:在PCF网元向AF网元发送第一子区域更新后的一个或多个BDT策略之后,如果PCF网元确定AF网元未从第一子区域更新后的一个或多个BDT策略中选择目标BDT策略2,则第一网元确定删除第一子区域的目标BDT策略1。
例如,PCF网元确定AF网元未从第一子区域更新后的一个或多个BDT策略中选择目标BDT策略2,包括:PCF网元确定未接收到AF网元从第一子区域更新后的一个或多个BDT策略中选择目标BDT策略2的反馈,则PCF网元确定AF网元未从第一子区域更新后的一个或多个BDT策略中选择目标BDT策略2。或者,PCF网元接收来自AF网元的指示信息a(对应上述第一指示信息),PCF网元根据指示信息a确定AF网元未从第一子区域 更新后的一个或多个BDT策略中选择目标BDT策略2。指示信息a用于表示AF网元未从第一子区域更新后的一个或多个BDT策略中选择目标BDT策略2。
在一种可能的实现方式中,如果在步骤814中一个或多个子区域中第一子区域的网络性能信息2为一个或多个子区域中第一子区域的网络性能信息1在时间段2更新后的网络性能信息,其中时间段2可以不是期待的时间窗的子时间段,或者不在期待的时间窗的范围内,那么步骤816PCF网元根据第一子区域的网络性能信息2,确定第一子区域更新后的一个或多个BDT策略中的推荐的传输时间段可能不是期待的时间窗的子时间段,或者不在期待的时间窗的范围内,进而在AF网元可以不从第一子区域更新后的一个或多个BDT策略中选择目标BDT策略2,从而该AF网元发送上述指示信息a或者在最大响应时间段内不能向PCF网元发送目标BDT策略2。
步骤820、若PCF网元发现第一区域中部分终端已使用目标背景流量传输策略1传输背景流量,于是PCF网元通过URSP将目标背景流量传输策略2发送给第一区域中部分终端。
图8所示的实施例中期待的时间窗对应上述实施例中的第一时间段,时间段1对应上述实施例中的第二时间段,第一子区域对应上述实施例中发生网络性能信息变化的第二区域。网络性能信息2对应上述实施例中的第二网络性能信息。网络性能信息1对应上述实施例中的第一网络性能信息。目标BDT策略1对应上述实施例中的第一目标背景流量传输策略。目标BDT策略2对应上述实施例中的第二目标背景流量传输策略。第一子区域更新后的一个或多个BDT策略对应上述实施例中第三区域的第二策略。任一个子区域的一个或者多个BDT策略对应上述实施例中第三区域的第一策略。
如图9所示,图9示出了本申请的另一种确定背景流量传输策略的方法,该方法与图8所示的实施例的区别在于:图8中对于不同的子区域,PCF网元确定每个子区域的一个或多个BDT策略,而在图9中,PCF网元可以根据N个子区域的Network Performance对N个子区域进行聚合,得到一个或者多个聚合区域,然后PCF网元确定一个或者多个聚合后的区域中每个区域的一个或多个BDT策略。该方法包括:
步骤901~步骤907,同步骤801~步骤807,此处不再赘述。
步骤908、PCF网元根据N个子区域的网络性能信息1,得到一个或多个聚合区域,以及每个聚合区域的网络性能信息1。
作为一种可能的实现,本申请实施例中的步骤908可以通过以下方式实现:PCF网元将N个子区域中具有相同的网络性能信息1的子区域进行聚合,得到一个或多个聚合区域。任一个聚合区域的网络性能信息1与该聚合区域对应的子区域的网络性能信息1相同。
举例说明,以N个子区域为TA1~TA10为例,如果TA1、TA2、TA8、TA9以及TA10具有相同的网络性能信息1,则PCF网元将TA1、TA2、TA8、TA9以及TA10进行聚合得到聚合区域1。如果TA3、TA4、TA5、TA6以及TA7具有相同的网络性能信息1,则PCF网元将TA3、TA4、TA5、TA6以及TA7进行聚合得到聚合区域1。
需要说明的是,如果由NWDAF网元进行区域聚合,则步骤907中NWDAF网元向PCF网元发送一个或多个聚合区域的网络性能信息1。
步骤909、PCF网元根据一个或多个聚合区域中每个聚合区域的网络性能信息1, 确定每个聚合区域各自的一个或多个BDT策略。例如,PCF网元根据聚合区域1的网络性能信息1确定聚合区域1的一个或多个BDT策略。
步骤910~步骤921同步骤809~步骤820,区别在于,将步骤809~步骤820所涉及到的实施例中的子区域替换为聚合区域即可。
图9所示的实施例中期待的时间窗对应上述实施例中的第一时间段,时间段1对应上述实施例中的第二时间段。第一子区域对应上述实施例中发生网络性能信息变化的第二区域。网络性能信息2对应上述实施例中的第二网络性能信息。网络性能信息1对应上述实施例中的第一网络性能信息。目标BDT策略1对应上述实施例中的第一目标背景流量传输策略。目标BDT策略2对应上述实施例中的第二目标背景流量传输策略。第一聚合区域更新后的一个或多个BDT策略对应上述实施例中第三区域的第二策略。任一个聚合区域的一个或者多个BDT策略对应上述实施例中第三区域的第一策略。换言之,图9所示的实施例中的聚合区域对应第三区域。
如图10所示,图10示出了本申请实施例提供的另一种确定策略的方法,该方法包括:
步骤1001、第一网元向数据分析网元发送用于请求网络性能信息的第一请求。相应的,数据分析网元接收来自第一网元的用于请求网络性能信息的第一请求。
该第一请求包括第一区域的信息。
关于步骤1001的具体可以参考步骤501处的相关描述,区别在于步骤1001中的第一请求中未携带第一时间段的信息。
需要说明的是,如果多个子区域可以聚合成第一区域,而第一区域由第一网元划分成多个子区域,则第一请求中的第一区域的信息可以由一个或多个第二区域的信息替代,换言之,第一网元向数据分析网元请求第一区域包括的一个或多个子区域中每个子区域的网络性能信息。
步骤1002、数据分析网元根据第一请求确定第二区域的第一网络性能信息。第一区域包括一个或多个第二区域。
例如,当第一区域包括一个第二区域时,第二区域即为第一区域。当第一区域包括多个第二区域时,数据分析网元确定的是多个第二区域中每个第二区域的第一网络性能信息。
其中,第二区域的第一网络性能信息包括:第二区域中的第一信息、或第二区域中的终端数量中的一项或多项。第二区域为第一区域的子区域,第二区域的数量为一个或多个。
步骤1003、数据分析网元向第一网元发送第二区域的第一网络性能信息,相应的,第一网元从数据分析网元接收第二区域的第一网络性能信息。该第一网络性能信息包括:第一信息或终端数量中的一项或多项。第二区域为第一区域的子区域,第二区域的数量为一个或多个。
步骤1004、第一网元根据第一网络性能信息,确定第三区域的第一策略,第三区域包括一个或多个第二区域,第三区域的数量为多个,该第三区域为第一区域的子区域。
步骤1005、第一网元向请求设备发送多个第三区域中每个第三区域对应的第一策 略。
关于第三区域对应的第一策略的描述可以参考图5所示的实施例处的描述,此处不再赘述。
在一种可能的实现方式中,如图10所示的实施例还可以包括:步骤1006同步骤701,步骤1007~步骤1015,同步骤707~步骤715,此处不再赘述。
在一种可能的实现方式中,如果第一请求中携带第一时间段的信息,或者第一网元向数据分析网元发送第一请求之后,还向数据分析网元发送了第一时间段的信息,则第一网络性能信息包括:在第二时间段内第二区域中的第一信息、或在第二时间段内第二区域中的终端数量中的一项或多项。
示例性的,第二时间段可以为第一时间段,或者第二时间段可以为第一时间段的子时间段。当第二时间段为第一时间段的子时间段时,第二时间段的数量可以为多个。
在一种可能的实现方式中,如果在步骤1109中第二区域中更新后的第二网络性能信息为第二区域相对于第一网络性能信息在第三时间段更新后的网络性能信息,其中第三时间段可以不是第一时间段的子时间段,或者不在第一时间段的范围内,那么步骤1110第一网元确定的第三区域中的第二策略中的一个或者多个背景流量传输策略中的推荐的传输时间段可能不是第一时间段的子时间段或者不在第一时间段的范围内,进而在请求设备可以不从第三区域的第二策略中选择第二目标背景流量传输策略,从而该请求设备发送上述第一指示信息或者在最大响应时间段内不能向第一网元发送第二目标背景流量传输策略。
在一种可能的实现方式中,即使第一网元未向数据分析网元发送第一时间段的信息,数据分析网元也可以自主确定多个第二区域中每个第二区域的第一网络性能信息对应的时间段的信息。因此,数据分析网元向第一网元还可以发送每个第二区域的第一网络性能信息对应的时间段的信息。这是每个第二区域的数据可能包括一个比较长的时间段X(例如,2019.1.1~2019.12.31),如果数据分析网元根据任一个第二区域在整个时间段X内的数据得到该任一个第二区域的第一网络性能信息会增加数据分析网元的处理负担,因此,数据分析网元可以自主从时间段X中选择距离当前时间较近的一个子时间段Y,并根据任一个第二区域在子时间段Y中的数据得到该任一个第二区域的第一网络性能信息。
例如,第一网元向数据分析网元请求TA列表(包括TA1、TA2)的网络性能信息,如果数据分析网元是根据TA1在T1内的数据确定TA1的第一网络性能信息,根据TA2在T2内的数据确定TA2的第一网络性能信息。后续,数据分析网元可以向第一网元发送TA1的第一网络性能信息与T1对应,以及向第一网元发送TA2的第一网络性能信息与T2对应,这样便于第一网元确定TA1的第一网络性能信息为TA1在T1内的网络性能信息,以及确定TA2的第一网络性能信息为TA2在T2内的网络性能信息。
需要说明的是,本申请实施例图10所示的实施例还可以对应一个具体实施例,该具体实施例包括:步骤1~步骤20,其中,步骤1~步骤20可以一一对应参考图8所示的实施例中的步骤801~步骤820,区别在于:PCF网元在步骤4中向NWDAF网元发送的用于请求网络性能数据分析结果的消息中未携带期待的时间窗,则NWDAF网元在步骤5中从OAM网元、NRF网元以及AMF网元上获取的是每个子区域的数据。此时,每个子区域的数据至少包括每个子区域在期待的时间窗中的数据。因此,NWDAF网元在步骤6 中生成的网络性能数据分析结果包括子区域1…子区域N中每个子区域的网络的网络性能信息1,之后,PCF网元根据每个子区域的网络的网络性能信息1得到每个子区域各自的一个或者多个BDT策略。
应理解的是,如果NWDAF网元发送的用于请求网络性能数据分析结果的消息中携带期待的时间窗,则NWDAF网元在步骤5中从OAM网元、NRF网元以及AMF网元上获取每个子区域的数据为:每个子区域在期待的时间窗或者每个子区域在期待的时间窗包括的子时间段中的数据。且NWDAF网元在步骤6中生成的网络性能数据分析结果包括子区域1…子区域N中每个子区域的网络在期待的时间窗的子时间段内的网络性能信息1。
上述主要从各个网元之间交互的角度对本申请实施例的方案进行了介绍。可以理解的是,各个网元,例如第一网元、数据分析网元等为了实现上述功能,其包括了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例可以根据上述方法示例第一网元、数据分析网元进行功能单元的划分,例如,可以对应各个功能划分各个功能单元,也可以将两个或两个以上的功能集成在一个处理单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。需要说明的是,本申请实施例中对单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
上面结合图5至图10,对本申请实施例的方法进行了说明,下面对本申请实施例提供的执行上述方法的通信装置进行描述。本领域技术人员可以理解,方法和装置可以相互结合和引用,本申请实施例提供的通信装置可以执行上述确定策略的方法中由第一网元、数据分析网元执行的步骤。
在采用集成的单元的情况下,图11示出了上述实施例中所涉及的确定策略的装置,该确定策略的装置可以包括:通信单元102和处理单元101。
一种示例,该确定策略的装置为第一网元,或者为应用于第一网元中的芯片。在这种情况下,通信单元102用于支持该确定策略的装置执行上述实施例的图5步骤501中由第一网元执行的发送动作。通信单元102,用于支持该确定策略的装置执行图5的步骤503中由第一网元执行的接收动作。处理单元,还用于支持通信装置执行上述实施例中步骤504。
在一种可能的实施例中,通信单元102,还用于支持确定策略的装置执行上述实施例中的步骤702、步骤706、步骤711、步骤713、步骤715、步骤708中由第一网元执行的发送动作。通信单元102,还用于支持确定策略的装置执行上述实施例中步骤701、步骤704、步骤709中由第一网元执行的接收动作。
处理单元101,还用于支持确定策略的装置执行上述实施例中步骤707以及步骤710、步骤712以及步骤714。
另一种示例,该确定策略的装置为数据分析网元,或者为应用于数据分析网元中的芯片。在这种情况下,通信单元102,用于支持该确定策略的装置执行上述实施例中的步骤501中由数据分析网元执行的接收的动作。处理单元101,用于支持该确定策略的装置执行上述实施例中的步骤502。通信单元102,还用于支持该确定策略的装置执行上述实施例中的步骤503中由数据分析网元执行的发送动作。
在一种可能的实现方式中,通信单元102还用于支持该确定策略的装置执行上述实施例中的步骤709中由数据分析网元执行的发送动作。
一种示例,该确定策略的装置为第一网元,或者为应用于第一网元中的芯片。在这种情况下,通信单元102用于支持该确定策略的装置执行上述实施例的图10步骤1001以及步骤1005中由第一网元执行的发送动作。通信单元102,用于支持该确定策略的装置执行图10的步骤1003中由第一网元执行的接收动作。处理单元,还用于支持通信装置执行上述实施例中步骤1004。
在一种可能的实施例中,通信单元102,还用于支持确定策略的装置执行上述实施例中的步骤1002、步骤1006、步骤1011、步骤1013、步骤1015、步骤1008中由第一网元执行的发送动作。通信单元102,还用于支持确定策略的装置执行上述实施例中步骤1006、步骤1004、步骤1009中由第一网元执行的接收动作。
处理单元101,还用于支持确定策略的装置执行上述实施例中步骤1007以及步骤1010、步骤1012以及步骤1014。
另一种示例,该确定策略的装置为数据分析网元,或者为应用于数据分析网元中的芯片。在这种情况下,通信单元102用于支持该确定策略的装置执行上述实施例中的步骤1001中由数据分析网元执行的接收动作。处理单元101,用于支持该确定策略的装置执行上述实施例中的步骤1002。通信单元102,还用于支持该确定策略的装置执行上述实施例中的步骤1003中由数据分析网元执行的发送动作。
在一种可能的实现方式中,通信单元102还用于支持该确定策略的装置执行上述实施例中的步骤1009中由数据分析网元执行的发送动作。
在采用集成的单元的情况下,图12示出了上述实施例中所涉及的确定策略的装置的一种可能的逻辑结构示意图。该确定策略的装置包括:处理模块112和通信模块113。处理模块112用于对确定策略的装置的动作进行控制管理,例如,处理模块112用于执行在确定策略的装置进行信息/数据处理的步骤。通信模块113用于支持确定策略的装置进行信息/数据发送或者接收的步骤。
在一种可能的实施例中,确定策略的装置还可以包括存储模块111,用于存储确定策略的装置可的程序代码和数据。
一种示例,该确定策略的装置为第一网元,或者为应用于第一网元中的芯片。在这种情况下,通信模块113用于支持该确定策略的装置执行上述实施例的图5步骤501中由第一网元执行的发送动作。通信模块113,用于支持该确定策略的装置执行图5的步骤503中由第一网元执行的接收动作。处理单元,还用于支持通信装置执行上述实施例中步骤504。
在一种可能的实施例中,通信模块113,还用于支持确定策略的装置执行上述实施例中的步骤702、步骤706、步骤711、步骤713、步骤715、步骤708中由第一网元执行 的发送动作。通信模块113,还用于支持确定策略的装置执行上述实施例中步骤701、步骤704、步骤709中由第一网元执行的接收动作。
处理模块112,还用于支持确定策略的装置执行上述实施例中步骤707以及步骤710、步骤712以及步骤714。
另一种示例,该确定策略的装置为数据分析网元,或者为应用于数据分析网元中的芯片。在这种情况下,通信模块113,用于支持该确定策略的装置执行上述实施例中的步骤501中由数据分析网元执行的接收的动作。处理模块112,用于支持该确定策略的装置执行上述实施例中的步骤502。通信模块113,还用于支持该确定策略的装置执行上述实施例中的步骤503中由数据分析网元执行的发送动作。
在一种可能的实现方式中,通信模块113还用于支持该确定策略的装置执行上述实施例中的步骤709中由数据分析网元执行的发送动作。
其中,处理模块112可以是处理器或控制器,例如可以是中央处理器单元,通用处理器,数字信号处理器,专用集成电路,现场可编程门阵列或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,模块和电路。处理器也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,数字信号处理器和微处理器的组合等等。通信模块113可以是收发器、收发电路或通信接口等。存储模块111可以是存储器。
当处理模块112为处理器41或处理器45,通信模块113为通信接口43时,存储模块111为存储器42时,本申请所涉及的确定策略的装置可以为图13所示的通信设备。
图13所示为本申请实施例提供的通信设备的硬件结构示意图。该通信设备包括处理器41,通信线路44以及至少一个通信接口(图13中仅是示例性的以包括通信接口43为例进行说明)。
可选的,该通信设备还可以包括存储器42。
处理器41可以是一个通用中央处理器(central processing unit,CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制本申请方案程序执行的集成电路。
通信线路44可包括一通路,在上述组件之间传送信息。
通信接口43,使用任何收发器一类的装置,用于与其他设备或通信网络通信,如以太网,无线接入网(radio access network,RAN),无线局域网(wireless local area networks,WLAN)等。
存储器42可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过通信线路44与处理器相连接。存储器也可以和处理器集成在一起。
其中,存储器42用于存储执行本申请方案的计算机执行指令,并由处理器41来控制执行。处理器41用于执行存储器42中存储的计算机执行指令,从而实现本申请下述实施例提供的确定策略的方法。
可选的,本申请实施例中的计算机执行指令也可以称之为应用程序代码,本申请实施例对此不作具体限定。
在具体实现中,作为一种实施例,处理器41可以包括一个或多个CPU,例如图12中的CPU0和CPU1。
在具体实现中,作为一种实施例,通信设备可以包括多个处理器,例如图12中的处理器41和处理器45。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。
一种示例,该通信设备为第一网元,或者为应用于第一网元中的芯片。在这种情况下,通信接口43用于支持该通信设备执行上述实施例的图5步骤501中由第一网元执行的发送动作。通信接口43,用于支持该通信设备执行图5的步骤503中由第一网元执行的接收动作。处理单元,还用于支持通信设备执行上述实施例中步骤504。
在一种可能的实施例中,通信接口43,还用于支持通信设备执行上述实施例中的步骤702、步骤706、步骤711、步骤713、步骤715、步骤708中由第一网元执行的发送动作。通信接口43,还用于支持通信设备执行上述实施例中步骤701、步骤704、步骤709中由第一网元执行的接收动作。
处理器41和处理器45,还用于支持通信设备执行上述实施例中步骤707以及步骤710、步骤712以及步骤714。
另一种示例,该通信设备为数据分析网元,或者为应用于数据分析网元中的芯片。在这种情况下,通信接口43,用于支持该通信设备执行上述实施例中的步骤501中由数据分析网元执行的接收的动作。处理器41和处理器45,用于支持该通信设备执行上述实施例中的步骤502。通信接口43,还用于支持该通信设备执行上述实施例中的步骤503中由数据分析网元执行的发送动作。
在一种可能的实现方式中,通信接口43还用于支持该通信设备执行上述实施例中的步骤709中由数据分析网元执行的发送动作。
一种示例,该通信设备为第一网元,或者为应用于第一网元中的芯片。在这种情况下,通信接口43用于支持该通信设备执行上述实施例的图10步骤1001以及步骤1005中由第一网元执行的发送动作。通信接口43,用于支持该通信设备执行图10的步骤1003中由第一网元执行的接收动作。处理单元,还用于支持通信装置执行上述实施例中步骤1004。
在一种可能的实施例中,通信接口43,还用于支持通信设备执行上述实施例中的步骤1002、步骤1006、步骤1011、步骤1013、步骤1015、步骤1008中由第一网元执行的发送动作。通信接口43,还用于支持通信设备执行上述实施例中步骤1006、步骤1004、步骤1009中由第一网元执行的接收动作。
处理器41和处理器45,还用于支持通信设备执行上述实施例中步骤1007以及步骤1010、步骤1012以及步骤1014。
另一种示例,该通信设备为数据分析网元,或者为应用于数据分析网元中的芯片。在这种情况下,处理器41和处理器45,用于支持该通信设备执行上述实施例中的步骤1002。通信接口43,还用于支持该通信设备执行上述实施例中的步骤1003中由数据分析网元执行的发送动作。
在一种可能的实现方式中,通信接口43还用于支持该通信设备执行上述实施例中的步骤1009中由数据分析网元执行的发送动作。
图14是本申请实施例提供的芯片150的结构示意图。芯片150包括一个或两个以上(包括两个)处理器1510和通信接口1530。
可选的,该芯片150还包括存储器1540,存储器1540可以包括只读存储器和随机存取存储器,并向处理器1510提供操作指令和数据。存储器1540的一部分还可以包括非易失性随机存取存储器(non-volatile random access memory,NVRAM)。
在一些实施方式中,存储器1540存储了如下的元素,执行模块或者数据结构,或者他们的子集,或者他们的扩展集。
在本申请实施例中,通过调用存储器1540存储的操作指令(该操作指令可存储在操作系统中),执行相应的操作。
一种可能的实现方式中为:第一网元、数据分析网元所用的芯片的结构类似,不同的装置可以使用不同的芯片以实现各自的功能。
处理器1510控制第一网元、数据分析网元中任一个的处理操作,处理器1510还可以称为中央处理单元(central processing unit,CPU)。
存储器1540可以包括只读存储器和随机存取存储器,并向处理器1510提供指令和数据。存储器1540的一部分还可以包括NVRAM。例如应用中存储器1540、通信接口1530以及存储器1540通过总线系统1520耦合在一起,其中总线系统1520除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图14中将各种总线都标为总线系统1520。
上述本申请实施例揭示的方法可以应用于处理器1510中,或者由处理器1510实现。处理器1510可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器1510中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器1510可以是通用处理器、数字信号处理器(digital signal processing,DSP)、ASIC、现成可编程门阵列(field-programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器1540,处理器1510读取存储器1540中的信息,结合其硬件完成上述方法的步骤。
一种可能的实现方式中,通信接口1530用于执行图5-图9所示的实施例中的第一网元、数据分析网元的接收和发送的步骤。处理器1510用于执行图5-图9所示的实施例中的第一网元、数据分析网元的处理的步骤。
以上通信单元可以是该装置的一种通信接口,用于从其它装置接收信号。例如,当该装置以芯片的方式实现时,该收发单元是该芯片用于从其它芯片或装置接收信号或发送信号的通信接口。
一方面,提供一种计算机可读存储介质,计算机可读存储介质中存储有指令,当指令被运行时,实现如图5~图7中第一网元的功能。
一方面,提供一种计算机可读存储介质,计算机可读存储介质中存储有指令,当指令被运行时,实现如图5-图7中数据分析网元的功能。
一方面,提供一种包括指令的计算机程序产品,计算机程序产品中包括指令,当指令被运行时,实现如图5~图7中第一网元的功能。
又一方面,提供一种包括指令的计算机程序产品,计算机程序产品中包括指令,当指令被运行时,实现如图5-图7中数据分析网元的功能。
一方面,提供一种芯片,该芯片应用于第一网元中,芯片包括至少一个处理器和通信接口,通信接口和至少一个处理器耦合,处理器用于运行指令,以实现如图5~图7中第一网元的功能。
又一方面,提供一种芯片,该芯片应用于数据分析网元中,芯片包括至少一个处理器和通信接口,通信接口和至少一个处理器耦合,处理器用于运行指令,以实现如图5~图7中数据分析网元的功能。
本申请实施例提供一种通信系统,该通信系统包括:第一网元和数据分析网元。其中,第一网元用于执行如图5~图7中任一个第一网元的功能,数据分析网元用于执行图5~图7中的任一个由数据分析网元执行的步骤。
可选的,该通信系统还可以包括AF网元。其中,AF网元用于执行图7中由请求设备执行的功能。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序或指令。在计算机上加载和执行所述计算机程序或指令时,全部或部分地执行本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、网络设备、用户设备或者其它可编程装置。所述计算机程序或指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机程序或指令可以从一个网站站点、计算机、服务器或数据中心通过有线或无线方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是集成一个或多个可用介质的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,例如,软盘、硬盘、磁带;也可以是光介质,例如,数字视频光盘(digital video disc,DVD);还可以是半导体介质,例如,固态硬盘(solid state drive,SSD)。
尽管在此结合各实施例对本申请进行了描述,然而,在实施所要求保护的本申请过程中,本领域技术人员通过查看附图、公开内容、以及所附权利要求书,可理解并实现公开实施例的其他变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其他单元可以实现 权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。
尽管结合具体特征及其实施例对本申请进行了描述,显而易见的,在不脱离本申请的精神和范围的情况下,可对其进行各种修改和组合。相应地,本说明书和附图仅仅是所附权利要求所界定的本申请的示例性说明,且视为已覆盖本申请范围内的任意和所有修改、变化、组合或等同物。显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包括这些改动和变型在内。

Claims (29)

  1. 一种确定策略的方法,其特征在于,包括:
    第一网元向数据分析网元发送第一请求,所述第一请求用于请求网络性能信息,其中,所述第一请求包括第一区域的信息和第一时间段的信息;
    所述第一网元从所述数据分析网元接收第二区域的第一网络性能信息,所述第一网络性能信息包括:在第二时间段内所述第二区域中的第一信息、或在第二时间段内所述第二区域中的终端数量中的一项或多项;
    所述第一网元根据所述第一网络性能信息,确定第一策略;
    所述第一网元从所述数据分析网元接收第二网络性能信息,所述第二网络性能信息为所述第一网络性能信息降级后的网络性能信息;
    所述第一网元根据所述第二网络性能信息,确定所述第一区域的第二策略,所述第二策略包括一个或者多个背景流量传输策略;
    所述第一网元向请求设备发送所述第二策略时,所述第一网元设置所述时间信息,其中,所述时间信息用于表示所述请求设备针对所述第一区域的第二策略的最大响应时间。
  2. 根据权利要求1所述的方法,其特征在于,所述第二时间段为所述第一时间段或者为所述第一时间段的子时间段,所述第二区域为所述第一区域或者为所述第一区域的子区域。
  3. 根据权利要求1或2所述的方法,其特征在于,所述第一信息包括所述第二区域中的网络在所述第二时间段内的以下一项或多项信息的平均值:
    会话的创建成功率、所述终端切换成功的比率、所述终端注册成功的比率、基站或者核心网网元的资源使用率、所述基站或者所述核心网网元的使用占比、所述基站或者所述核心网网元的负载。
  4. 根据权利要求1~3任一项所述的方法,其特征在于,
    所述第一策略为第一区域的第一策略,所述第一区域包括一个或多个所述第二区域,所述第一区域的数量为一个或多个,所述第一区域的第一策略包括一个或者多个背景流量传输策略。
  5. 根据权利要求4所述的方法,其特征在于,所述第一区域包括多个所述第二区域时,所述第一区域包括的多个所述第二区域具有相同的第一网络性能信息。
  6. 根据权利要求4~5任一项所述的方法,其特征在于,所述方法还包括:
    所述第一网元确定所述第一区域的第一目标背景流量传输策略,所述第一目标背景流量传输策略为所述一个或者多个背景流量传输策略中的一个;
    所述第一网元向网络存储网元发送所述第一目标背景流量传输策略以及以下信息中的一个或多个:所述第一目标背景流量传输策略的标识或所述第一区域的信息。
  7. 根据权利要求6所述的方法,其特征在于,所述第一网元确定所述第一区域的第一目标背景流量传输策略,包括:
    所述第一区域的第一策略包括一个背景流量传输策略,所述第一网元确定所述一个背景流量传输策略为所述第一目标背景流量传输策略;或者,
    所述第一区域的第一策略包括多个背景流量传输策略,所述第一网元从所述请求设备处接收所述第一目标背景流量传输策略。
  8. 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:
    在所述最大响应时间内,所述第一网元接收到所述请求设备反馈的第二目标背景流量传输策略,所述第二目标背景流量传输策略为所述第二策略包括的多个背景流量传输策略中的一个;
    所述第一网元向所述网络存储网元发送所述第二目标背景流量传输策略以及以下信息中的一个或多个:所述第一目标背景流量传输策略的标识或所述第一区域的信息。
  9. 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:
    所述第一网元确定删除所述第一区域的第一目标背景流量传输策略;
    所述第一网元向网络存储网元发送第一删除消息,所述第一删除消息用于通知所述网络存储网元删除所述第一区域的第一目标背景流量传输策略。
  10. 根据权利要求9所述的方法,其特征在于,所述第一网元确定删除所述第一区域的第一目标背景流量传输策略,包括:
    在所述最大响应时间内,所述第一网元未从所述请求设备接收到所述请求设备从所述第二策略包括的多个背景流量传输策略中选择的第二目标背景流量传输策略,所述第一网元确定删除所述第一区域的第一目标背景流量传输策略。
  11. 根据权利要求9所述的方法,其特征在于,所述第一网元确定删除所述第一区域的第一目标背景流量传输策略,包括:
    所述第一网元接收到所述请求设备的第一指示信息,所述第一指示信息用于表示所述请求设备未从所述第二策略包括的多个背景流量传输策略中选择目标背景流量传输策略;
    所述第一网元根据所述第一指示信息,确定删除所述第一区域的第一目标背景流量传输策略。
  12. 根据权利要求1~11任一项所述的方法,其特征在于,所述方法还包括:
    所述第一网元接收来自请求设备的第二请求,所述第二请求用于请求所述第一区域对应的背景流量传输策略,所述第二请求包括第一区域的信息和第一时间段的信息;
    所述第一网元向所述请求设备发送所述第一策略以及以下信息中的一个或多个:所述第一区域的信息以及所述第一策略的标识。
  13. 一种确定策略的装置,其特征在于,包括:
    通信单元,用于向数据分析网元发送第一请求,所述第一请求用于请求网络性能信息,其中,所述第一请求包括第一区域的信息和第一时间段的信息;
    所述通信单元,还用于从所述数据分析网元接收第二区域的第一网络性能信息,所述第一网络性能信息包括以下一项或多项:在第二时间段内所述第二区域中的第一信息、或在第二时间段内所述第二区域中的终端数量;
    处理单元,用于根据所述第一网络性能信息,确定第一策略;
    所述通信单元,还用于从所述数据分析网元接收第二网络性能信息,所述第二网络性能信息为所述第一网络性能信息降级后的网络性能信息;
    所述处理单元,还用于根据所述第二网络性能信息,确定所述第一区域的第二策略,所述第二策略包括一个或者多个背景流量传输策略;
    所述通信单元向请求设备发送所述第二策略时,所述处理单元还用于设置所述时间信息,其中,所述时间信息用于表示所述请求设备针对所述第一区域的第二策略的最大 响应时间。
  14. 根据权利要求13所述的装置,其特征在于,所述第二时间段为所述第一时间段或者为所述第一时间段的子时间段,所述第二区域为所述第一区域或者为所述第一区域的子区域。
  15. 根据权利要求13或14所述的装置,其特征在于,所述第一信息包括所述第二区域中的网络在所述第二时间段内的以下一项或多项信息的平均值:
    会话的创建成功率、所述终端切换成功的比率、所述终端注册成功的比率、基站或者核心网网元的资源使用率、所述基站或者所述核心网网元的使用占比、所述基站或者所述核心网网元的负载。
  16. 根据权利要求13~15所述的装置,其特征在于,
    所述第一策略为第一区域的第一策略,所述第一区域包括一个或多个所述第二区域,所述第一区域的数量为一个或多个,所述第一区域的第一策略包括一个或者多个背景流量传输策略。
  17. 根据权利要求16所述的装置,其特征在于,所述第一区域包括多个所述第二区域时,所述第一区域包括的多个所述第二区域具有相同的第一网络性能信息。
  18. 根据权利要求16~17任一项所述的装置,其特征在于,所述处理单元,还用于确定所述第一区域的第一目标背景流量传输策略,所述第一目标背景流量传输策略为所述一个或者多个背景流量传输策略中的一个;
    所述通信单元,还用于向网络存储网元发送所述第一目标背景流量传输策略以及以下信息中的一个或多个:所述第一目标背景流量传输策略的标识或所述第一区域的信息。
  19. 根据权利要求18所述的装置,其特征在于,所述第一区域的第一策略包括一个背景流量传输策略,所述处理单元,用于确定所述一个背景流量传输策略为所述第一目标背景流量传输策略;或者,
    所述第一区域的第一策略包括多个背景流量传输策略,所述处理单元,用于通过所述通信单元从所述请求设备处接收所述第一目标背景流量传输策略。
  20. 根据权利要求13或14所述的装置,其特征在于,在所述最大响应时间内,所述处理单元,还用于确定所述通信单元接收到所述请求设备反馈的第二目标背景流量传输策略,所述第二目标背景流量传输策略为所述第二策略包括的多个背景流量传输策略中的一个;
    所述通信单元,还用于向网络存储网元发送所述第二目标背景流量传输策略以及以下信息中的一个或多个:所述第一目标背景流量传输策略的标识或所述第一区域的信息。
  21. 根据权利要求13或14所述的装置,其特征在于,所述处理单元,还用于确定删除所述第一区域的第一目标背景流量传输策略;
    所述通信单元,还用于向网络存储网元发送第一删除消息,所述第一删除消息用于通知所述网络存储网元删除所述第一区域的第一目标背景流量传输策略。
  22. 根据权利要求21所述的装置,其特征在于,所述处理单元,用于确定在所述最大响应时间内,所述通信单元未从所述请求设备接收到所述请求设备从所述第二策略包括的多个背景流量传输策略中选择的第二目标背景流量传输策略,所述处理单元确定删除所述第一区域的第一目标背景流量传输策略。
  23. 根据权利要求21所述的装置,其特征在于,所述通信单元,还用于接收来自所 述请求设备的第一指示信息,所述第一指示信息用于表示所述请求设备未从所述第二策略包括的多个背景流量传输策略中选择目标背景流量传输策略;
    所述处理单元,用于根据所述第一指示信息,确定删除所述第一区域的第一目标背景流量传输策略。
  24. 根据权利要求13~23任一项所述的装置,其特征在于,所述通信单元,还用于接收来自请求设备的第二请求,所述第二请求用于请求所述第一区域对应的背景流量传输策略,所述第二请求包括第一区域的信息和第一时间段的信息;
    所述通信单元,还用于向所述请求设备发送所述第一策略以及以下信息中的一个或多个:所述第一区域的信息以及所述第一策略的标识。
  25. 一种芯片,其特征在于,所述芯片包括至少一个处理器和通信接口,所述通信接口和所述至少一个处理器耦合,所述至少一个处理器用于运行计算机程序或指令,以实现如权利要求1-12中任一项所述的确定策略的方法,所述通信接口用于与所述芯片之外的其它模块进行通信。
  26. 一种确定策略的装置,其特征在于,包括:处理器和通信接口;
    其中,所述通信接口用于执行如权利要求1~12中任一项所述的确定策略的方法中在第一网元中进行消息收发的操作;所述处理器运行指令以执行如权利要求1~12中任一项所述的确定策略的方法中在所述第一网元中进行处理或控制的操作。
  27. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有指令,当所述指令被运行时,实现上述权利要求1~12任一项所述的确定策略的方法。
  28. 一种通信装置,其特征在于,包括:至少一个处理器,所述至少一个处理器用于运行存储器中存储的计算机程序或指令,以实现权利要求1~12任一项所述的方法。
  29. 一种通信系统,其特征在于,包括:如权利要求13~24任一项所述的确定策略的装置以及与所述确定策略的装置通信的数据分析网元,所述数据分析网元用于向所述确定策略的装置提供第二区域的网络的第一网络性能信息,所述网络的第一网络性能信息包括所述网络在第二时间段内的第一信息和/或终端数量;所述数据分析网元还用于向所述确定策略的装置提供第二网络性能信息,所述第二网络性能信息为所述第一网络性能信息降级后的网络性能信息。
PCT/CN2021/086727 2020-04-10 2021-04-12 一种确定策略的方法、装置及系统 WO2021204299A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP21785319.1A EP4124094A4 (en) 2020-04-10 2021-04-12 POLICY DETERMINATION MECHANISM AND PROCESS, AND SYSTEM
US17/957,785 US20230040486A1 (en) 2020-04-10 2022-09-30 Policy Determining Method and Apparatus, and System

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010281629.3 2020-04-10
CN202010281629.3A CN113518354B (zh) 2020-04-10 2020-04-10 一种确定策略的方法、装置及系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/957,785 Continuation US20230040486A1 (en) 2020-04-10 2022-09-30 Policy Determining Method and Apparatus, and System

Publications (1)

Publication Number Publication Date
WO2021204299A1 true WO2021204299A1 (zh) 2021-10-14

Family

ID=78023819

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/086727 WO2021204299A1 (zh) 2020-04-10 2021-04-12 一种确定策略的方法、装置及系统

Country Status (4)

Country Link
US (1) US20230040486A1 (zh)
EP (1) EP4124094A4 (zh)
CN (1) CN113518354B (zh)
WO (1) WO2021204299A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115955681A (zh) * 2021-10-09 2023-04-11 华为技术有限公司 一种通信方法、通信装置及通信系统
WO2023213139A1 (zh) * 2022-05-06 2023-11-09 华为技术有限公司 通信方法和通信装置
CN114828085A (zh) * 2022-05-13 2022-07-29 中国联合网络通信集团有限公司 一种5g系统的随机接入控制方法、装置及系统
CN116318344B (zh) * 2023-02-28 2023-10-24 广州爱浦路网络技术有限公司 获取ue不可达时间的优化方法、系统、装置和存储介质

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016054777A1 (zh) * 2014-10-08 2016-04-14 华为技术有限公司 一种背景流量下载方法、设备及系统
CN110519795A (zh) * 2018-05-21 2019-11-29 华为技术有限公司 一种确定背景流量传输策略的方法及装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105532031B (zh) * 2014-06-05 2019-12-17 华为技术有限公司 资源优化的方法和装置
US10986516B2 (en) * 2017-03-10 2021-04-20 Huawei Technologies Co., Ltd. System and method of network policy optimization
CN109756423B (zh) * 2017-11-03 2022-04-05 华为技术有限公司 策略更新的方法和装置
CN113810224B (zh) * 2018-06-26 2022-11-25 华为技术有限公司 一种信息处理方法及装置
CN110830542B (zh) * 2018-08-14 2023-01-13 华为技术有限公司 获取网络配置信息的方法和相关设备

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016054777A1 (zh) * 2014-10-08 2016-04-14 华为技术有限公司 一种背景流量下载方法、设备及系统
CN110519795A (zh) * 2018-05-21 2019-11-29 华为技术有限公司 一种确定背景流量传输策略的方法及装置

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CONVIDA WIRELESS LLC; KDDI; SAMSUNG; ERICSSON; TOYOTA MOTOR CORPORATION; ZTE: "Adding Support for Delivering Background Data Transfer Polices to the UE", 3GPP DRAFT; S2-1905893 REV OF 05882, 05368, 04376, 4337, AND 03389 - XBDT - 23503, vol. SA WG2, 17 May 2019 (2019-05-17), Reno, NV, USA, pages 1 - 12, XP051736043 *
KDDI; TOYOTA ITC; HUAWEI; HISILICON: "Solution Update and Merging: Solution 18", 3GPP DRAFT; S2-1811694_BDT_MERGE, vol. SA WG2, 20 November 2018 (2018-11-20), West Palm Beach, USA, pages 1 - 5, XP051498463 *

Also Published As

Publication number Publication date
US20230040486A1 (en) 2023-02-09
CN113518354B (zh) 2023-08-22
CN113518354A (zh) 2021-10-19
EP4124094A4 (en) 2023-08-02
EP4124094A1 (en) 2023-01-25

Similar Documents

Publication Publication Date Title
WO2021204299A1 (zh) 一种确定策略的方法、装置及系统
EP3843337B1 (en) Slice information processing method and apparatus
WO2021218274A1 (zh) 一种通信方法、装置及系统
US20210274436A1 (en) Resource information sending method, first network element and system
US11838802B2 (en) Slice information processing method and apparatus
WO2020108002A1 (zh) 一种传输策略确定方法、策略控制方法及装置
US20220368617A1 (en) Data analytics method, apparatus, and system
WO2020108003A1 (zh) 一种用户接入控制方法、信息发送方法及装置
WO2021218718A1 (zh) 确定用户面功能及信息提供的方法、设备及介质
WO2021057128A1 (zh) 一种基于nf的通信方法、设备及存储介质
CN114302426A (zh) 在异质网络控制服务质量的方法、装置、介质及电子设备
US20230037402A1 (en) Communication method, apparatus, and system
WO2022013608A1 (en) User plane function selection based on per subscriber cpu and memory footprint for packet inspection
WO2021121176A1 (zh) 一种sim卡状态信息的更新方法、装置和服务器
WO2023050782A1 (zh) 一种计费方法和设备
WO2023185690A1 (zh) 一种通信方法、装置及设备
US20240196204A1 (en) Systems and methods for volume porting
US12010002B2 (en) User plane function selection based on per subscriber CPU and memory footprint for packet inspection
RU2772710C2 (ru) Способ обработки запроса и соответствующий объект
WO2023050787A1 (zh) 一种计费方法和装置
WO2023061207A1 (zh) 一种通信方法、通信装置及通信系统
WO2023050781A1 (zh) 一种通信方法及通信装置
WO2022032546A1 (zh) 通信方法及装置
WO2023185807A1 (zh) 一种通信方法及装置
EP4135413A1 (en) Communication network arrangement and method for selecting a network component

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21785319

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2021785319

Country of ref document: EP

Effective date: 20221018

NENP Non-entry into the national phase

Ref country code: DE