WO2021227600A1 - Procédé de commande de tranche de réseau et appareil de communication - Google Patents
Procédé de commande de tranche de réseau et appareil de communication Download PDFInfo
- Publication number
- WO2021227600A1 WO2021227600A1 PCT/CN2021/077861 CN2021077861W WO2021227600A1 WO 2021227600 A1 WO2021227600 A1 WO 2021227600A1 CN 2021077861 W CN2021077861 W CN 2021077861W WO 2021227600 A1 WO2021227600 A1 WO 2021227600A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- slice
- network
- network element
- authorization
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0894—Policy-based network configuration management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
Definitions
- This application relates to the field of communication technology, and in particular to a network slicing control method and communication device.
- Network slicing refers to customizing different logical networks on a physical or virtual network infrastructure according to the service requirements of different tenants (tenant) business.
- Network slicing can be end-to-end (E2E) including the entire network, or part of the network functions can be shared among multiple network slices.
- E2E end-to-end
- 3GPP third generation partnership project
- 5G 5th generation
- multiple network slices can share a set of access and mobility management function (AMF) network elements, and user equipment (UE) can simultaneously access multiple network elements that share the same group of AMF network elements.
- AMF access and mobility management function
- UE user equipment
- slice control information for network slicing is stored in a unified data management (UDM) network element through a contract.
- UDM unified data management
- the AMF network element serving the UE obtains it from UDM.
- the subscription information of the slice control information is sent, and the slice control information is sent to the access network device, so that the access network device performs corresponding network slice control based on the slice control information.
- the present application provides a network slicing control method and device, which are used to improve the flexibility of network slicing control and user experience.
- a network slicing control method is provided.
- the method is applied to an access and mobility management function AMF network element.
- the method includes: sending first information.
- the AMF network element can send the first information to the AAA server through the AUSF network element.
- the first information includes slice information of the first network slice and a first identifier of the first user equipment UE.
- the slice information may be used to determine the first network slice.
- the slice information may be S-NSSAI or S-NSSAI.
- the identification information after NSSAI mapping.
- the first identification can be GPSI, where the network slice that is allowed or to be allowed to be accessed by the first UE includes the first network slice, that is, allowed NSSAI or pending NSSAI (the first UE can be allowed after authentication and authorization is required. Access) S-NSSAI including the first network slice; receiving the second information from the AAA server, that is, the second information is sent by the AAA server, for example, the AAA server can send the second information to the AMF network element through authentication and authorization,
- the second information includes first slice control information, and the first slice control information is information used to control the use of the first network slice by the first UE.
- the AMF network element reports the first information to the AAA server, and the AAA server issues the first slice control information according to the first information.
- the first slice control information is used to control the first UE to the first network.
- Information used for slicing so that the AAA server can reasonably allocate slicing control information to the first UE.
- the AMF network element can dynamically obtain the slicing control information of the first UE, thereby improving the flexibility of network slicing control and user experience .
- the method further includes: sending the first slice control information to the unified data management UDM network element, so that when the UDM network element receives the first slice control information, it can be locally Store the first slice control information.
- the UDM network element can learn in real time the information that controls the first UE to use the first network slice. Further, in the dual registration scenario, the UDM network element can provide the first slice control information to The other AMF network element used by the first UE eliminates the need for another AMF network element to initiate a new process to obtain the first slice control information.
- the method further includes: sending first slice control information to the policy control function PCF network element; receiving authorized slice control information from the PCF network element, where the authorized slice control information may It is the same as or different from the first slice control information.
- the legality and rationality of the slice control information for the first network slice by the first UE can be guaranteed.
- the method further includes: sending authorized slice control information to a unified data management UDM network element.
- the UDM network element can learn the information used by the first UE for the first network slice in real time. Further, in the dual registration scenario, the UDM network element can provide the first slice control information to the first network slice. Another AMF network element used by a UE makes it unnecessary for another AMF network element to initiate a new process to obtain the first slice control information.
- the method further includes: receiving third information, where the third information includes second slice control information, and the second slice control information is used to update the control of the first UE to the first Information used by network slicing.
- the network slice that the second UE is allowed or to be allowed to access includes the first network slice
- the third information also includes third slice control information
- the third slice control information is used to update the control information used to control the second UE to the first network slice.
- the AAA server can reasonably and dynamically adjust the slice control information of the first UE, thereby improving the flexibility of network slice control and user experience.
- the method further includes: storing information used to control the use of the first network slice by the first UE in the context of the first UE.
- the target AMF network element after the handover can accurately obtain the information of the first UE, and avoid performing the authorization process again on the network slice that performs the authorization process. .
- the method before sending the first information, further includes: obtaining authorization indication information of a network slice that is allowed or to be allowed to be accessed by the first UE; and determining the first UE according to the authorization indication information.
- a network slice requires authorization.
- obtaining the authorization indication information of the network slice that the first UE is allowed to access includes: obtaining authorization indication information locally; or obtaining the subscription information of the first UE from the unified data management UDM network element, where the subscription information includes authorization Indication information; or, obtain authorization indication information from the network element of the network slice selection function NSSF.
- the AMF network element can dynamically obtain the slice control information of the first UE in the authorization process of the first network slice, thereby improving the flexibility of network slice control and user experience.
- the first information further includes a second identifier of the first UE, where the second identifier is an identifier of the first UE in the first network slice.
- the second identifier may be used to identify the first UE in the first network slice, so that the AAA server may perform slice authentication and/or authorization for the first UE.
- the network slice that is allowed or to be allowed to be accessed by the first UE includes at least one network slice, and the at least one network slice includes the first network slice, and the method further includes: Acquire the second identifier of the first UE in each network slice of the at least one network slice.
- the signaling overhead for the AMF network element to obtain the second identifier of the first UE in the multiple network slices can be reduced.
- the first information is carried in the authorization request message of the first network slice, and the second information is carried in the authorization response message of the first network slice; or, the first information is carried in In the authentication and authorization request message of the first network slice, the second information is carried in the authentication and authorization response message of the first network slice.
- the AAA server can dynamically adjust the slice control information of the first UE in the authorization process of the first network slice, and the AMF network element can dynamically obtain the slice control information of the first UE, thereby improving The flexibility and user experience of network slicing control.
- a network slicing control method is provided.
- the method is applied to an AAA server for authentication, authorization, and accounting.
- the method includes: receiving first information, where the first information includes slice information of a first network slice and a first user The first identifier of the device UE.
- the slice information can be used to determine the first network slice.
- the slice information can be S-NSSAI or the identification information after the S-NSSAI mapping.
- the first identifier can be GPSI, where either allows or
- the network slice that the first UE is to be allowed to access includes the first network slice, that is, the allowed NSSAI or pending NSSAI of the first UE (the first UE can be allowed to access after authentication and authorization) includes the S-NSSAI of the first network slice;
- the access and mobility management function AMF network element sends second information, the second information includes first slice control information, and the first slice control information is information used to control the use of the first network slice by the first UE.
- the method further includes: when it is determined that the first slice control information is changed, sending third information to the AMF network element, the third information includes the second slice control information, and the first slice control information is changed.
- the second slice control information is used to update information used to control the use of the first network slice by the first UE.
- the network slice that the second UE is allowed or to be allowed to access includes the first network slice, and when it is determined that the slice control information of the second UE in the first network slice is changed, The third information further includes third slice control information, and the third slice control information is used to update information used for controlling the second UE to use the first network slice.
- the AAA server can adjust the slice control information of multiple UEs in one signaling exchange, thereby reducing the signaling overhead of the AAA server.
- the network slice that the second UE is allowed or to be allowed to access includes the second network slice, and when it is determined that the slice control information of the second UE in the second network slice is changed, The third information further includes fourth slice control information, and the fourth slice control information is used to update information for controlling the second UE to use the second network slice.
- the AAA server can adjust the slice control information of multiple UEs in one signaling exchange, thereby reducing the signaling overhead of the AAA server.
- the first information further includes a second identifier of the first UE, where the second identifier is an identifier of the first UE in the first network slice.
- the first information is carried in the authorization request message of the first network slice, and the second information is carried in the authorization response message of the first network slice; or, the first information is carried in In the authentication and authorization request message of the first network slice, the second information is carried in the authentication and authorization response message of the first network slice.
- a network slicing control method which is applied to an authentication and authorization network element, and the authentication and authorization network element may be an AUSF network element, a NEF network element, an NSSAAF network element, or other network elements used for authentication and authorization processes,
- the method includes: receiving first information from an AMF network element of an access and mobility management function, the first information including slice information of a first network slice and a first identifier of a first user equipment UE, and the slice information can be used to determine the first Network slice, for example, the slice information may be S-NSSAI or identification information after the S-NSSAI mapping, the first identifier may be GPSI, and the network slice that is allowed or to be allowed to be accessed by the first UE includes the first network slice, that is The allowed NSSAI or pending NSSAI of the first UE (the first UE can be allowed to access after authentication and authorization) includes the S-NSSAI of the first network slice; the first forwarding information is sent to the authentication, authorization, and accounting
- the slice information is S-NSSAI
- the first forwarding information includes the conversion information of the slice information (that is, according to S-NSSAI).
- NSSAI obtains the identification information after S-NSSAI mapping), or the slice information is S-NSSAI, the first forwarding information contains the slice information (ie S-NSSAI), or the slice information is the identifier after S-NSSAI mapping Information, the first forwarding information contains the slice information (identification information after S-NSSAI mapping);
- the second information is received from the AAA server, the second information includes the first slice control information, and the first slice control information is Information used to control the use of the first network slice by the first UE; sending second information to the AMF network element.
- the method further includes: receiving third information from the AAA server, the third information includes second slice control information, and the second slice control information is used to update the first UE to the second slice control information.
- the third information includes second slice control information
- the second slice control information is used to update the first UE to the second slice control information. 1.
- Use information of a network slice send third forwarding information to the AMF network element, and the third forwarding information includes second slice control information.
- the network slice to which the second UE is allowed or to be allowed to access includes the first network slice
- the third information further includes third slice control information
- the third forwarding information further includes the third network slice.
- the slice control information, and the third slice control information is used to update information used to control the use of the first network slice by the second UE.
- the network slice that the second UE is allowed or to be allowed to access includes the second network slice
- the third information further includes fourth slice control information
- the method further includes: The AMF network element of the second network slice sends fourth forwarding information, where the fourth forwarding information includes fourth slice control information, and the fourth slice control information is used to update information used for controlling the second UE to use the second network slice.
- the first information further includes at least one of the following; the second identifier of the first UE, the AAA server identifier; wherein, the second identifier means that the first UE is in the first network slice
- the first forwarding information may also include: the second identifier of the first UE.
- the first information is carried in the authorization request message of the first network slice
- the second information sent to the AMF network element is carried in the authorization response message of the first network slice.
- a communication device which serves as an access and mobility management function AMF network element or a built-in chip of the AMF network element.
- the device includes: a sending unit configured to send first information, the first information including the first The slice information of the network slice and the first identifier of the first user equipment UE, where the network slice that the first UE is allowed or to be allowed to access includes the first network slice; the receiving unit is configured to receive authentication, authorization, and accounting AAA
- the second information of the server, the second information includes first slice control information, and the first slice control information is information used to control the use of the first network slice by the first UE.
- the sending unit is further configured to send the first slice control information to the unified data management UDM network element.
- the sending unit is further configured to send the first slice control information to the policy control function PCF network element; the receiving unit is further configured to receive authorized slice control information from the PCF network element.
- the sending unit is further configured to send authorized slice control information to the unified data management UDM network element.
- the receiving unit is further configured to: receive third information, where the third information includes second slice control information, and the second slice control information is used to update the second slice control information used to control the first UE to Information used by a network slice.
- the network slice to which the second UE is allowed or to be allowed to access includes the first network slice
- the third information further includes third slice control information
- the third slice control information is used for updating Information used to control the use of the first network slice by the second UE.
- the apparatus further includes: a processing unit, configured to store information used to control the use of the first network slice by the first UE in the context of the first UE.
- the receiving unit is further configured to obtain authorization indication information of the network slice that the first UE is allowed to access; the processing unit is further configured to determine that the first network slice requires authorization according to the authorization indication information .
- the receiving unit is further configured to: obtain authorization indication information locally; or obtain the subscription information of the first UE from the unified data management UDM network element, where the subscription information includes authorization indication information ; Or, obtain authorization indication information from the network element of the network slice selection function NSSF.
- the first information further includes a second identifier of the first UE, where the second identifier is an identifier of the first UE in the first network slice.
- the network slice allowed or to be allowed to be accessed by the first UE includes at least one network slice, at least one network slice includes the first network slice, and the receiving unit is further configured to: The UE obtains the second identifier of the first UE in each network slice of the at least one network slice.
- a communication device which serves as an authentication, authorization, and accounting AAA server or a built-in chip of the AAA server.
- the device includes: a receiving unit for receiving first information, where the first information includes the first The slice information of the network slice and the first identifier of the first user equipment UE, where the network slice to which the first UE is allowed or to be allowed to access includes the first network slice; the sending unit is configured to provide access and mobility management functions
- the AMF network element sends second information, where the second information includes first slice control information, and the first slice control information is information used to control the use of the first network slice by the first UE.
- the sending unit is further configured to: when it is determined that the first slice control information is changed, send third information to the AMF network element, and the third The information includes second slice control information, and the second slice control information is used to update information used to control the use of the first network slice by the first UE.
- the network slice that the second UE is allowed or to be allowed to access includes the first network slice, and when it is determined that the slice control information of the second UE in the first network slice is changed,
- the third information further includes third slice control information, and the third slice control information is used to update information used for controlling the second UE to use the first network slice.
- the network slice that the second UE is allowed or to be allowed to access includes the second network slice, and when it is determined that the slice control information of the second UE in the second network slice is changed,
- the third information further includes fourth slice control information, and the fourth slice control information is used to update information for controlling the second UE to use the second network slice.
- the first information further includes a second identifier of the first UE, where the second identifier is an identifier of the first UE in the first network slice.
- the slice information includes: single network slice selection auxiliary information S-NSSAI of the first network slice.
- the first identifier includes: a general public user identifier GPSI.
- the first information is carried in the authorization request message of the first network slice, and the second information is carried in the authorization response message of the first network slice; or, the first information is carried in In the authentication and authorization request message of the first network slice, the second information is carried in the authentication and authorization response message of the first network slice.
- a communication device which is used as an authentication and authorization network element or a built-in chip for the authentication and authorization network element.
- the authentication and authorization network element may be an AUSF network element, a NEF network element, a NAASSF network element, or other network elements used for authentication and authorization.
- the network element of the authorization process includes: a receiving unit for receiving first information from the access and mobility management function AMF network element, the first information includes the slice information of the first network slice and the first user equipment UE An identifier, the network slice that the first UE is allowed or to be allowed to access includes the first network slice; the sending unit is configured to send the first forwarding information to the authentication, authorization, and accounting AAA server, and the first forwarding information includes the first UE’s The first identifier, and the slice information or the conversion information of the slice information; the receiving unit is further configured to receive the second information from the AAA server, the second information includes the first slice control information, and the first slice control information is used for To control the information used by the first UE on the first network slice; the sending unit is also used to send second information to the AMF network element.
- the slice information includes: single network slice selection auxiliary information S-NSSAI of the first network slice.
- the first identifier includes: a general public user identifier GPSI.
- the receiving unit is further configured to receive third information from the AAA server, the third information includes second slice control information, and the second slice control information is used to update the first UE to the second slice control information.
- a network slice usage information; the sending unit is further configured to send third forwarding information to the AMF network element, where the third forwarding information includes second slice control information.
- the network slice that the second UE is allowed or to be allowed to access includes the first network slice
- the third information further includes third slice control information
- the third forwarding information further includes the third network slice.
- the slice control information, and the third slice control information is used to update information used to control the use of the first network slice by the second UE.
- the network slice to which the second UE is allowed or to be allowed to access includes the second network slice
- the third information further includes fourth slice control information
- the sending unit is further configured to:
- the AMF network element of the second network slice sends fourth forwarding information, where the fourth forwarding information includes fourth slice control information, and the fourth slice control information is used to update information used for controlling the second UE to use the second network slice.
- the slice information includes: single network slice selection auxiliary information S-NSSAI of the first network slice.
- the first identifier includes: a general public user identifier GPSI.
- the first information further includes at least one of the following; the second identifier of the first UE, the AAA server identifier; wherein, the second identifier means that the first UE is in the first network slice
- the first forwarding information also includes: the second identifier of the first UE.
- the first information is carried in the authorization request message of the first network slice
- the second information sent to the AMF network element is carried in the authorization response message of the first network slice.
- a communication device serves as an access and mobility management function AMF network element or a built-in chip of the AMF network element, and includes a processor and a communication interface.
- the processor is used to run a computer program or instruction to enable the The apparatus implements the network slicing control method as provided in the first aspect or any possible implementation manner of the first aspect.
- a communication device is provided.
- the device is used as an authentication, authorization, and accounting AAA server or a built-in chip of the AAA server, and includes a processor and a communication interface.
- the processor is used to run computer programs or instructions to enable the device to implement A network slicing control method as provided in the second aspect or any possible implementation manner of the second aspect.
- a communication device which serves as an authentication and authorization network element or a built-in chip of the authentication and authorization network element.
- the authentication and authorization network element may be an AUSF network element, a NEF network element, a NAASSF network element, or other network elements used for authentication and authorization.
- the network element of the authorization process includes a processor and a communication interface.
- the processor is used to run computer programs or instructions to enable the device to implement the network slicing provided by the third aspect or any one of the possible implementation manners of the third aspect. Control Method.
- a communication system includes: access and mobility management function AMF network element, authentication and authorization network element, authentication, authorization and accounting AAA server; wherein, the AMF network element is the fourth aspect and the first Any possible implementation of the fourth aspect, or the AMF network element provided by the seventh aspect, and the AAA server is any of the fifth aspect, any possible implementation of the fifth aspect, or the AAA server provided by the eighth aspect ,
- the authentication and authorization network element is the sixth aspect, any possible implementation manner of the sixth aspect, or the authentication and authorization network element provided by the ninth aspect.
- a network slicing control method is provided, which is applied to an access and mobility management function AMF network element or a session management function SMF network element.
- the method includes: determining the number of user equipment UEs accessed on the network slice and/ Or the number of protocol data unit PDU sessions; when the first reporting condition is met, the first information is sent, and the first information includes the number of UEs and/or the number of PDU sessions.
- the AMF network element or the SMF network element may send first information, the first information includes the number of UEs accessed by the network slice and/or the number of PDU sessions, and the AAA-S may receive the first information, such that AAA- S can perceive the resource usage of the network slice, and control the resources of the network slice based on the number of UEs and/or the number of PDU sessions included in the first information, thereby realizing the control of the network slice and improving the flexibility of network slice control And user experience.
- the method before determining the number of UEs and/or the number of PDU sessions accessed on the network slice, the method further includes: acquiring first configuration information, where the first configuration information includes the network slice
- the single network slice selection auxiliary information S-NSSAI and authorization indication information are used to indicate whether slice resource control needs to be performed.
- the AMF network element or the SMF network element can dynamically report the first information in the authorization process of the network slicing, and the AAA server can dynamically adjust the configuration information of the network slicing, thereby improving the network The flexibility and user experience of slice control.
- the first configuration information further includes a first report condition
- the first report condition includes at least one of the following conditions: the number of UEs reaches the first preset value, and the PDU The number of sessions reaches the second preset value, the increase in the number of UEs reaches the third preset value, the increase in the number of PDU sessions reaches the fourth preset value, the reporting period, and the increase in the number of UEs in the time window reaches the first
- the fifth preset value, or the increase in the number of PDU sessions within the time window reaches the sixth preset value.
- the AMF network element or the SMF network element may be caused to dynamically report the first information according to the first report condition.
- the method further includes: receiving second configuration information, where the second configuration information is used to control resources of the network slice.
- the AAA server can dynamically adjust the configuration information of the network slice through the second configuration information, thereby improving the flexibility of network slice control and user experience.
- the second configuration information includes at least one of the following: a second reporting condition, the number of remaining UEs accessible by the network slice, and the remaining PDU sessions accessible by the network slice
- the number of UEs reaches the seventh preset value
- the increase of the number of PDU sessions reaches the eighth preset value
- the number of UEs in the time window reaches the ninth preset value, or the number of PDU sessions in the time window
- the increase reaches the tenth preset value
- the second reporting condition is used to indicate a condition for reporting the first information of the network slice next time.
- the AAA server can dynamically adjust the reporting condition of the first information through the second configuration information.
- sending the first information includes: sending an authorization request message to the authentication and authorization network element, where the authorization request message includes the first information; correspondingly Yes, receiving the second configuration information includes: receiving an authorization response message sent by an authentication and authorization network element, where the authorization response message includes the second configuration information.
- the AMF network element can dynamically report the first information in the authorization process of the network slicing, and the AAA server can dynamically adjust and control the network slicing, thereby improving the flexibility of network slicing control and user experience.
- sending the first information includes: sending the first information to the AAA server through the UPF network element; correspondingly, receiving the second configuration
- the information includes: receiving the second configuration information from the AAA server through the UPF network element.
- a network slicing control method is provided, which is applied to an AAA server for authentication, authorization, and accounting.
- the method includes: receiving first information, where the first information includes the number of user equipment UEs accessed on the network slicing and/ Or the number of protocol data unit PDU sessions.
- the method before receiving the first information, further includes: sending first configuration information, where the first configuration information is used to configure resources of the network slice, and the first configuration information includes the network slice The single network slice selection auxiliary information S-NSSAI and authorization indication information.
- the first configuration information further includes a first reporting condition of the first information, and the first reporting condition includes at least one of the following conditions: the number of UEs reaches the first preset Value, the number of PDU sessions reaches the second preset value, the increase in the number of UEs reaches the third preset value, the increase in the number of PDU sessions reaches the fourth preset value, the reporting period, the number of UEs in the time window The increase amount reaches the fifth preset value, or the increase amount of the number of PDU sessions within the time window reaches the sixth preset value.
- the method further includes: determining to send second configuration information according to the number of UEs and/or the number of PDU sessions, where the second configuration information is used to control the resources of the network slice.
- the second configuration information includes at least one of the following: a second reporting condition, the number of remaining UEs accessible by the network slice, and the remaining PDU sessions accessible by the network slice.
- the number of UEs reaches the seventh preset value, the increase of the number of PDU sessions reaches the eighth preset value, and the number of UEs in the time window reaches the ninth preset value, or the number of PDU sessions in the time window
- the increase reaches the tenth preset value
- the second reporting condition is used to indicate a condition for reporting the first information of the network slice next time.
- receiving the first information includes: receiving a first message from an authentication and authorization network element, the first message includes the first information, and the first information is an authorization request by the AMF network element
- the message is sent to the authentication and authorization network element;
- sending the second configuration information includes: sending a second message to the authentication and authorization network element, the second message includes the second configuration information, so that the authentication and authorization network element sends the authorization response message to the authentication and authorization network element.
- the second configuration information is sent to the AMF network element.
- receiving the first information includes: receiving the first information from the SMF through the UPF network element; correspondingly, sending the second configuration information includes: sending the second configuration information to the SMF through the UPF network element Send the second configuration information.
- a communication device which is an access and mobility management AMF network element, a chip built in an AMF network element, a session management function SMF network element, or a chip built in an SMF network element, the device includes: a processing unit , Used to determine the number of user equipment UEs accessed on the network slice and/or the number of protocol data unit PDU sessions; the sending unit, used to send first information when the first reporting condition is met, the first information including the number of UEs and / Or the number of PDU sessions.
- the device further includes: a receiving unit configured to obtain first configuration information, the first configuration information including single network slice selection auxiliary information S-NSSAI and authorization of the network slice Indication information, the authorization indication information is used to indicate whether slice resource control needs to be performed.
- the first configuration information further includes a first report condition
- the first report condition includes at least one of the following conditions: the number of UEs reaches the first preset value, and the PDU The number of sessions reaches the second preset value, the increase in the number of UEs reaches the third preset value, the increase in the number of PDU sessions reaches the fourth preset value, the reporting period, and the increase in the number of UEs in the time window reaches the first
- the fifth preset value, or the increase in the number of PDU sessions within the time window reaches the sixth preset value.
- the device further includes: a receiving unit, configured to receive second configuration information, where the second configuration information is used to control resources of the network slicing.
- the second configuration information includes at least one of the following: a second reporting condition, the number of remaining UEs accessible by the network slice, and the remaining PDU sessions accessible by the network slice.
- the number of UEs reaches the seventh preset value, the increase of the number of PDU sessions reaches the eighth preset value, and the number of UEs in the time window reaches the ninth preset value, or the number of PDU sessions in the time window
- the increase reaches the tenth preset value
- the second reporting condition is used to indicate a condition for reporting the first information of the network slice next time.
- the sending unit is further configured to: send an authorization request message to the authentication and authorization network element, and the authorization request message includes First information; correspondingly, the receiving unit is further configured to receive an authorization response message sent by an authentication and authorization network element, where the authorization response message includes the second configuration information.
- the sending unit when the device is applied to an SMF network element or a chip built into the SMF network element, the sending unit is further configured to send the first information to the AAA server through the UPF network element; correspondingly, the receiving unit is further configured to receive the second configuration information from the AAA server through the UPF network element.
- a communication device is provided.
- the device is an authentication, authorization, and accounting AAA server or a chip built in the AAA server.
- the device includes a receiving unit for receiving first information, where the first information includes a network slice The number of connected user equipment UEs and/or the number of protocol data unit PDU sessions.
- the device further includes: a sending unit, configured to send first configuration information, the first configuration information is used to configure resources of the network slice, and the first configuration information includes information about the network slice.
- a sending unit configured to send first configuration information
- the first configuration information is used to configure resources of the network slice
- the first configuration information includes information about the network slice.
- the first configuration information further includes a first reporting condition of the first information, and the first reporting condition includes at least one of the following conditions: the number of UEs reaches the first preset Value, the number of PDU sessions reaches the second preset value, the increase in the number of UEs reaches the third preset value, the increase in the number of PDU sessions reaches the fourth preset value, the reporting period, the number of UEs in the time window The increase amount reaches the fifth preset value, or the increase amount of the number of PDU sessions within the time window reaches the sixth preset value.
- the device further includes: a sending unit, configured to determine to send second configuration information according to the number of UEs and/or the number of PDU sessions, and the second configuration information is used to control the network Sliced resources.
- the second configuration information includes at least one of the following: a second reporting condition, the number of remaining UEs accessible by the network slice, and the remaining PDU sessions accessible by the network slice.
- the number of UEs reaches the seventh preset value, the increase of the number of PDU sessions reaches the eighth preset value, and the number of UEs in the time window reaches the ninth preset value, or the number of PDU sessions in the time window
- the increase reaches the tenth preset value
- the second reporting condition is used to indicate a condition for reporting the first information of the network slice next time.
- the receiving unit is further configured to: receive a first message from an authentication and authorization network element, the first message includes first information, and the first information is an authorization request message passed by the AMF network element
- the sending unit is further configured to: send a second message to the authentication and authorization network element, the second message including the second configuration information, so that the authentication and authorization network element configures the second configuration through the authorization response message The information is sent to the AMF network element.
- the receiving unit is further configured to: receive the first information from the SMF through the UPF network element; correspondingly, the sending unit is further configured to: send the second information to the SMF through the UPF network element Configuration information.
- a communication device serves as an access and mobility management function AMF network element, a built-in chip of the AMF network element, a session management function SMF network element, or a built-in chip of the SMF network element, including a processor and communication An interface, the processor is used to run a computer program or instruction, so that the device implements the network slice control method as provided by the eleventh aspect or any one of the possible implementation manners of the eleventh aspect.
- a communication device is provided.
- the device is used as an authentication, authorization, and accounting AAA server or a built-in chip of the AAA server includes a processor and a communication interface, and the processor is used to run a computer program or instruction to enable the device to implement
- a computer program or instruction to enable the device to implement
- a communication system includes: access and mobility management function AMF network element/session management function SMF network element, authentication, authorization and accounting AAA server; wherein, AMF network element/SMF network element Yuan is the thirteenth aspect, any possible implementation of the thirteenth aspect, or the communication device provided by the fifteenth aspect; the AAA server is any possible implementation of the fourteenth aspect and the fourteenth aspect Or the communication device provided by the sixteenth aspect.
- a readable storage medium is provided, and instructions are stored in the readable storage medium.
- the instructions in the readable storage medium are executed on a device, the device executes operations such as the first aspect, Or the network slicing control method provided by any possible implementation of the first aspect.
- a readable storage medium is provided, and instructions are stored in the readable storage medium.
- the instructions in the readable storage medium run on a device, the device executes the second aspect, Or the network slicing control method provided by any possible implementation of the second aspect.
- a readable storage medium is provided, and instructions are stored in the readable storage medium.
- the instructions in the readable storage medium are executed on a device, the device executes the third aspect, Or the network slicing control method provided by any possible implementation manner of the third aspect.
- a computer program product including instructions is provided.
- the instructions When the instructions are executed on a device, the device executes as provided in the first aspect or any one of the possible implementation manners of the first aspect. Network slicing control method.
- a computer program product including instructions is provided.
- the instructions When the instructions are executed on a device, the device executes as provided by the second aspect or any of the possible implementation manners of the second aspect. Network slicing control method.
- a computer program product including instructions is provided.
- the instructions run on a device, the device executes the third aspect or any one of the possible implementations of the third aspect.
- Network slicing control method When the instructions run on a device, the device executes the third aspect or any one of the possible implementations of the third aspect.
- a readable storage medium is provided, and instructions are stored in the readable storage medium.
- the instructions in the readable storage medium are executed on a device, the device executes the eleventh aspect.
- the network slicing control method provided by any possible implementation manner of the eleventh aspect.
- a readable storage medium having instructions stored in the readable storage medium, and when the instructions in the readable storage medium are executed on a device, the device is caused to perform operations as described in the twelfth aspect , Or the network slicing control method provided by any possible implementation of the twelfth aspect.
- a computer program product including instructions is provided.
- the instructions run on a device, the device executes the eleventh aspect or any possible implementation manner of the eleventh aspect
- the provided network slicing control method is provided.
- a computer program product including instructions is provided.
- the instructions run on a device, the device executes the twelfth aspect or any possible implementation manner of the twelfth aspect
- the provided network slicing control method is provided.
- FIG. 1 is a schematic structural diagram of a communication system provided by an embodiment of this application.
- FIG. 2 is a schematic flowchart of a first network slicing control method provided by an embodiment of this application;
- FIG. 3 is a schematic flowchart of a second network slicing control method provided by an embodiment of this application.
- FIG. 4 is a schematic diagram of a third information transmission provided by an embodiment of this application.
- FIG. 5 is a schematic flowchart of a third network slicing control method provided by an embodiment of this application.
- FIG. 6 is a schematic flowchart of a fourth network slicing control method provided by an embodiment of this application.
- FIG. 7 is a schematic flowchart of a fifth network slicing control method provided by an embodiment of this application.
- FIG. 8 is a schematic flowchart of a sixth network slicing control method provided by an embodiment of this application.
- FIG. 9 is a schematic structural diagram of an AMF network element provided by an embodiment of this application.
- FIG. 10 is a schematic structural diagram of another AMF network element provided by an embodiment of this application.
- FIG. 11 is a schematic structural diagram of an authentication and authorization network element provided by an embodiment of this application.
- FIG. 12 is a schematic structural diagram of another authentication and authorization network element provided by an embodiment of this application.
- FIG. 13 is a schematic structural diagram of an AAA-S network element provided by an embodiment of this application.
- FIG. 14 is a schematic structural diagram of another AAA-S provided by an embodiment of the application.
- At least one refers to one or more, and “multiple” refers to two or more.
- And/or describes the association relationship of the associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, and B exists alone, where A, B can be singular or plural.
- the character “/” generally indicates that the associated objects before and after are in an “or” relationship.
- At least one item (a) in the following” or similar expressions refers to any combination of these items, including any combination of a single item (a) or a plurality of items (a).
- At least one of a, b, or c can represent: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, and c can be single or multiple.
- words such as “first” and “second” do not limit the number and execution order.
- Network slice also known as a slice network, or simply as a slice, refers to the physical or virtual network infrastructure, customized according to the service requirements of different tenants (tenant) Logical network.
- a network slice can be a complete end-to-end network including user equipment (UE), access network, transmission network, core network, and service server, or it can include only the core network but supplemented by UE and access network.
- the complete end-to-end network of the transmission network and the service server can provide complete communication services and have certain network capabilities.
- Network slicing can be a communication resource that guarantees that the bearer business or service can meet the service level agreement requirements, or it can be considered as The combination of network functions and communication resources required to complete a certain communication service or certain communication services.
- a network slice can be identified by single network slice selection assistance information (S-NSSAI).
- S-NSSAI is composed of a slice/service type (SST) and a slice differentiator (SD).
- SST and SD can be defined by standards or operators; SD is optional information that supplements SST to distinguish multiple network slices of the same SST, for example, it can be used to characterize the ownership of network slices.
- SST and SD can be defined by standards or operators; SD is optional information that supplements SST to distinguish multiple network slices of the same SST, for example, it can be used to characterize the ownership of network slices.
- Table 1 The types and functions of NSSAI defined in the 23.501 standard are shown in Table 1 below.
- pending NSSAI may also be called the NSSAI that requires authentication and authorization or the NSSAI to be processed.
- the pending NSSAI can be included in the allowed NSSAI after passing the authentication and authorization, that is, the pending NSSAI can allow the UE to access after passing the authentication and authorization.
- Protocol data unit (PDU) session (session): the association between the UE and a data network to provide a PDU connection service.
- a PDU session may include one or more quality of service (QoS) flows.
- QoS flow refers to a data transmission channel that a UE meets a specific QoS quality requirement in the communication system (for example, a 5G network or a 5G communication system), and can be identified by a QoS flow identity (QFI).
- QFI QoS flow identity
- a PDU session can contain the following attribute information: data network name (DNN), address information (such as internet protocol (IP) address, media access control (MAC)) Address, etc.), S-NSSAI, service and session continuity (service and session continuity, SSC) mode, etc.
- DNN data network name
- address information such as internet protocol (IP) address, media access control (MAC)) Address, etc.
- S-NSSAI service and session continuity (service and session continuity, SSC) mode, etc.
- a PDU session is usually identified by the PDU session identifier, and the PDU session identifier can be allocated by the UE.
- the communication system includes: a UE, a radio access network (RAN/AN), and a core network. Furthermore, the communication system may also include a data network (DN), which may refer to a service network that provides users with data transmission services, such as IP multi-media service (IMS), internet, etc. .
- DN data network
- IMS IP multi-media service
- the UE can be a terminal equipment (TE), handheld terminal, notebook computer, subscriber unit, cellular phone, smart phone, wireless data card, personal digital assistant (personal digital assistant).
- digital assistant, PDA personal digital assistant
- PDA personal digital assistant
- tablet computers tablet computers
- vehicle terminals wearable devices
- wireless modems handheld devices
- laptop computers cordless phones
- wireless local loops wireless local loop, WLL
- MTC machine type communication
- the UE and the access network equipment use a certain air interface technology to communicate with each other.
- the access network is used to implement functions related to wireless access, and the access network may include a third generation partnership project (3rd generation partnership project, 3GPP) access network and a non-3GPP access network.
- Access network equipment may refer to equipment that provides access services for UEs, including RAN equipment and AN equipment.
- the RAN device is mainly a wireless network device in the 3GPP network, and the AN may be an access network device defined by non-3GPP.
- the RAN equipment is mainly responsible for functions such as radio resource management, quality of service (QoS) management, data compression, and encryption on the air interface side.
- the RAN equipment may include various forms of base stations, such as macro base stations, micro base stations (also called small stations), relay stations, and access points.
- the names of devices with base station functions may be different.
- RAN 5th generation
- gNB 5G NodeB
- eNB evolved NodeB
- 3rd generation, 3G 3rd generation
- AN equipment allows the UE and the 3GPP core network to use non-3GPP technologies for interconnection and intercommunication.
- non-3GPP technologies such as wireless fidelity (Wi-Fi), worldwide interoperability for microwave access, WiMAX ), code division multiple access (CDMA) networks, etc.
- the core network may include the following logical network elements: session management function (SMF) network element, access and mobility management function (access and mobility management function, AMF network element) network element, authentication server function (authentication server function, AUSF) network element, user plane function (UPF) network element, application function (AF) network element, unified data management (UDM) network element, policy control function (policy control Function, PCF) network element, network storage function (network repository function, NRF) network element, network exposure function (NEF) network element, and network slice selection function (network slice selection function, NSSF network element) Network elements, etc.
- SMF session management function
- AMF access and mobility management function
- AMF authentication server function
- UPF user plane function
- AF application function
- UDM unified data management
- policy control Function policy control Function
- PCF policy control Function
- NRF network repository function
- NRF network exposure function
- NSSF network element
- the control plane network element of the core network is mainly responsible for session management in the mobile network, such as session establishment, modification, and release; specific functions such as assigning IP addresses to users and selecting UPF that provides message forwarding functions.
- the core network control plane network element is mainly responsible for the mobility management in the mobile network, such as user location update, user registration network, user handover, etc.
- AUSF network element a core network control plane network element, a control plane network element provided by an operator, used to perform authentication, for example, to perform 3GPP network authentication for its subscribers.
- the user plane network element of the core network is responsible for the forwarding and receiving of user data in the UE. It can receive user data from the DN and transmit it to the UE through the access network equipment; the UPF network element can also be transmitted from the access network equipment through the access network equipment. The UE receives the user data and forwards it to the DN.
- AF network element It mainly supports interaction with the 3GPP core network to provide services, such as influencing data routing decisions, policy control functions, or providing third-party services to the network side.
- UDM network element core network control plane network element, used to store user subscription data, generate authentication credential, user identification processing (for example, storage and management of user permanent identities, etc.), access authorization control and subscription data management, etc.
- PCF network element the core network control plane network element, which mainly supports the provision of a unified policy framework to control network behavior, provides policy rules to the control layer network function, and is responsible for obtaining user subscription information related to policy decisions.
- NRF network element core network control plane network element, used to support the service discovery function, and can also be used to maintain the information of the available network function network elements and the services they support.
- NEF network element The control plane network element of the core network, which is mainly used to open the mobile network capabilities to the outside world.
- NSSF network element core network control plane network element, mainly used for 5G slicing services, for example, responsible for the selection of target network slice instance (NSI).
- NSI target network slice instance
- the NSSF network element may also be replaced with a network slice specific authentication and authorization function (network slice specific authentication and authorization function, NSSAAF) network element.
- NSSAAF network slice specific authentication and authorization function
- a network slice-specific authentication and authorization function network slice-specific authentication and authorization function, NSSAAF
- NSSAAF network slice-specific authentication and authorization function
- the UE can communicate with the AMF network element through the N1 interface
- the R(AN) device can communicate with the AMF network element through the N2 interface
- the R(AN) device can communicate with the UPF network element through the N3 interface.
- UPF network element can communicate with DN through N4 interface.
- the network elements in the core network can communicate through a service interface.
- the service interface can include: N NSSF interface, N nef interface, N nrf interface, N pcf interface, N udm interface, N af interface, N ausf interfaces, N AMF N nsm interfaces and interfaces.
- the communication system may also include: an authentication, authorization and accounting (authentication authorization and accounting, AAA) server, and the AAA server (server) may also be referred to as AAA-S.
- AAA-S can communicate with AMF network elements through intermediate network elements that support communication between AAA-S and AMF network elements.
- the intermediate network elements can be AUSF network elements, NEF network elements, NSSAAF network elements, or other authentication and authorization processes. Network elements, etc.
- the communication system may also include: authentication, authorization and accounting proxy (authentication authorization and accounting proxy, AAA-P).
- AAA-S When AAA-S communicates with AMF network element, AAA-S can communicate with AAA-P first, and AAA-P will send the communication information of AAA-S through intermediate network elements such as AUSF network element, NEF network element or NSSAAF network element To the AMF network element; similarly, the AMF network element sends the communication information to the AAA-P through the AUSF network element, the NEF network element, or the NSSAAF network element and other intermediate network elements, and the AAA-P sends the communication information to the AAA-S.
- intermediate network elements such as AUSF network element, NEF network element or NSSAAF network element
- FIG. 2 is a schematic flowchart of a network slicing control method provided by an embodiment of the application. The method can be applied to the communication system described in FIG. 1. The method includes the following steps.
- the AMF network element sends the first information so that the AAA-S receives the first information.
- the first information includes the slice information of the first network slice and the first identifier of the first UE, where the first UE is allowed or to be allowed to access
- the incoming network slice includes the first network slice.
- the slice information of the first network slice may be used to identify, select, or determine the first network slice.
- the slice information may be the S-NSSAI of the first network slice, or the slice information may be the S-NSSAI of the first network slice.
- -NSSAI mapped identification information may be referred to as a mapping identification.
- the mapping identification is used to identify a network slice by an external network or a third-party network, and may also be referred to as a slice external identification.
- the first identifier of the first UE may be used to identify the first UE in the entire communication system.
- the first identifier of the first UE may be a generic public subscription identifier (GPSI) of the first UE.
- GPSI generic public subscription identifier
- the network slice (allowed NSSAI) that the first UE is allowed to access may include at least one network slice, that is, the allowed NSSAI may include one or more S-NSSAIs.
- the at least one network may include a first network slice, and the first network slice may be a network slice that requires authorization in the at least one network.
- the network slice (pending NSSAI that requires authentication and authorization or NSSAI to be processed) to be allowed to be accessed by the first UE may include at least one network slice, that is, the pending NSSAI may include one or more S-NSSAIs. .
- the at least one network slice may include the first network slice.
- the pending NSSAI can be included in the allowed NSSAI after passing the authentication and authorization, that is, the pending NSSAI can allow the UE to access after passing the authentication and authorization.
- the allowed and to-be-allowed NSSAIs are network slices temporarily allowed to be accessed by the first UE. If the network slices contained therein require authentication and authorization, then the network slices are slices waiting to be processed, and the network slices can only be processed after the authentication and authorization are passed.
- the UE can be allowed to access; otherwise, the UE is not allowed to access.
- the AMF network element may be an AMF network element serving the first UE.
- the AMF network element can also be replaced with other network elements capable of initiating the network slicing control process, which is not specifically limited in the embodiment of the present application.
- the AMF network element may send the first information to the authentication and authorization network element in the authorization process of the first network slice (that is, the first information may be carried in the authorization request Message), or send the first information to the authentication and authorization network element in the authentication and authorization process of the first network slice (that is, the first information may be carried in the authentication and authorization request message), the above-mentioned first information may include the information of the first network slice S-NSSAI and GPSI of the first UE.
- the authentication and authorization network element may send the first forwarding information to the AAA-S, and the first forwarding information may include the S-NSSAI of the first network slice and the GPSI of the first UE, Or the first forwarding information includes the mapping identifier of the first network slice and the GPSI of the first UE, and the first forwarding information may be information equivalent to the first information, so the first forwarding information may also be replaced with or referred to as first information .
- the authentication and authorization network element may send the first forwarding information to the AAA-P, and when the AAA-P receives the first forwarding information, the AAA-S P may send the first forwarding information to AAA-S.
- the first information or the first forwarding information received by the AAA-S may not include the slice information of the first network slice, for example, in the first information
- the S-NSSAI of the first network slice is not included.
- the authentication and authorization network element in the embodiment of the present application may be any network element with authentication and authorization functions that can support the communication between the AMF network element and the AAA-S.
- the authentication and authorization network element may be AUSF Network elements, NEF network elements, or NSSAAF network elements, etc., which are not specifically limited in the embodiment of the present application.
- the first information may also include a second identifier of the first UE in the first network slice, and the second identifier may be used to identify the first UE in the first network slice, for example, the first UE
- the second identifier of the UE may be a slice-specific ID of the first UE in the first network slice.
- the second identity of the first UE may be obtained by the AMF network element from the first UE.
- the AMF network element may The second identities of the first UE in multiple network slices that need to be authorized are acquired from the first UE, and one or more second identities can also be acquired from the first UE each time, through multiple acquisition processes to obtain The second identifier of the first UE in multiple network slices that need to be authorized.
- the first information sent by the AMF network element to the authentication and authorization network element may also include an AAA-S identifier, and the AAA-S identifier may be used for the authentication and authorization network element to address AAA.
- the first forwarding information sent by the authentication and authorization network element to AAA-P may also include the identity of the AAA-S and the identity of the AAA-S This AAA-P can be used to address AAA-S.
- the first information or the first forwarding information received by the AAA-S may not include the AAA-S identifier.
- the AAA-S may perform an authorization check according to the first information, and determine the first slice control information.
- the AAA-S may determine the first network slice according to the slice information of the first network slice, and thus according to the slice information of the first UE The first identifier performs authorization check on the first network slice; when the first information further includes the second identifier of the first UE, the AAA-S may also perform authorization check on the first network slice according to the second identifier of the first UE.
- the AMF network element determining that the first network slice requires authorization may include: the AMF network element obtains authorization indication information of the network slice that allows the first UE to access, and the authorization indication information may be used to indicate that the first UE is allowed to access. Whether the at least one incoming network slice requires authorization, so that the AMF network element can determine that the first network slice requires authorization according to the authorization indication information, that is, the first network slice is a network slice that requires authorization.
- the AMF network element may obtain the authorization indication information locally; or, the AMF network element may obtain the authorization indication information when obtaining the subscription information of the first UE. For example, the AMF network element may obtain the first UE from the UDM network element.
- the subscription information of the UE, the subscription information includes the authorization indication information; or, when the authorization indication information is stored in the NSSF network element, the AMF network element may also obtain the authorization indication information from the NSSF network element.
- the AAA-S sends second information so that the AMF network element receives the second information.
- the second information includes the first slice control information, and the first slice control information is used to control the first UE to the first network. Information used by the slice.
- the first slice control information may also be referred to as UE granularity slice control information.
- the first slice control information may include at least one of the following: slice aggregate maximum bit rate (slice aggregate maximum bit rate, slice-AMBR), slice maximum flow bit rate (slice maximum flow bit rate, slice-MFBR) , Slice guaranteed flow bit rate (slice-GFBR), slice-UE-AMBR (slice-UE-AMBR) of the first UE on the slice, and the maximum number of PDU sessions for the first UE on the slice.
- slice aggregate maximum bit rate is used to control the maximum aggregate bit rate of the non-GBR QoS flow on the UE slice.
- the slice maximum flow bit rate (slice maximum flow bit rate, slice-MFBR) is used to control the maximum aggregate bit rate of GBR QoS flow.
- the AMBR (slice-UE-AMBR) of the first UE on the slice is used to control the maximum aggregate bit rate of the non-GBR QoS flow and GBR QoS flow on the UE slice.
- GBR is the abbreviation of guaranteed bit rate in English.
- the AAA-S may send the second information to the authentication and authorization network element, or the AAA-S may send the second information to the authentication and authorization network element through AAA-P, and the above-mentioned second information may include the first slice Control information; optionally, the second information may also include the S-NSSAI of the first network slice or the external identifier of the first network slice.
- the authentication and authorization network element may send the second forwarding information to the AMF network element, and the second forwarding information may include the first slice control information; optionally, if the second The information includes the S-NSSAI of the first network slice, and the second forwarding information may also include the S-NSSAI of the first network slice.
- the second forwarding information may also include the external identifier of the first network slice or the S-NSSAI of the first network slice, and the S-NSSAI is determined according to the external identifier.
- the second forwarding information may be information equivalent to the second information, so the second forwarding information may also be replaced with or referred to as second information.
- the authentication and authorization network element may send an authorization response message to the AMF network element, and the authorization response message includes the second forwarding information; or, for example, the authentication and authorization in the first network slice
- the authentication and authorization network element may send an authentication and authorization response message to the AMF network element, and the authentication and authorization response message includes the second forwarding information.
- the AMF network element when the AMF network element receives the second information, the AMF network element may store the first slice control information included in the second information in the context of the first UE. In another possible embodiment, the AMF network element may send the first slice control information to the UDM network element. When the UDM network element receives the first slice control information, the UDM network element may store the first slice control information. The slice control information, for example, the UDM stores the first slice control information in the context information of the first UE. Optionally, the AMF network element may also send the second slice control information to the RAN device or the AN device.
- the AMF network element sends the first slice control information to the PCF network element, and the PCF network element may send authorized slice control information to the AMF network element, and the authorized slice control information is authorized Information used to control the use of the first network slice by the first UE, and the authorized slice control information may be the same as or different from the first slice control information. Further, when the AMF network element receives the authorized slice control information, the AMF network element stores the authorized slice control information in the context information of the first UE. In addition, the AMF network element may also send the authorized slice control information to the UDM network element, so that the UDM network element stores the authorized slice control information.
- the AMF network element reports the first information to the AAA-S, and the AAA-S delivers the first slice control information according to the first information, and the first slice control information is used to control the first UE
- the AAA-S can reasonably allocate slice control information to the first UE.
- the AMF network element can dynamically obtain the slice control information of the first UE, thereby improving network slice control. Flexibility and user experience.
- the method further includes: S203.
- the AAA-S determines that the first slice control information has changed, the AAA-S sends third information so that the AMF network element receives the third information, the third information includes the second slice control information, and the second The slice control information is used to update information used to control the use of the first network slice by the first UE.
- the AAA-S may send third information to the authentication and authorization network element, or the AAA-S may send third information to the authentication and authorization network element through AAA-P, and the third information may include second slice control information
- the third information may also include the first identifier of the first UE (for example, GPSI), and/or the slice information of the first network slice (for example, S-NSSAI, or slice external identifier).
- the authentication and authorization network element may send third forwarding information to the AMF network element, the third forwarding information may include the second slice control information, and the third forwarding information may be related to the first
- the three pieces of information are equivalent information, so that the third forwarding information can also be replaced or referred to as third information.
- the authentication and authorization network element may send an authorization notification message to the AMF network element, and the authorization notification message includes third forwarding information.
- the network slice that the second UE is allowed or to be allowed to access includes the first network slice, and when the AAA-S determines that the slice control information of the second UE in the first network slice is changed, the third information is also The third slice control information is included, and the third slice control information is used to update information used for controlling the second UE to use the first network slice.
- the network slice that the second UE is allowed or to be allowed to access includes the second network slice, and when the AAA-S determines that the slice control information of the second UE in the second network slice is changed, the third information further includes The fourth slice control information, the fourth slice control information is used to update information used to control the second UE to use the second network slice.
- the third forwarding information sent by the authentication and authorization network element to the AMF network element may also include fourth slice control information; if If the AMF network element serving the first UE is different from the AMF network element serving the second UE, the authentication and authorization network element may send fourth slice control information to the AMF network element serving the second UE, and to the AMF network element serving the first UE The third forwarding information sent by the network element does not include the fourth slice control information.
- the method includes: S1-S3b.
- S1.AAA-S determines that the slice control information of multiple UEs has changed.
- multiple UEs include UE1, UE2, UE3, and UE4, the AMF network element serving UE1 and UE2 is the AMF1 network element, and the serving UE3 and UE4 are The direct communication between AMF2 network element, AAA-S and authentication and authorization network element will be explained as an example;
- the AAA-S sends a first AAA protocol message to the authentication and authorization network element, the first AAA protocol message includes third information, and the third information includes slice control information lists of multiple UEs.
- the slice control information list includes UE1.
- the authentication and authorization network element sends a first authorization notification message to the AMF1 network element, the first authorization notification message includes ⁇ GPSI_1, S-NSSAI_1, slice control information 1 ⁇ and ⁇ GPSI_2, S-NSSAI_2, slice control information 2 ⁇ ;
- the authentication and authorization network element sends a second authorization notification message to the AMF2 network element.
- the second authorization notification message includes ⁇ GPSI_3, S-NSSAI_3, slice control information 3 ⁇ and ⁇ GPSI_4, S-NSSAI_4, slice control information 4 ⁇ .
- the AMF1 network element and the AMF2 network element can update the slice control information of the UE respectively and perform subsequent actions.
- the slice control information list sent by the AAA-S may also be in other formats.
- slice control information for different UEs in the same network slice may be in one piece of information in the slice control information list, or the same UE may be in different network slices.
- the slice control information in may be in a piece of information in the slice control information list, or the arrangement order of different information of the same UE may also be different, which is not specifically limited in the embodiment of the present application.
- the slice control information of UE1 and UE2 on the same network slice can be expressed as ⁇ S-NSSAI_1: GPSI 1, slice control information 1; GPSI2, slice control information 2 ⁇ ; or, UE1’s slice control information on different network slices It can be expressed as ⁇ GPSI1: S-NSSAI_1, slice control information 1; S-NSSAI_2, slice control information 2 ⁇ .
- the AMF network element uses the second slice control information in the third information to update the previously stored first slice control information or authorized slice control information to update the previously stored first slice control information or authorized slice control information For example, the AMF network element deletes the first slice control information or authorized slice control information in the context of the first UE, and stores the second slice control information in the context of the first UE.
- the AMF network element may also store the third slice control information in the context of the second UE, or use the third slice control information to update the second UE’s The slice control information of the second UE previously stored in the context.
- the AMF network element may also send the second slice control information to the UDM network element, so that the UDM network element updates the first slice control information of the subscription information of the first UE.
- the AMF network element sends the second slice control information to the PCF network element, so that the PCF network element performs authorization check on the second slice control information.
- the AMF network element may also send the second slice control information to the RAN device or the AN device.
- the network slicing control method provided in the embodiments of the present application can also be applied to the scenario where the AMF network element serving the first UE is switched, that is, the AMF network element serving the first UE is switched from the source AMF network element to the target AMF network. Yuan. Specifically, when the AMF network element serving the first UE is switched, the source AMF network element may send the context of the first UE to the target AMF network element, and the target AMF network element executes the steps of the AMF network element in the embodiment of this application. .
- the slice identifier can be mapped into a new identifier by the intermediate network element during the transmission process or the received identifier can be used directly, which is not specifically limited in the embodiment of the present application.
- the authentication and authorization network element communicates with AAA-S through AAA-P as an example for description.
- FIG. 5 is a schematic diagram of implementing network slicing control in the authorization process of the first network slicing according to an embodiment of the application. Specifically, the method includes: S01-S11.
- the first UE sends a registration request (registration request) message to the AMF network element;
- the AMF network element When the AMF network element receives the registration request message, the AMF network element obtains authorization indication information of the network slice that the first UE is allowed to access from the local, UDM network element, or NSSF network element;
- the AMF network element determines that the first network slice requires authorization according to the authorization indication information
- the AMF network element obtains the second identity of the first UE in the first network slice from the first UE;
- the AMF network element sends an authorize request message to the authentication and authorization network element, where the authorization request message includes first information.
- the first information may include the GPSI of the first UE and the S-NSSAI of the first network slice.
- the first information further includes the second identifier of the first UE;
- the authentication and authorization network element When the authentication and authorization network element receives the authorization request message, the authentication and authorization network element sends a first AAA protocol message to AAA-P, and the first AAA protocol message includes the first information;
- AAA-P When the AAA-P receives the first AAA protocol message, the AAA-P sends a second AAA protocol message to AAA-S, and the second AAA protocol message includes the first information;
- the AAA-S When the AAA-S receives the second AAA protocol message, the AAA-S sends a third AAA protocol message to the AAA-P, the third AAA protocol message includes the second information, and the second information includes the first slice control information;
- the AAA-P When the AAA-P receives the third AAA protocol message, the AAA-P sends a fourth AAA protocol message to the authentication and authorization network element, and the fourth AAA protocol message includes the second information;
- the authentication and authorization network element When the authentication and authorization network element receives the fourth AAA protocol message, the authentication and authorization network element sends an authorization response (authorize response) message to the AMF network element, where the authorization response message includes the second information;
- the AMF network element may store the first slice control information included in the second information, and perform subsequent actions.
- the method may also include: S12-S15.
- the AAA-S determines that the first slice control information has changed, the AAA-S sends a fifth AAA protocol message to the AAA-P.
- the fifth AAA protocol message includes the third information, and the third information includes the second slice. Control information
- the AAA-P sends a sixth AAA protocol message to the authentication and authorization network element, and the sixth AAA protocol message includes the third information;
- the authentication and authorization network element When the authentication and authorization network element receives the sixth AAA protocol message, the authentication and authorization network element sends an authorization notification (authorize notification) message to the AMF network element, where the authorization notification message includes the third information;
- the AMF network element may store the third information, that is, use the second slice control information included in the third information to update the first slice control information, and perform subsequent actions.
- FIG. 6 is a schematic diagram of implementing network slicing control in the authentication and authorization process of the first network slicing according to an embodiment of the application. Specifically, the method includes:
- the AMF network element determines that the first network slice needs to perform an authentication and authorization process
- the AMF network element sends a first non-access stratum (NAS) mobility management (mobility management, MM) transport message to the first UE, and the first NAS MM transport message includes an extended authentication protocol EAP (extensible authentication protocol, EAP) ID request (that is, information used to request EAP ID) and the S-NSSAI of the first network slice;
- NAS non-access stratum
- MM mobility management
- EAP extended authentication protocol
- the first UE When the first UE receives the first NAS MM transmission message, the first UE sends a second NAS MM transmission message to the AMF network element.
- the second NAS MM transmission message includes an EAP ID response (that is, used to respond to an EAP ID request Information) and the S-NSSAI of the first network slice;
- the AMF network element sends a first authentication request message to the authentication and authorization network element, the first authentication request message includes information A, and the information A includes the EAP ID response, the GPSI of the first UE, and the S-NSSAI of the first network slice;
- the authentication and authorization network element When the authentication and authorization network element receives the first authentication request message, the authentication and authorization network element sends a first AAA protocol message to AAA-P, and the first AAA protocol message includes an EAP ID response, GPSI, and S-NSSAI;
- AAA-P When the AAA-P receives the first AAA protocol message, the AAA-P sends a second AAA protocol message to AAA-S.
- the second AAA protocol message includes an EAP ID response, GPSI, and S-NSSAI;
- the third AAA protocol message includes information B, which includes S-NSSAI, GPSI, and EAP information;
- the AAA-P When the AAA-P receives the third AAA protocol message, the AAA-P sends a fourth AAA protocol message to the authentication and authorization network element, and the fourth AAA protocol message includes S-NSSAI, GPSI, and EAP information;
- the authentication and authorization network element receives the fourth AAA protocol message, the authentication and authorization network element sends a first authentication response message to the AMF network element, where the first authentication response message includes S-NSSAI, GPSI, and EAP information;
- the AMF network element When the AMF network element receives the first authentication response message, the AMF network element sends a third NAS MM transmission message to the first UE, and the third NAS MM transmission message includes S-NSSAI and EAP information;
- the first UE sends a fourth NAS MM transmission message to the AMF network element, and the fourth NAS MM transmission message includes S-NSSAI and EAP information;
- the AMF network element sends a second authentication request message to the authentication and authorization network element, the second authentication request message includes first information, and the first information includes EAP ID information, GPSI, and S-NSSAI;
- the authentication and authorization network element When the authentication and authorization network element receives the second authentication request message, the authentication and authorization network element sends a fifth AAA protocol message to AAA-P, and the fifth AAA protocol message includes the first information;
- AAA-P receives the fifth AAA protocol message
- AAA-P sends a sixth AAA protocol message to AAA-S, and the sixth AAA protocol message includes the first information
- the AAA-S When the AAA-S receives six AAA protocol messages, the AAA-S sends a seventh AAA protocol message to AAA-P, the seventh AAA protocol message includes second information, and the second information includes EAP success information , The first slice control information, optionally, the second information further includes S-NSSAI and/or GPSI;
- the AAA-P When the AAA-P receives the seventh AAA protocol message, the AAA-P sends an eighth AAA protocol message to the authentication and authorization network element, and the eighth AAA protocol message includes the second information;
- the authentication and authorization network element When the authentication and authorization network element receives the eighth AAA protocol message, the authentication and authorization network element sends a second authentication response message to the AMF network element, and the second authentication response message includes the second information;
- the AMF network element stores the first slice control information, and executes subsequent actions.
- steps S38 to S42 may also be executed, and S38-S42 are not shown in FIG. 6.
- the AMF network element sends a fifth NAS MM transmission message to the first UE, and the fifth NAS MM transmission message includes EAP success information and S-NSSAI;
- the AAA-S determines that the first slice control information has changed, the AAA-S sends a ninth AAA protocol message to the AAA-P.
- the ninth AAA protocol message includes the third information, and the third information includes the second slice. Control information
- the AAA-P sends a tenth AAA protocol message to the authentication and authorization network element, and the tenth AAA protocol message includes the third information;
- the authentication and authorization network element When the authentication and authorization network element receives the tenth AAA protocol message, the authentication and authorization network element sends an authorization notification (authorize notification) message to the AMF network element, where the authorization notification message includes third information;
- the AMF network element may use the second slice control information included in the third information to update the first slice control information, and perform subsequent actions.
- the AMF network element can trigger the authorization process of the first network slice, and dynamically obtain the slice control information of the first UE in the authorization process of the first network slice, or
- the AMF network element triggers the authentication and authorization process of the first network slice, and dynamically obtains the slice control information of the first UE in the authentication and authorization process of the first network slice;
- AAA-S can also dynamically adjust the first UE according to requirements Slicing control information, thereby improving the flexibility of network slicing control and user experience.
- FIG. 7 is a schematic flowchart of another network slicing control method provided by an embodiment of this application. The method can be applied to the communication system described in FIG. 1, and the method includes the following steps.
- the AMF network element determines the number of UEs and/or the number of PDU sessions accessed on the network slice.
- one or more UEs can be accessed (or registered) on the network slice, and the AMF network element can count the number of UEs connected to the network slice.
- the AMF network element can count the number of UEs through the UE counter. The number of UEs connected to the network slice. When a new UE is connected to the network slice, the number of UEs counted by the UE counter is increased by 1. When a UE that has been connected to the network slice exits the network slice, the UE The number of UEs counted by the counter is reduced by 1.
- one or more PDU sessions can also be established on the network slice.
- the AMF network element can count the number of PDU sessions established on the network slice.
- the AMF network element can count the number of PDU sessions on the network through the PDU session counter. The number of PDU sessions established on the slice. When a new PDU session is established on the network slice, the number of PDU sessions counted by the PDU session counter increases by 1. When the PDU session established on the network slice is cancelled, the PDU session counter The number of counted PDU sessions is reduced by 1.
- the network slice may be a network slice that needs to perform slice resource control.
- the AMF network element may start a UE counter to count the number of accesses on the network slice. The number of UEs, or start the PDU session counter to count the PDU sessions established on the network slice, or start the UE counter and the PDU session counter to count the number of UEs and the number of PDU sessions connected to the network slice.
- the method may further include S300: the AMF network element obtains first configuration information, where the first configuration information includes the S-NSSAI of the network slice and authorization indication information, and the authorization indication information is used to indicate whether Need to perform slice resource control.
- the AMF network element may determine that the network slice needs to perform slice resource control according to the authorization indication information.
- the first configuration information may be sent by AAA-S.
- the AAA-S sends the first configuration information to the authentication and authorization network element, and the authentication and authorization network element sends the first configuration information to the AMF network element. , So that the AMF network element obtains the first configuration information.
- the AMF network element sends first information so that the AAA-S receives the first information, where the first information includes the number of UEs and/or the number of PDU sessions.
- the first reporting condition may include at least one of the following conditions: the number of UEs reaches a first preset value, the number of PDU sessions reaches a second preset value, and the increase in the number of UEs reaches a third preset value, The increase in the number of PDU sessions reaches the fourth preset value, and the reporting period, the increase in the number of UEs in the time window reaches the fifth preset value, or the increase in the number of PDU sessions in the time window reaches the sixth preset value .
- the first report condition may be obtained by the AMF network element.
- the first configuration information further includes the first report condition, and the AMF network element may obtain the first report condition by obtaining the first configuration information.
- satisfying the first reporting condition may refer to satisfying this condition.
- the first preset value is 30, and the first reporting condition is that the number of UEs reaches If the first preset value is met, the first report condition is met, that is, the number of UEs reaches 30; when the first report condition includes at least two of the above conditions, meeting the first report condition may mean meeting these at least two conditions.
- the first preset value is 50
- the third preset value is 10
- the first reporting condition includes that the number of UEs reaches the first preset value and the increase in the number of UEs reaches the third
- satisfying the first reporting condition may mean that the number of UEs reaches 30, or the increase in the number of UEs reaches 10.
- the first preset value, the second preset value, the third preset value, the fourth preset value, the reporting period, the fifth preset value, and the sixth preset value may be set in advance, such as ,
- the first preset value and the second preset value can be 50 or 100, etc.
- the third preset value and the fourth preset value can be 10 or 20, etc.
- the reporting period can be 10 minutes, 30 minutes, or 1 hour Etc.
- the time window may be 20 minutes
- the fifth preset value and the sixth preset value may be 40, etc., which are not specifically limited in the embodiment of the present application.
- the AMF network element may send first information to the authentication and authorization network element when the first reporting condition is met, and the first information includes the number of UEs; when the AMF network When the element determines the number of PDU sessions, the AMF network element can send first information to the authentication and authorization network element when the first reporting condition is met.
- the first information includes the number of PDU sessions; when the AMF network element determines that the When the number of UEs and the number of PDU sessions are sent to the authentication and authorization network element, the first information includes the number of UEs and the number of PDU sessions.
- the first information may be carried in an authorization request message, that is, the AMF network element may send an authorization request message to the authentication and authorization network element, and the authorization request message includes the first information; further, the first information may also include the S-NSSAI for network slicing.
- the authentication and authorization network element may send the first information to the AAA-S; or, when the authentication and authorization network element cannot directly communicate with the AAA-S, the authentication and authorization network element cannot directly communicate with the AAA-S.
- the authorized network element may send the first information to the AAA-P, so that the AAA-P sends the first information to the AAA-S.
- the authentication and authorization network element may also assign an association identifier to the AMF network element, and the association identifier is used to associate the first information reported by the AMF network element, and the authentication and authorization network element may also store the AMF network element locally.
- the meta identifier and the associated identifier, and the first information sent by the authentication and authorization network element may also include the associated identifier.
- the authentication and authorization network element in the embodiment of the present application may be any network element with authentication and authorization functions that can support the communication between the AMF network element and the AAA-S.
- the authentication and authorization may be an AUSF network element.
- NEF network elements or NSSAAF network elements, etc. which are not specifically limited in the embodiment of the present application.
- the AAA-S may store the first information locally.
- the first information includes the number of UEs and/or the number of PDU sessions, the S-NSSAI of the network slice, and the The association identifier
- the AAA-S may locally store the number of UEs and/or the number of PDU sessions, the S-NSSAI of the network slice, and the association identifier.
- the AAA-S may also determine whether to issue new configuration information according to the number of UEs and/or the number of PDU sessions. If new configuration information needs to be issued, the method further includes S304.
- the AAA-S sends second configuration information, so that the AMF network element receives the second configuration information, where the second configuration information is used to control resources of the network slice.
- the second configuration information may include at least one of the following: a second reporting condition, the number of remaining UEs that can be accessed by the network slice, the number of remaining PDU sessions that can be accessed by the network slice, and the increase in the number of UEs reaches the seventh With a preset value, the increase in the number of PDU sessions reaches the eighth preset value, the number of UEs in the time window reaches the ninth preset value, or the increase in the number of PDU sessions within the time window reaches the tenth preset value.
- the second reporting condition here can be used to indicate the condition for reporting the first information of the network slice next time.
- the second reporting condition can be similar to the above-mentioned first reporting condition.
- the preset value or reporting period of the specific condition in the second reporting condition can be It is different from the preset value or reporting period of the specific condition in the first reporting condition.
- the reporting period in the first reporting condition is 30 minutes
- the last week period in the second reporting condition is 10 minutes.
- the embodiment of the application is here No longer.
- the AAA-S may send the second configuration information to the authentication and authorization network element, and the authentication and authorization network element sends the second configuration information to the AMF network element; or, between the AAA-S and the authentication and authorization network element
- the AAA-S can send the second configuration information to the AAA-P, so that the AAA-P forwards the second configuration information to the authentication and authorization network element, and then the authentication and authorization network element transfers the second configuration information Sent to the AMF network element.
- the authentication and authorization network element may send an authorization response message to the AMF network element, and the authorization response message includes the second configuration information; further
- the second configuration information may also include the S-NSSAI of the network slice.
- the AMF network element may perform resource control of the network slice according to the second configuration.
- the process in which the AMF network element reports the first information to the AAA-S and the AAA-S sends the second configuration information to the AMF network element provided in the foregoing embodiment can also be replaced by the SMF network element reporting the first information to the AAA-S.
- -S reports the first information and the AAA-S sends the second configuration information to the SMF network element.
- the specific process is shown in Figure 8.
- the method may include: S41-S43.
- the SMF network element determines the number of UEs and/or the number of PDU sessions accessed on the network slice;
- the SMF network element sends first information to the AAA-S through the UPF network element, so that the AAA-S receives the first information, the first information includes the number of UEs and/or PDUs The number of sessions, that is, the SMF network element sends the first information to the UPF network element, and the UPF network element forwards the first information to the AAA-S;
- the AAA-S sends second configuration information to the SMF network element through the UPF network element, so that the SMF network element receives the second configuration information, and the second configuration information is used to control the resources of the network slice.
- the method further includes: S40.
- the SMF network element obtains first configuration information, where the first configuration information includes the S-NSSAI and authorization indication information of the network slice, and the authorization The indication information is used to indicate whether slice resource control needs to be performed, so that the AMF network element can determine that the network slice needs to perform slice resource control according to the authorization indication information.
- the AMF network element or the SMF network element may send first information.
- the first information includes the number of UEs accessed by the network slice and/or the number of PDU sessions, and the AAA-S may receive the first information.
- the AAA-S can perceive the resource usage of the network slice, and thus send information for controlling the resources of the network slice to the AMF network element or the SMF network element based on the number of UEs and/or the number of PDU sessions included in the first information.
- the second configuration information realizes the control of the network slicing, and improves the flexibility of the network slicing control and the user experience.
- the foregoing mainly introduces the solutions provided by the embodiments of the present application from the perspective of interaction between various network elements.
- the above-mentioned AMF network elements, authentication and authorization network elements, and AAA-S include hardware structures and/or software modules corresponding to each function.
- the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
- the embodiments of this application can divide the functional modules of AMF network elements, authentication and authorization network elements, and AAA-S according to the above-mentioned method examples.
- each functional module can be divided corresponding to each function, or two or more functions can be divided.
- the above-mentioned integrated modules can be implemented in the form of hardware or software functional modules. It should be noted that the division of modules in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
- FIG. 9 shows a schematic diagram of a possible structure of the communication device involved in an embodiment of the present application.
- the device can be used as an AMF network element or a built-in chip of the AMF network element.
- the device includes :Sending unit 401, receiving unit 402 and processing unit 403.
- the sending unit 401 may be used to support the device to perform the step of sending the first information in S201 in the above method embodiment, and the receiving unit 402 may be used to perform the receiving second information in S202 in the above method embodiment.
- the processing unit 403 is configured to support the device to execute the step of determining that the first slice control information is changed in S203 of the foregoing method embodiment, and/or other technical processes described herein.
- the processing unit 403 is configured to support the device to perform S301 in the foregoing method embodiment, and the sending unit 401 may be configured to support the device to perform the step of sending the first information in S302 of the foregoing method embodiment.
- the receiving unit 402 is configured to perform the step of receiving the second configuration information in S303 of the foregoing method embodiment.
- the processing unit 403 in the embodiment of the present application may be the processor of the device, the sending unit 401 may be the transmitter of the device, and the receiving unit 402 may be the receiver of the device.
- the transmitter is usually It can be integrated with the receiver and used as a transceiver, and a specific transceiver can also be called a communication interface or an interface circuit.
- FIG. 10 another possible structural schematic diagram of the communication device involved in the above-mentioned embodiment provided by the embodiment of this application.
- the device can be used as an AMF network element or a chip built in an AMF network element.
- the device includes: processing
- the processor 411 may also include a memory 412, a communication interface 413, and a bus 414, and the processor 411, the memory 412, and the communication interface 413 are connected through the bus 414.
- the processor 411 is used to control and manage the actions of the device.
- the processor 411 may be used to support the device to perform the step of determining the first slice information sending change in S203 of the foregoing method embodiment, and/or other processes used in the technology described herein.
- the processor 411 may be used to support the device to execute S301 in the foregoing method embodiment, and/or other processes used in the technology described herein.
- the communication interface 413 is used to support the device to communicate, for example, to support the device to communicate with the authentication and authorization network element.
- the processor 411 may be a central processing unit, a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic devices, transistor logic devices, hardware components, or other random combination. It can implement or execute various exemplary logical blocks, modules, and circuits described in conjunction with the disclosure of this application.
- the processor may also be a combination that implements computing functions, for example, a combination of one or more microprocessors, a combination of a digital signal processor and a microprocessor, and so on.
- the bus 414 in FIG. 10 may be a peripheral component interconnect standard (PCI) bus or an extended industry standard architecture (EISA) bus, etc.
- PCI peripheral component interconnect standard
- EISA extended industry standard architecture
- the bus can be divided into an address bus, a data bus, a control bus, and so on.
- FIG. 10 is represented by only a thick line, but it does not mean that there is only one bus or one type of bus.
- FIG. 11 shows a possible structural diagram of a communication device involved in an embodiment of the present application.
- the device can be used as an authentication and authorization network element or a built-in chip in the authentication and authorization network element.
- the device includes: a receiving unit 501, a processing unit 502, and a sending unit 503.
- the receiving unit 501 can be used to support the device receiving the first information sent by the AMF network element in S201 of the foregoing method embodiment, the second information sent by AAA-S in S202, and / Or the step of third information sent by AAA-S in S203;
- the sending unit 503 is used to support the step of sending the first forwarding information to AAA-S by the device, the step of sending second forwarding information to AAA-S, and/or The step of sending the third forwarding information to the AAA-S;
- the processing unit 502 is configured to support the device to perform the step of mapping the S-NSSAI of the first network slice to other identification information in the foregoing method embodiment.
- the receiving unit 501 may be used to support the step of receiving the first information sent by the AMF network element in S301 of the foregoing method embodiment and the step of second configuration information sent by AAA-S in S302.
- the sending unit 503 may be used to support the step of forwarding the first information sent by the AMF by the device to the AAA-S, and the step of forwarding the first configuration information and the second configuration information sent by the AAA-S to the AMF.
- the processing unit 502 in this embodiment of the application is the processor of the device
- the receiving unit 501 may be the receiver of the device
- the sending unit 503 may be the transmitter of the device
- the device can be used as an authentication and authorization network element or a built-in chip of the authentication and authorization network element.
- the device includes :
- the processor 511 may also include a memory 512, a communication interface 513, and a bus 514.
- the processor 511, the memory 512, and the communication interface 513 are connected by the bus 514.
- the processor 511 is used to control and manage the actions of the device.
- the processor 511 can be used to support the device to perform the step of mapping the S-NSSAI of the first network slice to other identification information in the foregoing method embodiment, and / Or other processes used in the techniques described herein.
- the communication interface 513 is used to support the device to communicate, for example, to support the device to communicate with an AMF network element or AAA-S.
- the processor 511 may be a central processing unit, a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic devices, transistor logic devices, hardware components, or other random combination. It can implement or execute various exemplary logical blocks, modules, and circuits described in conjunction with the disclosure of this application.
- the processor may also be a combination that implements computing functions, for example, a combination of one or more microprocessors, a combination of a digital signal processor and a microprocessor, and so on.
- the bus 514 in FIG. 12 above may be a PCI bus or an EISA bus.
- the bus can be divided into an address bus, a data bus, a control bus, and so on. For ease of representation, only one thick line is used in the foregoing FIG. 12 to represent, but it does not mean that there is only one bus or one type of bus.
- FIG. 13 shows a possible structural diagram of the communication device involved in the embodiment of the present application.
- the device can be used as an AAA-S or AAA-S built-in chip, and the device includes :Receiving unit 601, processing unit 602, and sending unit 603.
- the receiving unit 601 can be used to support the device to receive the first information sent in S201 of the foregoing method embodiment; the sending unit 603 can be used to support the device to perform S202 of the foregoing method embodiment.
- the step of sending the second information in S203 and the step of sending the third information in S203; the processing unit 602 is configured to support the device to perform the step of determining that the first slice control information has changed in the above method embodiment, and/or the step described herein Other technical processes.
- the receiving unit 601 can be used to support the device to receive the step of receiving the first information sent in S302 of the above method embodiment; the sending unit 603 is used to execute the step of sending the second information in S303 of the above method embodiment.
- the step of configuring information and the step of sending the first configuration information; the processing unit 602 is configured to support the device to perform the steps of determining the first configuration information and the second configuration information in the above method embodiment, and/or other described herein Technical process.
- the processing unit 602 in the embodiment of the present application may be the processor of the device, the receiving unit 601 may be the receiver of the device, and the sending unit 603 may be the transmitter of the device.
- the transmitter is usually It can be integrated with the receiver and used as a transceiver, and a specific transceiver can also be called a communication interface or an interface circuit.
- FIG. 14 another possible structural schematic diagram of the communication device involved in the above-mentioned embodiments provided by the embodiments of this application.
- the device can be used as an AAA-S or a built-in chip of AAA-S.
- the device includes: processing
- the processor 611 may further include a memory 612, a communication interface 613, and a bus 614, and the processor 611, the memory 612, and the communication interface 613 are connected through the bus 614.
- the processor 611 is used to control and manage the actions of the device.
- the processor 611 may be used to support the device to perform the determination in the foregoing method embodiment to determine that the first slice control information is changed, and/or be used in other processes of the technology described herein.
- the processor 611 may be used to support the device to perform the steps of determining the first configuration information and the second configuration information in the foregoing method embodiments, and/or other processes used in the technology described herein .
- the communication interface 613 is used to support the device to communicate, for example, to support the device to communicate with the authentication and authorization network element.
- the processor 611 may be a central processing unit, a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic devices, transistor logic devices, hardware components, or other random combination. It can implement or execute various exemplary logical blocks, modules, and circuits described in conjunction with the disclosure of this application.
- the processor may also be a combination that implements computing functions, for example, a combination of one or more microprocessors, a combination of a digital signal processor and a microprocessor, and so on.
- the bus 614 in FIG. 14 may be a PCI bus or an EISA bus. The bus can be divided into an address bus, a data bus, a control bus, and so on. For ease of representation, the above-mentioned FIG. 14 is represented by only a thick line, but it does not mean that there is only one bus or one type of bus.
- an embodiment of the present application also provides a communication system, which includes an AMF network element, an authentication and authorization network element, and AAA-S; wherein, the AMF network element is the communication device provided in FIG. 9 or FIG.
- the authentication and authorization network element is the communication device provided in FIG. 11 or FIG. 12, and is used to perform the steps of the authentication and authorization network element in the foregoing method embodiment.
- AAA-S is the communication device provided in FIG. 13 or FIG. 14, and is used to perform the steps of AAA-S in the foregoing method embodiment.
- the disclosed device and method may be implemented in other ways.
- the device embodiments described above are merely illustrative.
- the division of the modules or units is only a logical function division. In actual implementation, there may be other division methods, for example, multiple units or components may be divided. It can be combined or integrated into another device, or some features can be omitted or not implemented.
- the units described as separate parts may or may not be physically separate.
- the parts displayed as units may be one physical unit or multiple physical units, that is, they may be located in one place, or they may be distributed to multiple different places. . Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
- the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a readable storage medium.
- the readable storage medium may include: U disk, mobile hard disk, read-only Various media that can store program codes such as memory, random access memory, magnetic disk or optical disk.
- a readable storage medium stores instructions.
- the instructions in the readable storage medium run on a device, the device executes 6 The steps of the AMF network element in the method embodiment provided in any figure.
- a readable storage medium stores instructions.
- the instructions in the readable storage medium run on a device, the device executes 6 Steps of authenticating and authorizing network elements in the method embodiment provided in any figure.
- a readable storage medium stores instructions.
- the instructions in the readable storage medium run on a device, the device executes 6 Steps of AAA-S in the method embodiment provided in any figure.
- a computer program product including instructions is provided.
- the instructions run on a device, the device executes the AMF network in the method embodiment provided in any one of the diagrams shown in FIGS. 2-6. Yuan steps.
- a computer program product including instructions is provided.
- the instructions run on a device, the device executes the authentication and authorization in the method embodiment provided in any one of the diagrams shown in FIGS. 2-6. The steps of the network element.
- a computer program product including instructions is provided.
- the instructions run on a device, the device executes the method embodiment AAA- as shown in any one of the diagrams in Figs. 2-6. S steps.
- a readable storage medium is provided, and instructions are stored in the readable storage medium.
- the instructions in the readable storage medium run on a device, the device executes as shown in FIG. 7 or FIG. 8.
- a readable storage medium is provided, and instructions are stored in the readable storage medium.
- the instructions in the readable storage medium run on a device, the device executes as shown in FIG. 7 or FIG. 8 The steps of AAA-S in the method embodiment provided.
- a computer program product including instructions is provided.
- the instructions run on a device, the device executes the AMF network element or the AMF network element in the method embodiment provided in FIG. 7 or FIG. 8. Yuan steps.
- a computer program product including instructions is provided.
- the instructions run on a device, the device executes the steps of AAA-S in the method embodiment provided in FIG. 7 or FIG. 8.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
La présente demande relève du domaine technique des communications et concerne un procédé de commande de tranche de réseau et un appareil de communication, destinés à être utilisés pour améliorer la flexibilité de commande tranche de réseau et l'expérience de l'utilisateur. Le procédé comprend les étapes suivantes : l'envoi, par un élément de réseau AMF, de premières informations à un serveur AAA au moyen d'un élément de réseau d'authentification et d'autorisation, les premières informations comprenant des informations de tranche d'une première tranche de réseau et un premier identifiant d'un premier équipement utilisateur (UE), par exemple, les informations de tranche étant des informations de S-NSSAI ou d'identification obtenues après la mise en correspondance de la S-NSSAI, le premier identifiant étant GPSI, et des tranches de réseau dont l'accès est autorisé ou en attente d'autorisation pour le premier UE comprenant la première tranche de réseau ; la réception de secondes informations en provenance du serveur AAA, c'est-à-dire, les secondes informations étant envoyées par le serveur AAA, par exemple, le serveur AAA envoie les secondes informations à l'élément de réseau AMF au moyen de l'élément de réseau d'authentification et d'autorisation, les secondes informations comprenant des premières informations de commande de tranche, et les premières informations de commande de tranche étant des informations utilisées par le premier UE pour la première tranche de réseau.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010406046.9A CN113746649B (zh) | 2020-05-14 | 2020-05-14 | 一种网络切片控制方法及通信装置 |
CN202010406046.9 | 2020-05-14 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021227600A1 true WO2021227600A1 (fr) | 2021-11-18 |
Family
ID=78526400
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/077861 WO2021227600A1 (fr) | 2020-05-14 | 2021-02-25 | Procédé de commande de tranche de réseau et appareil de communication |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN113746649B (fr) |
WO (1) | WO2021227600A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023133860A1 (fr) * | 2022-01-14 | 2023-07-20 | 北京小米移动软件有限公司 | Appareil et procédé de transmission d'informations, dispositif de communication, et support de stockage |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117354155A (zh) * | 2022-06-27 | 2024-01-05 | 中兴通讯股份有限公司 | 网络管理方法及装置、网元、计算机可读介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108347729A (zh) * | 2017-01-24 | 2018-07-31 | 电信科学技术研究院 | 网络切片内鉴权方法、切片鉴权代理实体及会话管理实体 |
US20190109823A1 (en) * | 2017-10-09 | 2019-04-11 | Comcast Cable Communications, Llc | Ethernet type packet data unit session communications |
CN109743893A (zh) * | 2016-09-09 | 2019-05-10 | 华为技术有限公司 | 用于网络切片的方法和设备 |
CN110476447A (zh) * | 2017-03-21 | 2019-11-19 | 诺基亚技术有限公司 | 在支持网络切片的移动系统中的增强的注册过程 |
US20200053083A1 (en) * | 2018-08-13 | 2020-02-13 | Lenovo (Singapore) Pte. Ltd. | Network slice authentication |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019017835A1 (fr) * | 2017-07-20 | 2019-01-24 | 华为国际有限公司 | Procédé d'authentification de réseau, et dispositif et système associés |
CN109391940B (zh) * | 2017-08-02 | 2021-02-12 | 华为技术有限公司 | 一种接入网络的方法、设备及系统 |
US10764789B2 (en) * | 2017-08-11 | 2020-09-01 | Comcast Cable Communications, Llc | Application-initiated network slices in a wireless network |
US10660016B2 (en) * | 2017-11-08 | 2020-05-19 | Ofinno, Llc | Location based coexistence rules for network slices in a telecommunication network |
US11419046B2 (en) * | 2018-04-13 | 2022-08-16 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and systems for performing multi-domain network slice selection and approval |
CN110380887B (zh) * | 2018-04-13 | 2021-04-09 | 华为技术有限公司 | 通信方法与装置 |
CN110876174B (zh) * | 2018-08-31 | 2021-05-18 | 华为技术有限公司 | 网络切片选择方法、设备及系统 |
CN110972208B (zh) * | 2018-09-28 | 2021-07-09 | 华为技术有限公司 | 一种切片信息处理方法及装置 |
WO2020088594A1 (fr) * | 2018-11-02 | 2020-05-07 | Telefonaktiebolaget Lm Ericsson (Publ) | Procédé et appareil de transmission de données |
-
2020
- 2020-05-14 CN CN202010406046.9A patent/CN113746649B/zh active Active
-
2021
- 2021-02-25 WO PCT/CN2021/077861 patent/WO2021227600A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109743893A (zh) * | 2016-09-09 | 2019-05-10 | 华为技术有限公司 | 用于网络切片的方法和设备 |
CN108347729A (zh) * | 2017-01-24 | 2018-07-31 | 电信科学技术研究院 | 网络切片内鉴权方法、切片鉴权代理实体及会话管理实体 |
CN110476447A (zh) * | 2017-03-21 | 2019-11-19 | 诺基亚技术有限公司 | 在支持网络切片的移动系统中的增强的注册过程 |
US20190109823A1 (en) * | 2017-10-09 | 2019-04-11 | Comcast Cable Communications, Llc | Ethernet type packet data unit session communications |
US20200053083A1 (en) * | 2018-08-13 | 2020-02-13 | Lenovo (Singapore) Pte. Ltd. | Network slice authentication |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023133860A1 (fr) * | 2022-01-14 | 2023-07-20 | 北京小米移动软件有限公司 | Appareil et procédé de transmission d'informations, dispositif de communication, et support de stockage |
Also Published As
Publication number | Publication date |
---|---|
CN113746649A (zh) | 2021-12-03 |
CN113746649B (zh) | 2022-12-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11917498B2 (en) | Communication method and communications apparatus | |
US20230093339A1 (en) | Session Management Method, Apparatus, and System | |
US11153744B2 (en) | Roaming support for next generation slice architecture | |
KR102469191B1 (ko) | 정보 전송방법 및 장치, 컴퓨터 판독가능 저장 매체 | |
WO2021037175A1 (fr) | Procédé de gestion de tranche de réseau et dispositif associé | |
EP4024956A1 (fr) | Procédé, appareil et système de communication | |
WO2019033796A1 (fr) | Procédé de traitement de session, et dispositif associé | |
US20200015117A1 (en) | Ambr determining method and communications entity | |
US11848963B2 (en) | Method for providing restricted service, and communications device | |
WO2021197185A1 (fr) | Procédé de communication et dispositif de communication | |
US20230199550A1 (en) | Relay Management Method and Communication Apparatus | |
CN111801961A (zh) | 一种确定ssc模式的方法及装置 | |
US20220103482A1 (en) | Maximum data burst volume (mdbv) determining method, apparatus, and system | |
WO2021227600A1 (fr) | Procédé de commande de tranche de réseau et appareil de communication | |
US20200403788A1 (en) | Information Sending Method, Key Generation Method, and Apparatus | |
US20230388909A1 (en) | Ensuring network control of simultaneous access to network slices with application awareness | |
WO2024051313A1 (fr) | Procédé, appareil et système de gestion de ressources de communication, et support d'enregistrement | |
WO2021204361A1 (fr) | Appareil, procédé et programme d'ordinateur | |
WO2021218244A1 (fr) | Procédé, appareil et système de communication | |
CN113906783A (zh) | 通信方法、装置及系统 | |
WO2024119292A1 (fr) | Procédé de service de réseau, appareil de communication et système de communication | |
EP4068820A1 (fr) | Procédé de communication et appareil de communication | |
WO2023077948A1 (fr) | Procédé et appareil de communication | |
WO2024077546A1 (fr) | Procédé d'appel de capacité et appareil de communication | |
WO2023142887A1 (fr) | Procédé de communication et appareil de communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21805035 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21805035 Country of ref document: EP Kind code of ref document: A1 |