WO2021244389A1 - 通信方法以及相关联的通信装置、介质和芯片 - Google Patents

通信方法以及相关联的通信装置、介质和芯片 Download PDF

Info

Publication number
WO2021244389A1
WO2021244389A1 PCT/CN2021/096340 CN2021096340W WO2021244389A1 WO 2021244389 A1 WO2021244389 A1 WO 2021244389A1 CN 2021096340 W CN2021096340 W CN 2021096340W WO 2021244389 A1 WO2021244389 A1 WO 2021244389A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
information
slice
terminal device
access
Prior art date
Application number
PCT/CN2021/096340
Other languages
English (en)
French (fr)
Inventor
孙飞
罗海燕
朱元萍
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP21818827.4A priority Critical patent/EP4152829A4/en
Publication of WO2021244389A1 publication Critical patent/WO2021244389A1/zh
Priority to US18/073,842 priority patent/US20230094040A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0064Transmission or use of information for re-establishing the radio link of control information between different access points
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/13Cell handover without a predetermined boundary, e.g. virtual cells
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface

Definitions

  • the present disclosure relates to the field of communication, and more specifically, to communication methods and associated communication devices, media, and chips.
  • the terminal device provides the corresponding network slice for service. Taking into account the mobility of the terminal equipment and the needs of business changes, the terminal equipment may register or switch to a different access network equipment. Therefore, it is necessary to be able to realize the access and service of the terminal device under the condition of the differentiated support of the network slicing by different access network devices.
  • Example embodiments of the present disclosure provide a solution for supporting access control of terminal devices in a communication system.
  • a communication method includes a target access network device receiving first information, the first information indicating a relationship between a first network slice of a first network and a second network slice of a second network, the first network and the second network Different; and the target access network device performs access control from the terminal device to the target access network device based on at least the first information.
  • the target access network device can perform cross-network access control of the terminal device.
  • Such a solution can reduce the access delay, reduce the service interruption problem of the terminal device due to the rejection of the session, and ensure the service continuity of the terminal device.
  • the first information includes an identification of the first network, an identification of the first network slice, an identification of the second network, and an identification of the second network slice.
  • the identification of the first network and the identification of the second network include respective public land mobile network identifications of the first network and the second network.
  • the identifier of the first network slice and the identifier of the second network slice include respective single network slice selection auxiliary information of the first network slice and the second network slice. Therefore, in the first information, the network identifier and the slice identifier may be used to indicate the relationship between the corresponding network and its network slice.
  • the first information is remapping policy information for the first network slice and the second network slice. Based on this first information, the target access network device can determine whether to support the access of the terminal device through the remapping of the network slice during access control.
  • receiving the first information includes: the target access network device receives the first information from a core network device.
  • the core network device can determine the first information by synthesizing information reported by multiple access network devices, so that the first information is suitable for access control of the terminal device by the multiple access network devices.
  • the first network and the second network are in the same tracking area.
  • the core network equipment can determine and provide the first information by comprehensively considering the relationship of the network slices of the network in a certain area. Since the first information covers the relationship between the network slices of the network in a certain area, no matter the terminal device wants to access any network in the area, the corresponding target access network device can perform access control according to the first information.
  • the first information is included in the NG establishment response.
  • the NG establishment response may be transmitted from the core network to the target access network device, and is usually a response to the NG establishment message of the target access network device. In this way, the target access network device can obtain the first information for access control in advance during the interface establishment phase.
  • the communication method of the first aspect further includes: the target access network device receives second information from a source access network device, and the second information includes that the terminal device is on the second network The identifier of the third network slice allowed in.
  • performing the access control based on at least the first information includes: the target access network device performs the access control based on the first information and the second information. With the help of the first information and the second information, the target access network device can better determine the network slices allowed by the terminal device in the second network, which is particularly advantageous for scenarios where the network slices allowed by different terminal devices in different networks are different. .
  • receiving the first information includes: the target access network device receives the first information for the terminal device from a source access network device, and the first network is the terminal device.
  • the service network of the device includes: the target access network device receives the first information for the terminal device from a source access network device, and the first network is the terminal device.
  • the service network of the device includes: the target access network device receives the first information for the terminal device from a source access network device, and the first network is the terminal device.
  • the service network of the device by interacting with the source access network device, the target access network device can obtain more targeted first information for performing access control for the terminal device.
  • the reduction of the information volume of the first information can also reduce the transmission overhead between the access network devices.
  • the second network includes a target network of the terminal device. This means that the first information indicates the relationship between the service network of the current terminal device and the network slice of the target network. Therefore, the target access network device does not need to receive and retain too much redundant information.
  • the first information is included in a handover request for the terminal device. Therefore, the first information is provided to the target access network device in time when it is determined that the terminal device is to switch to the target network of the target access network device.
  • the target access network device can perform access control on the terminal device during the handover process based on this information.
  • performing the access control includes: the target access network device determines the identity of the service network of the terminal device, the identity of the service network slice of the service network, and the target network of the terminal device The target access network device determines from the first information the target network and the service network based on the service network identifier, the service network slice identifier, and the target network identifier A target network slice related to the slice; and the target access network device performs the access control based on the determination of the target network slice.
  • the target access network device can effectively implement access control, avoid handover time delay, reduce the service interruption caused by the rejection of the terminal device session after the handover, and ensure business continuity .
  • a communication method includes: a source access network device receives first information for a terminal device from a core network device, the first information indicating a relationship between a first network slice of a first network and a second network slice of a second network, so The first network is a service network of the terminal device, and the first network and the second network are different; and the source access network device transmits the first information to the target access network device.
  • the target access network device can perform cross-network access control of the terminal device, reduce the access delay, and reduce the terminal device’s interference due to the session.
  • the business interruption caused by the refusal ensures the business continuity of the terminal equipment. Since the first information relates to the service network specific to the terminal device, the information volume of the first information is reduced, which also reduces the transmission overhead between the core network device and the access network device.
  • the first information includes an identification of the first network, an identification of the first network slice, an identification of the second network, and an identification of the second network slice.
  • the identity of the first network and the identity of the second network include respective public land mobile network identities of the first network and the second network.
  • the identification of the first network slice and the identification of the second network slice include respective single network slice selection auxiliary information of the first network slice and the second network slice. Therefore, in the first information, the network identifier and the slice identifier may be used to indicate the relationship between the corresponding network and its network slice.
  • the first information is remapping policy information for the first network slice and the second network slice. Based on this first information, the target access network device can determine whether to support the access of the terminal device through the remapping of the network slice during access control.
  • the second network includes a target network of the terminal device. This means that the first information indicates the relationship between the service network of the current terminal device and the network slice of the target network. Therefore, the target access network device does not need to receive and retain too much redundant information.
  • the first information is included in a handover request for the terminal device. Therefore, the first information is provided to the target access network device in time when it is determined that the terminal device is to switch to the target network of the target access network device.
  • the target access network device can perform access control on the terminal device during the handover process based on this information.
  • the communication method of the second aspect further includes: if the terminal device's access to the target access network device is allowed, the source access network device transmits third information to the terminal device The third information indicates that the service network of the terminal device is switched from the first network to the second network. In this way, in the case of cross-network access, the terminal device can quickly learn the change of the service network through the received third information.
  • the third information includes an identification of the second network. Providing the identification of the second network to the terminal device helps the terminal device to determine the specific network to which it is switched from the current network.
  • the third information is included in a radio resource control reconfiguration message. Therefore, the terminal device can determine the radio resource control connection to be reconfigured through the message, and at the same time, can also learn about the change of the service network.
  • the communication method of the second aspect further includes: if the terminal device's access to the target access network device is allowed, the source access network device transmits fourth information to the terminal device
  • the fourth information indicates that the session of the terminal device is changed to be served by the second network slice of the second network. In this way, in the case of cross-network access, the terminal device can not only quickly learn the change of the service network, but also can determine the network slice to be accessed through the received fourth information.
  • a communication method includes: a terminal device receives third information from a source access network device, the third information indicating that the service network of the terminal device is switched from a first network to a second network, the first network and the second network The two networks are different; and the terminal device uses the third information.
  • the terminal device can quickly learn the change of the service network through the received third information, and use the third information accordingly.
  • using the third information includes that the terminal device performs random access to the target access network device in the second network based on the third information.
  • the third information helps guide the random access process of the terminal device, and improves the probability of successful random access.
  • using the third information includes the terminal device displaying the identity of the second network based on the third information. By displaying the identifier of the second network, the user of the terminal device can be notified of changes in the service network.
  • the third information includes an identification of the second network. Providing the identification of the second network to the terminal device helps the terminal device to determine the specific network to which it is switched from the current network.
  • the third information is included in a radio resource control reconfiguration message. Therefore, the terminal device can determine the radio resource control connection to be reconfigured through the message, and at the same time, can also learn about the change of the service network.
  • the communication method of the third aspect further includes: if the terminal device's access to the target access network device is allowed, the terminal device receives fourth information from the source access network device, The fourth information indicates that the session of the terminal device is changed to be served by the second network slice of the second network. In this way, in the case of cross-network access, the terminal device can not only quickly learn the change of the service network, but also can determine the network slice to be accessed through the received fourth information.
  • a communication method includes: a core network device determining first information, the first information indicating a relationship between a first network slice of a first network and a second network slice of a second network, the first network and the second network are different And the core network device transmits the first information to the access network device for access control from the terminal device to the access network device.
  • the target access network device can use the first information to perform cross-network access control of the terminal device, reduce the access delay, and reduce the terminal.
  • the first information includes an identification of the first network, an identification of the first network slice, an identification of the second network, and an identification of the second network slice.
  • the identification of the first network and the identification of the second network include respective public land mobile network identifications of the first network and the second network.
  • the identifier of the first network slice and the identifier of the second network slice include respective single network slice selection auxiliary information of the first network slice and the second network slice. Therefore, in the first information, the network identifier and the slice identifier may be used to indicate the relationship between the corresponding network and its network slice.
  • the first information is remapping policy information for the first network slice and the second network slice. Based on this first information, the target access network device can determine whether to support the access of the terminal device through the remapping of the network slice during access control.
  • the first network is a service network of the terminal device, and the terminal device is served by the first network via the access network device.
  • the second network includes a target network of the terminal device. This can ensure that when the terminal device switches from the serving network to the target network, the target access network device can perform access control according to the obtained first information.
  • the first network and the second network are in the same tracking area.
  • the core network equipment can determine and provide the first information by comprehensively considering the relationship of the network slices of the network in a certain area. Since the first information covers the relationship between the network slices of the network in a certain area, no matter the terminal device wants to access any network in the area, the corresponding target access network device can perform access control according to the first information.
  • the first information is included in the NG establishment response.
  • the NG establishment response may be transmitted from the core network to the target access network device, and is usually a response to the NG establishment message of the target access network device. In this way, the target access network device can obtain the first information for access control in advance during the interface establishment phase.
  • a communication device implemented at a target access network device.
  • the communication device includes a first receiving unit configured to receive first information, the first information indicating the relationship between the first network slice of the first network and the second network slice of the second network, the first network and the second network slice The second network is different; and the access control unit is configured to perform access control from the terminal device to the target access network device based on at least the first information.
  • the first information includes an identification of the first network, an identification of the first network slice, an identification of the second network, and an identification of the second network slice.
  • the identity of the first network and the identity of the second network include respective public land mobile network identities of the first network and the second network, and the first network The identifier of the network slice and the identifier of the second network slice include respective single network slice selection auxiliary information of the first network slice and the second network slice.
  • the first information is remapping policy information for the first network slice and the second network slice.
  • the first receiving unit is further configured to receive the first information from a core network device.
  • the first network and the second network are in the same tracking area.
  • the first information is included in the NG establishment response.
  • the communication apparatus further includes: a second receiving unit configured to receive second information from a source access network device, the second information including that the terminal device is in the second network The identifier of the third network slice that is allowed to be used.
  • the access control unit is further configured to perform the access control based on the first information and the second information.
  • the first receiving unit is further configured to: receive the first information for the terminal device from a source access network device, where the first network is a service network of the terminal device .
  • the second network includes a target network of the terminal device.
  • the first information is included in a handover request for the terminal device.
  • the access control unit is further configured to: the target access network device determines the identity of the service network of the terminal device, the identity of the service network slice of the service network, and the terminal device The target network identifier; the target access network device determines the target network and the target network from the first information based on the service network identifier, the service network slice identifier, and the target network identifier The target network slice related to the serving network slice; and the target access network device performs the access control based on the determination of the target network slice.
  • a communication device implemented at a source access network device.
  • the communication device includes a receiving unit configured to receive first information from a core network device for a terminal device, the first information indicating a relationship between a first network slice of the first network and a second network slice of the second network,
  • the first network is a service network of the terminal device, and the first network and the second network are different; and the first transmission unit is configured to transmit the first information to a target access network device.
  • the first information includes an identification of the first network, an identification of the first network slice, an identification of the second network, and an identification of the second network slice.
  • the identity of the first network and the identity of the second network include respective public land mobile network identities of the first network and the second network, and the first network The identifier of the network slice and the identifier of the second network slice include respective single network slice selection auxiliary information of the first network slice and the second network slice.
  • the first information is remapping policy information for the first network slice and the second network slice.
  • the second network includes a target network of the terminal device.
  • the first information is included in a handover request for the terminal device.
  • the communication device further includes: a second transmission unit configured to transmit the second transmission unit to the terminal device when the terminal device's access to the target access network device is allowed Three information, the third information indicating that the service network of the terminal device is switched from the first network to the second network.
  • the third information includes an identification of the second network.
  • the third information is included in a radio resource control reconfiguration message.
  • the communication apparatus further includes: a third transmission unit configured to transmit fourth information to the terminal device if the terminal device's access to the target access network device is allowed, The fourth information indicates that the session of the terminal device is changed to be served by the second network slice of the second network.
  • a communication device implemented at a terminal device.
  • the communication device includes a first receiving unit configured to receive third information from a source access network device, the third information indicating that the service network of the terminal device is switched from the first network to the second network, and the first The first network is different from the second network.
  • the communication device further includes an information using unit configured to use the third information.
  • the information using unit is configured to perform random access to a target access network device in the second network based on the third information. In some embodiments, the information using unit is configured to display the identity of the second network based on the third information.
  • the third information includes an identification of the second network.
  • the third information is included in a radio resource control reconfiguration message.
  • the communication device further includes a second receiving unit configured to receive fourth information from the source access network device if the terminal device's access to the target access network device is allowed The fourth information indicates that the session of the terminal device is changed to be served by the second network slice of the second network.
  • a communication device implemented at a core network device.
  • the communication device includes a determining unit configured to determine first information, the first information indicating a relationship between a first network slice of a first network and a second network slice of a second network, the first network and the first network The two networks are different; and the transmission unit is configured to transmit the first information to the access network device for access control from the terminal device to the access network device.
  • the first information includes an identification of the first network, an identification of the first network slice, an identification of the second network, and an identification of the second network slice.
  • the identity of the first network and the identity of the second network include respective public land mobile network identities of the first network and the second network, and the first network The identifier of the network slice and the identifier of the second network slice include respective single network slice selection auxiliary information of the first network slice and the second network slice.
  • the first information is remapping policy information for the first network slice and the second network slice.
  • the first network is a service network of the terminal device, and the terminal device is served by the first network via the access network device; and the second network includes the terminal The target network of the device.
  • the first network and the second network are in the same tracking area.
  • the first information is included in the NG establishment response.
  • a computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the operation of the method according to any one of the above-mentioned first aspect to the fourth aspect may be realized.
  • the present disclosure provides a chip.
  • the chip is configured to perform operations according to the method in any one of the possible implementations of the first aspect to the fourth aspect described above.
  • a communication device in an eleventh aspect of the present disclosure, includes: at least one processing unit; and at least one memory, the at least one memory being coupled to the at least one processing unit and storing instructions for execution by the at least one processing unit.
  • the communication device realizes the operation according to the method in any one of the possible implementation manners of the first aspect to the fourth aspect.
  • a computer program product is provided.
  • the computer program product is tangibly stored on a computer-readable medium and includes computer-executable instructions that, when executed, enable the device to implement a possible implementation manner according to any one of the first to fourth aspects described above The operation of the method.
  • a communication method includes: a target access network device receives slice identification information from a source access network device, the slice identification information indicates the identity of the home network slice of the terminal device in the home network, and the target access network device is in The visited network of the terminal device; the target access network device receives slice correspondence information from a core network device, and the slice correspondence information indicates the network slice of the visited network and the network slice of the home network And the target access network device performs access control from the terminal device to the target access network device based on at least the slice identification information and the slice correspondence information.
  • the target access network device can perform access control when the terminal device accesses across the network, especially when the terminal device wants to access the visited network, reduce the access delay and reduce the terminal device
  • the business interruption caused by the rejection of the session ensures the business continuity of the terminal equipment.
  • the communication method of the thirteenth aspect further includes: the target access network device transmits a request for the network slice correspondence information to the core network device, and the request includes at least the terminal device And the identity of the visited network.
  • receiving the network slice correspondence information includes: the target access network device receives a response to the request from the core network device, and the target access network device obtains from the response The network slice correspondence information. Therefore, the target access network device may only request network slice correspondence information from the core network device when it needs to perform access control.
  • the communication method of the thirteenth aspect further includes: the target access network device receives fifth information for the home network from the core network device, the fifth information indicating the home network The relationship between the network slice and another network slice of the home network.
  • performing the access control based on at least the slice identification information and the slice correspondence information includes: the target access network device is based on the slice identification information and the network slice correspondence information And the fifth information to perform the access control.
  • the target access network device can further determine whether the network slice corresponding to the home network slice in the visited network has related other network slices (for example, other network slices with remapping relationships) through the relationship between the network slices in the home network. slice).
  • a communication method includes: a source access network device receives slice identification information for a terminal device, the slice identification information indicates an identification of a home network slice of the terminal device in a home network, and the source access network device is in the terminal The first visited network of the device; and the source access network device transmits the slice identification information to the target access network device to which the terminal device is to be handed over, and the target access network device is located in the terminal device The second interviewed network.
  • the slice identification information provided by the source access network device to the target access network device can assist in performing access control when the terminal device accesses across the network, especially when the terminal device wants to access the visited network. Access control. This can reduce the access delay, reduce the service interruption of the terminal device due to the rejection of the session, and ensure the service continuity of the terminal device.
  • receiving the slice identification information includes: the source access network device receives the slice identification information from the terminal device or from a core network device.
  • the source access network device can obtain slice identification information in multiple ways.
  • the slice identification information is included in the session establishment request received from the terminal device. Therefore, the source access network device can obtain the slice identification information from the terminal device at the early stage of establishing the session of the terminal device.
  • the slice identification information is included in a session resource establishment request for the terminal device received from the core network device. Therefore, the source access network device can obtain the slice identification information from the core network device at the early stage of establishing a session of the terminal device.
  • a communication method includes: a terminal device transmits slice identification information to a source access network device, the slice identification information indicates an identification of a home network slice of the terminal device in a home network, and the source access network device is in the terminal device And the terminal device receives third information from the source access network device, the third information indicating that the service network of the terminal device is switched from the first visited network to the second Two visited networks, the first visited network and the second visited network are different.
  • the terminal device provides slice identification information to the source access network device, and then the source access network device can provide the slice identification information to the target access network device to assist the target access network device in performing cross-networking of the terminal device Access control during access, especially when the terminal device wants to access the visited network.
  • This can reduce the access delay, reduce the service interruption of the terminal device due to the rejection of the session, and ensure the service continuity of the terminal device.
  • the terminal device can receive the third information indicating the switching of the service network, so that it can quickly learn the change of the service network.
  • transmitting the slice identification information to the source access network device includes: the terminal device transmits the slice identification information to the source access network device in a session establishment request. Therefore, the source access network device can obtain the slice identification information from the terminal device at the early stage of establishing the session of the terminal device.
  • the communication method of the fifteenth aspect further includes the terminal device using the third information.
  • using the third information includes that the terminal device performs random access to the target access network device in the second visited network based on the third information.
  • the third information helps guide the random access process of the terminal device, and improves the probability of successful random access.
  • using the third information includes the terminal device displaying the identity of the second visited network based on the third information. By displaying the identity of the second visited network, the user of the terminal device can be notified of changes in the service network.
  • the third information includes the identification of the second visited network. Providing the identification of the second visited network to the terminal device helps the terminal device to clarify the specific network to which it is switched from the current network.
  • the third information is included in a radio resource control reconfiguration message. Therefore, the terminal device can determine the radio resource control connection to be reconfigured through the message, and at the same time, can also learn about the change of the service network.
  • the communication method of the fifteenth aspect further includes: if the terminal device's access to the target access network device is allowed, the terminal device receives fourth information from the source access network device The fourth information indicates that the session of the terminal device is changed to be served by the second visited network slice of the second visited network. In this way, in the case of cross-network access, the terminal device can not only quickly learn the change of the service network, but also can determine the network slice to be accessed through the received fourth information.
  • a communication device implemented at a target access network device.
  • the communication device includes a first receiving unit configured to receive slice identification information from a source access network device, where the slice identification information indicates the identification of the home network slice of the terminal device in the home network, and the target access The network device is in the visited network of the terminal device; the second receiving unit is configured to receive slice correspondence information from the core network device, where the slice correspondence information indicates the network slice of the visited network and the attribution Correspondence between network slices of the network; and an access control unit configured to perform access from the terminal device to the target access network device based on at least the slice identification information and the slice correspondence information control.
  • the communication device of the sixteenth aspect further includes: a transmission unit configured to transmit a request for the network slice correspondence information to the core network device, the request including at least the terminal device The identifier and the identifier of the visited network.
  • the first receiving unit is further configured to: receive a response to the request from the core network device, and obtain the network slice correspondence information from the response.
  • the communication device of the sixteenth aspect further includes: a third receiving unit configured to receive fifth information for the home network from the core network device, the fifth information indicating the The relationship between the home network slice and another network slice of the home network.
  • the access control unit is further configured to perform the access control based on the slice identification information, the network slice correspondence information, and the fifth information.
  • a communication device implemented at a source access network device.
  • the communication device includes a receiving unit configured to receive slice identification information for a terminal device, where the slice identification information indicates an identification of a home network slice of the terminal device in a home network, and the source access network device is in the A first visited network of a terminal device; and a transmission unit configured to transmit the slice identification information to the target access network device to which the terminal device is to be handed over, and the target access network device is located in the terminal device The second interviewed network.
  • the receiving unit is further configured to: the source access network device receives the slice identification information from the terminal device or from the core network device.
  • the slice identification information is included in the session establishment request received from the terminal device.
  • the slice identification information is included in a session resource establishment request for the terminal device received from the core network device.
  • a communication device implemented at a terminal device.
  • the communication device includes a transmission unit configured to transmit slice identification information, the slice identification information indicating the identification of the home network slice of the terminal device in the home network, and the source access network device is in the receiving area of the terminal device.
  • the transmission unit is further configured to: the terminal device transmits the slice identification information to the source access network device in a session establishment request.
  • the communication device of the eighteenth aspect further includes an information using unit configured to use the third information.
  • the information using unit is further configured to perform random access to a target access network device in the second visited network based on the third information.
  • the information using unit is further configured to display the identity of the second visited network based on the third information.
  • the third information includes the identification of the second visited network.
  • the third information is included in a radio resource control reconfiguration message.
  • the communication apparatus of the eighteenth aspect further includes a second receiving unit configured to receive a message from the source access network device if the terminal device's access to the target access network device is allowed Fourth information, the fourth information indicating that the session of the terminal device is changed to be served by the second visited network slice of the second visited network.
  • a computer-readable storage medium stores a computer program, which, when executed by a processor, implements the operation of the method in any one of the above-mentioned thirteenth to fifteenth aspects.
  • the present disclosure provides a chip.
  • the chip is configured to perform operations according to the method in any one of the above-mentioned thirteenth to fifteenth aspects.
  • a communication device in a twenty-first aspect of the present disclosure, includes: at least one processing unit; and at least one memory, the at least one memory being coupled to the at least one processing unit and storing instructions for execution by the at least one processing unit.
  • the communication device realizes the operation according to the method in any one of the above-mentioned thirteenth to fifteenth aspects.
  • a computer program product is provided.
  • the computer program product is tangibly stored on a computer-readable medium and includes computer-executable instructions, which, when executed, enable the device to implement any one of the above-mentioned thirteenth to fifteenth aspects. The operation of the method in the implementation mode.
  • FIG. 1 shows a schematic block diagram of a network slicing-based communication environment in which embodiments of the present disclosure can be used;
  • FIG. 2 shows a schematic block diagram of an example networking architecture of network slicing in which embodiments of the present disclosure may be used;
  • Figure 3 shows an interactive signaling diagram of a communication process according to some embodiments of the present disclosure
  • Figure 4 shows an interactive signaling diagram of a communication process according to other embodiments of the present disclosure
  • Figure 5 shows an interactive signaling diagram of a communication process according to still other embodiments of the present disclosure
  • FIG. 6 shows an interactive signaling diagram of a communication process according to still other embodiments of the present disclosure
  • Fig. 7 shows a schematic block diagram of a communication device implemented at a target access network device according to some embodiments of the present disclosure
  • Figure 8 shows a schematic block diagram of a communication device implemented at a source access network device according to some embodiments of the present disclosure
  • FIG. 9 shows a schematic block diagram of a communication device implemented at a terminal device according to some embodiments of the present disclosure.
  • FIG. 10 shows a schematic block diagram of a communication device implemented at a core network device according to some embodiments of the present disclosure
  • FIG. 11 shows a schematic block diagram of a communication device implemented at a target access network device according to other embodiments of the present disclosure
  • FIG. 12 shows a schematic block diagram of a communication device implemented at a source access network device according to other embodiments of the present disclosure
  • FIG. 13 shows a schematic block diagram of a communication device implemented at a terminal device according to other embodiments of the present disclosure.
  • Figure 14 shows a simplified block diagram of an example device suitable for implementing embodiments of the present disclosure.
  • the embodiments of the present disclosure can be implemented according to any suitable communication protocol, including, but not limited to, fourth-generation (4G) and fifth-generation (5G) cellular communication protocols, such as the Institute of Electrical and Electronics Engineers (IEEE) 802.11, etc. Wireless local area network communication protocol, and/or any other protocol currently known or developed in the future.
  • the technical solutions of the embodiments of the present disclosure are applied to any appropriate communication system, such as: general packet radio service (GPRS), long-term evolution (LTE) system, frequency division duplex (FDD) system, time division duplex (TDD), general Mobile Communication System (UMTS), Narrowband Internet of Things (NB-IoT) communication system, future fifth-generation (5G) system or new wireless (NR), etc.
  • GPRS general packet radio service
  • LTE long-term evolution
  • FDD frequency division duplex
  • TDD time division duplex
  • UMTS general Mobile Communication System
  • NB-IoT Narrowband Internet of Things
  • the embodiments of the present disclosure in the context of the 3rd Generation Partnership Project (3GPP) communication system of 5G.
  • 3GPP 3rd Generation Partnership Project
  • the embodiments of the present disclosure are not limited to the 3GPP communication system applied to 5G, but can be applied to any communication system with similar problems, such as wireless local area network (WLAN), wired communication system, or future development Other communication systems, etc.
  • WLAN wireless local area network
  • wired communication system wireless local area network
  • future development Other communication systems etc.
  • terminal device refers to any terminal device capable of wired or wireless communication with network devices or with each other.
  • Terminal equipment may sometimes be referred to as user equipment (UE).
  • the terminal device may be any type of mobile terminal, fixed terminal or portable terminal.
  • terminal devices may include mobile phones, sites, units, devices, mobile terminals (MT), subscription stations (SS), portable subscription stations (PSS), internet nodes, communicators, desktop computers, laptop computers, notebooks Computers, tablet computers, personal communication system (PCS) equipment, personal navigation equipment, personal digital assistants (PDA), positioning equipment, radio broadcast receivers, e-book equipment, gaming equipment, Internet of Things (IoT) equipment, in-vehicle equipment, aircraft , Virtual reality (VR) devices, augmented reality (AR) devices, wearable devices, terminal devices in 5G networks or any terminal devices in the future evolution of the public land mobile network (PLMN), other devices that can be used for communication, or Any combination of the above.
  • the embodiments of the present disclosure do not limit this.
  • the term "access network device” used in this disclosure is an entity or node that can be used to communicate with terminal devices.
  • the access network device may be, for example, a radio access network (RAN) network device.
  • the access network equipment may include various types of base stations.
  • the access network equipment may include various forms of macro base stations, micro base stations, pico base stations, femto base stations, relay stations, access points, remote radio units (RRU), radio heads (RH), and remote radio heads. (RRH) Wait.
  • the names of the access network equipment may be different.
  • eNB evolved Node B
  • NodeB Node B
  • gNB g Node B
  • NR NB NR Node B
  • the term “core network device” or “CN device” used in this disclosure may be a network function (NF) or network element in the core network.
  • the core network device may include the control plane anchor point of the terminal device to provide the terminal with functions such as core network access, registration area update, mobility management, and session management.
  • the core network equipment may include access and mobility management function (AMF), network slice selection function (NSSF), network storage function (NRF), session management function (SMF), policy control function (PCF), user plane Function (UPF), etc.
  • AMF access and mobility management function
  • NSSF network slice selection function
  • NRF network storage function
  • SMF session management function
  • PCF policy control function
  • UPF user plane Function
  • the functions of the core network described may be implemented on one or more functional entities of the core network.
  • FIG. 1 shows a schematic block diagram of a network slicing-based communication environment 100 in which embodiments of the present disclosure may be used.
  • multiple network slices 120-1, 120-2, ..., 120-N can be virtualized (for the convenience of discussion, they are collectively referred to as network slices or respectively referred to as network slices in this article. 120), where N is an integer greater than 1. It should be understood that the number of network slices and infrastructure shown in FIG. 1 are only examples.
  • the infrastructure pool 110 may include various physical or virtual network devices required to support network services, such as various access network devices, servers, switches, gateways, and so on.
  • the network resources of the infrastructure pool 110 will be allocated to different network slices 120 according to different service requirements or tenant requirements. Therefore, different types of network slices 120 will provide different network capabilities and network characteristics.
  • the type of the network slice 120 is generally related to the type of service to be supported, and may include, for example, enhanced mobile broadband service (eMBB), ultra-reliable low-latency communication (URLLC), mass machine communication (mMTC), etc. In some embodiments, there may be multiple network slices 120 for each type.
  • the network slice 120 can be understood as a complete end-to-end logical sub-network including an access network, a transmission network, a core network, and an application server, which can provide telecommunication services and has certain network capabilities.
  • the network slice 120 may also be any combination of the aforementioned access network, transmission network, core network, and application server.
  • the network slice 120 may only include the access network and the core network.
  • a certain access network may or may not support the network slice.
  • the access network may be shared by multiple network slices 120. The characteristics of different network slices 120 and the network function modules that compose them may be different. Network slicing can also be referred to simply as "slicing".
  • FIG. 2 shows a schematic diagram of an example networking architecture 200 based on network slicing in which embodiments of the present disclosure can be implemented.
  • multiple access network devices 210, 212, 214, etc. are used to implement the network function of the access network in the communication environment.
  • Each access network device can support one or more network slices 120.
  • the access network device 210 supports network slices 120-2 and 120-N, which means that the network slices 120-2 and 120-N have a shared access network.
  • 2 also shows that the access network device 212 supports network slice 120-2; the access network device 214 supports network slices 120-2 and 120-N, and so on.
  • FIG. 2 also shows the core network equipment of each network slice 120, where the AMF 230 is shared by multiple network slices 120 to provide access and mobility management for the multiple network slices 120.
  • Each network slice 120 also has its own core network equipment.
  • network slice 120-1 has SMF 240-1, UPF 250-1, etc.
  • network slice 120-2 has SMF 240-2, UPF 250-2, etc.
  • the network The slice 120-N has SMF 240-N, UPF 250-N, etc., and so on.
  • SMF 240-1, 240-2,..., 240-N can be collectively referred to as or respectively as SMF 240
  • UPF 250-1, 250-2,..., 250-N can be collectively referred to as It is or is called UPF 250 respectively.
  • SMF 240 and UPF 250 can provide core network session management, user plane functions and other related services for the network slice 120 based on the requirements of each network slice 120 for different aspects such as delay, bandwidth, and security.
  • core network devices such as NSSF 260 and NRF 270 can be deployed per network (for example, per PLMN) to support the network slice selection function and network storage function in the network.
  • Figure 2 only schematically shows NSSF and NRF for a single PLMN.
  • the terminal device 220 may implement access to the network slice 120 via the access network device.
  • the terminal device 220 may only access one network slice 120 or multiple network slices 120 to use different services provided by the multiple network slices 120 at the same time.
  • the terminal device 220 accesses the network slice 120-2 via the access network device 210, so as to realize the communication of the terminal device 220 to the data network (DN).
  • Different network slices 120 may be able to access different DNs.
  • network slices 120-1 and 120-2 can access DN 280-1
  • network slice 120-N can access DN 280-M.
  • DN 280-1, ..., 280-M can be collectively referred to as DN 280 or respectively.
  • FIG. 2 shows only an example networking manner of network slicing. In actual applications, there may be many other different networking methods. For example, different network slices can have their own AMF. In addition, the types of devices, the number of devices, and the manner of connection between the devices shown in Figure 2 can all be changed. For example, FIG. 2 only schematically shows some core network devices, but there may actually be more, fewer, or other types of core network devices. In addition, there may be more, fewer, or other access network devices, more terminal devices, and so on. Variations of these deployment methods are achievable by those skilled in the art. The embodiments of the present disclosure do not limit this.
  • the identification of the network slice may include single network slice selection assistance information (S-NSSAI).
  • S-NSSAI may at least contain slice type/service type (SST) information, which is used to indicate the characteristics of the network slice and the service type.
  • SST slice type/service type
  • the S-NSSAI may also include slice discrimination information (SD) to further differentiate multiple network slice instances that satisfy the same SST. SD is optional.
  • NSSAI network slice selection assistance information
  • S-NSSAI network slice selection assistance information
  • classifications are used to indicate the name of NSSAI in different scenarios or conditions. The following will briefly explain some example NSSAI and related information.
  • the NSSAI of the network slice 120 may include configured NSSAI (configured NSSAI), which may specifically include the following types:
  • HPLMN configures NSSAI: it includes HPLMN S-NSSAI, also known as subscription S-NSSAI; terminal device 220 is in the home network, for example, in HPLMN, HPLMN can be used to configure NSSAI to access the network;
  • HPLMN S-NSSAI also known as subscription S-NSSAI
  • terminal device 220 is in the home network, for example, in HPLMN, HPLMN can be used to configure NSSAI to access the network;
  • the visited PLMN configures NSSAI:
  • the terminal device uses the VPLMN to configure NSSAI to access the network;
  • the terminal device 220 can use the default NSSAI to register to the network; the default configuration NSSAI is usually the standard defined S-NSSAI.
  • the network access mentioned above refers to that the terminal device 220 constructs a requested NSSAI (requested NSSAI) based on the configuration of the NSSAI, so as to request access to a certain network slice 120.
  • the same network slice 120 may have different identities (for example, different NSSAIs).
  • the network slice selection strategy (NSSP) obtained by the terminal device 220 includes the correspondence between the service session (for example, application session) of the terminal device 220 and the HPLMN S-NSSAI of the network slice 120 under the home network.
  • the terminal device can also obtain the mapping information from the configuration NSSAI to HPLMN S-NSSAI, which is used to assist the terminal device 220 in determining the configuration NSSAI corresponding to the network slice 120 to be used for the bearer service, so that it can be used in subsequent registration requests. Contains the new configuration NSSAI.
  • the NSSAI of the network slice 120 also includes requesting NSSAI.
  • the request NSSAI is constructed by the terminal device 220 to indicate to the network side (the access network side and the core network side) the network slice 120 for which access is requested.
  • Request NSSAI can come from the following parameters:
  • -Default configured NSSAI (default configured NSSAI): If the terminal device 220 does not have any NSSAI configured or allowed NSSAI in the current PLMN, the default configured NSSAI can be used;
  • the terminal device 220 can obtain the configured NSSAI of the PLMN in the current PLMN;
  • the terminal device 220 can obtain the NSSAI allowed by the PLMN in the current PLMN;
  • the terminal device 220 has once accessed the current PLMN and received the allowed NSSAI, and at the same time, the terminal device 220 needs to request a new configuration S-NSSAI in the PLMN.
  • the NSSAI of network slice 120 also includes subscription to S-NSSAI, which may include:
  • Subscribed S-NSSAI is the S-NSSAI subscribed by the user, namely HPLMN S-NSSAI; the subscription S-NSSAI can be a standard value or a non-standard value defined in HPLMN (for example, A certain HPLMN can define a non-standard value S-NSSAI, which is used to identify network slices that can support both eMBB and URLLC services);
  • -Default Subscribed S-NSSAI (default Subscribed S-NSSAI): According to the network operator’s policy, one or more of the user’s subscription S-NSSAI may be set as the default S-NSSAI; if the terminal device 220 is connected to the network No NSSAI request is carried, and the network element of the core network (for example, NSSF) will determine the network slice 120 that the terminal device 220 requests to access according to the default subscription S-NSSAI.
  • the network element of the core network for example, NSSF
  • the NSSAI of the network slice 120 also includes an allowed NSSAI, which is used to identify the network slices that the terminal device 220 is allowed to use in the network.
  • the allowed NSSAI is valid within the registration area of the terminal device 220. In other words, when the network allocates a tracking area (TA), it needs to consider the availability of the network slice 120 to the terminal device 220.
  • TA tracking area
  • the current service network of the terminal device 220 is a visited network (for example, VPLMN)
  • the terminal device 220 it is also necessary to provide the terminal device 220 with the allowed NSSAI of the visited network to the NSSAI of the home network (for example, the allowed NSSAI of the VPLMN to HPLMN NSSAI)
  • the mapping information is used to indicate the possible mapping of different NSSAIs of the same network slice 120 in the visited network and the home network.
  • the terminal device 220 may also The obtained mapping information from the allowed NSSAI to the HPLMN S-NSSAI is used to assist the terminal device 220 in determining the allowed NSSAI according to the service, so as to be used for the subsequent session request of the service, for example, the protocol data unit (PDU) session request.
  • PDU protocol data unit
  • the NSSAI information given above is only an example of the identifier used to identify the network slice 120.
  • the identification of the network slice 120 may additionally or alternatively include other information.
  • Other information used to identify a network slice may include, for example, service type information, which indicates the specific service supported by the network slice 120; tenant information, used to instruct customer information for creating or renting the network slice; user group information, used to indicate A certain feature, such as user level, grouping information after users are grouped; slice group information is used to indicate the grouping of network slices according to a certain characteristic, for example, all network slices that can be accessed by the terminal device are regarded as a slice group , Or the grouping of network slices can also be divided according to other standards; network slice instance information is used to indicate the instance identifier and characteristic information created for the network slice, for example, an identifier can be assigned to the network slice instance to specifically indicate the network slice Examples, etc.
  • the network slicing may use at least one of the foregoing identification information to indicate the network slicing, which is not limited in the embodiment of the present disclosure. If the terminal device, the access network device, or the core network device supports multiple network slices, the identifiers of the network slices supported by the terminal device, the access network device or the core network device may be indicated by different identifiers in multiple types of identification information.
  • the terminal device performs data communication in a communication environment based on network slicing
  • the service of the terminal device 220 mentioned in this article may be a session of the terminal device 220, such as a PDU session, or may be a service flow, a radio bearer, etc. of the terminal device 220.
  • a conversation is mainly used as an example of a service for description.
  • the terminal device 220 generally has a corresponding relationship between a session (for example, a session of a certain application) and the HPLMN S-NSSAI of the network slice 120 under the home network.
  • This correspondence is usually included in the NSSP, and may be provided to the terminal device 220 by the home network, such as the core network device PCF (not shown in FIG. 2) of HPLMN.
  • An example of NSSP is shown in Table 1 below.
  • Table 1 shows the identification of the network slices associated with each application of the terminal device 220 under HPLMN.
  • the terminal device 220 may determine the identity of the network slice to be accessed under the HPLMN. Since the same network slice may have different identities in different networks, if the service network of the terminal device 220 is the visited network instead of the home network when the PDU session request is initiated, it may not be possible to determine that the associated network slice is in the visited network according to the NSSP Logo. To solve this problem, the terminal device 220 can also obtain the mapping information from the NSSAI allowed by the visited network to the NSSAI of the home network. An example of such mapping information is shown in Table 2 below.
  • the terminal device 220 can use the NSSP of Table 1 to determine the identity of the corresponding network slice in the home network as HPLMN S-NSSAI 2.
  • the terminal device 220 also determines, according to the mapping information in Table 2, that the identification information of the network slice identified by the HPLMN S-NSSAI 2 under the visited network is the allowed S-NSSAI 1. After determining the identification information, the terminal device 220 will carry the HPLMN S-NSSAI 2 and the allowed S-NSSAI 1 in the PDU session establishment request.
  • the PDU session establishment request will be transmitted to the access network device connected to the terminal device 220, and then transmitted to the core network device, such as AMF 230.
  • the core network device such as AMF 230.
  • the network slice type that the terminal device 220 requests to access can be determined.
  • the AMF 230 In response to the PDU session establishment request from the terminal device 220, the AMF 230 provides the requested HPLMN S-NSSAI2 and allowed S-NSSAI 1 to the NSSF 260 under the visited network.
  • the NSSF 260 selects a network slice specific NRF and a network slice instance (NSI) identifier (ID) for the AMF 230 based on at least these identifiers.
  • AMF 230 provides HPLMN S-NSSAI 2, allowed S-NSSAI 1 and NSI ID to the corresponding NRF270 to select the SMF 240 where the network slice is located.
  • mapping information between the NSSP and the network slice identifiers of different networks needs to be used to correctly identify the corresponding network slice.
  • remapping can also be implemented between different network slices.
  • the "remapping" of a network slice refers to that one network slice can be remapped to another network slice, so that the services (for example, PDU sessions) carried on one network slice can be served by the remapped network slice.
  • the network resources of another network slice are used to implement the services of the previous network slice.
  • Network slicing remapping can be applied in handover scenarios, for example, a terminal device needs to switch from one access network device to another access network device, and the access network device to be switched to does not support the network slice where the current service of the terminal device is located. .
  • other network slices can be selected to provide services for the terminal device through the remapping of the network slice.
  • there are some solutions to assist the access network device to perform the remapping of the network slice by providing the access network device connected to the terminal device with the remapping relationship between the network slices under the same network.
  • remapping of network slices can also be performed in other communication scenarios.
  • the access network device can also transfer the service of the terminal device to another network slice through remapping, so as to achieve load balancing of the network slice, so that the terminal The equipment provides the desired quality of service.
  • the target access network device of the target network may not be able to identify the network slice corresponding to the current PDU session of the terminal device when processing the switching request of the terminal device, and it cannot be determined.
  • the network slice allowed by the terminal device in the target network no information related to the allowed NSSAI is obtained).
  • the access network equipment cannot handle the access control of the terminal equipment. This mainly occurs in the scenario where the terminal device is switched through the Xn interface between the access network devices.
  • terminal device switching across the network can be implemented through the N2 (control plane) interface between the access network device and the core network device.
  • the AMF can determine the NSSAI information of the network slice allowed by the terminal device in the target network according to the UE context information of the terminal device maintained in the core network, and control the access of the terminal device to the target access network device based on this information.
  • the terminal device may be allowed to switch to the target network first, and then the terminal device may be required to initiate a tracking area update (TAU) or according to the conditions. Register to obtain the identification information of the network slice allowed by the terminal device in the target network. The target access network device thus executes the access control of the terminal device again. This process will introduce latency issues. If it is determined that the terminal device cannot be allowed to access, the PDU session will be rejected, which will affect the business continuity of the terminal device.
  • TAU tracking area update
  • an improved solution is provided to support access control of a terminal device.
  • the target access network device to be accessed by the terminal device obtains information indicating the relationship between multiple network slices of different networks from the core network device or the source access network device.
  • the target access network device can perform access control from the terminal device to the target access network device based on the obtained information.
  • the target access network device can perform access control when the terminal device accesses across the network, reduce the access delay, reduce the service interruption problem of the terminal device due to the session rejection, and ensure the terminal device Business continuity.
  • the network slice refers to the network slice 120 of FIG. 2.
  • the signaling interaction in FIGS. 3 to 5 involves the target access network device of the terminal device 220, and in some implementations, it involves the core network device, and in other implementations, it involves the source access network device of the terminal device 220.
  • the target access network device refers to the physical or virtual access network device to be accessed by the terminal device 220, where the terminal device 220 may currently be connected to other network devices or is performing initial operations on the target access network device. Register for access.
  • the source access network device refers to the physical or virtual access network device to which the terminal device 220 is currently connected.
  • the terminal device 220 may access the network switching service of the source network via the source access network device (for example, access the network slice of the service network). If the terminal device 220 is being served by a source network, the source network is referred to as the service network of the terminal device 220.
  • the access network device 210 in FIG. 2 is the source access network device to which the terminal device 220 is currently connected
  • the access network device 212 is the target access network device of the terminal device 220.
  • the terminal device 220 if the terminal device 220 is to switch from the current serving network to another network, for example, a network accessed via a target access network device, the network may be referred to as the target network of the terminal device 220. If the target access network device 212 determines that the terminal device 220 is allowed to access a network slice of the target network, after the handover is completed, the target network will become the service network of the terminal device 220.
  • the core network device refers to the physical or virtual device that implements related functions on the core network side. It can be an AMF 230 that can directly interface with the access network device, or it can be the AMF 230 and one or more of the core network. A general term for other network functions.
  • the core network equipment is uniformly labeled as the core network equipment 330.
  • FIG. 3 shows an interactive signaling diagram of a communication process 300 according to some embodiments of the present disclosure.
  • the target access network device 212 is to be provided with information indicating the relationship of network slices of different networks (referred to herein as "first information").
  • the first information specifically indicates the relationship between one or some network slices of one or more first networks and one or some network slices of one or more second networks.
  • the first network and the second network are different networks.
  • the first network and the second network may be different PLMNs, and different PLMNs may be deployed by different network operators.
  • the first network and the second network may also be other types of networks.
  • Each network slice of the first network is sometimes referred to herein as a first network slice, and each network slice of the second network is sometimes referred to herein as a second network slice.
  • the network slices indicated in the first information are all network slices supported by the first network and the second network.
  • the first information indicates the relationship between a certain first network slice of the first network and a certain second network slice of the second network
  • the slice correspondence is changed to correspond to the second network slice, that is, the correspondence between the service of the terminal device 220 and the network slice may change between the first network slice and the second network slice.
  • the second network slice can provide basically the same quality of service (QoS) as the first network slice, or can provide lower or higher QoS than the first network slice, but the QoS is reduced or improved. Tolerable range.
  • QoS quality of service
  • the relationship indicated by the first information may be a remapping relationship from a first network slice of the first network to a second network slice of the second network, where the remapping relationship indicates that the terminal device 220 is in the first network of the first network. Services on one network slice may be remapped to a second network slice of the second network, so that the second network slice provides communication services.
  • the first information may also be referred to as remapping policy information, which specifically indicates how to perform remapping between network slices of different networks.
  • the first information indicating the relationship between the network slices of different networks helps the target access network device 212 to perform access control for the terminal device 220, especially when the terminal device 220 switches between different networks. Case.
  • the first information may include the identification of the first network, the identification of the first network slice, the identification of the second network, and the identification of the second network slice.
  • Network identification is sometimes called network identification, which is used to uniquely identify different networks.
  • the identifier of a network slice is sometimes called a slice identifier, and is used to identify different network slices in the corresponding network. The same network slice can be supported in different networks, but the identity of the same network slice in different networks can be the same or different.
  • the network identifier and the slice identifier may be used to indicate the relationship between the corresponding network and its network slice.
  • the identities of the first network and the second network may include, for example, the respective PLMN identities (PLMN IDs) of the first network and the second network.
  • PLMN IDs PLMN identities
  • the identification of the network may also or alternatively include other information that helps identify a specific network, such as the name of the network operator.
  • the identifier of the network slice may include the respective S-NSSAI.
  • the identification of the network slice may also include other information that helps to identify a specific network slice.
  • the first information may be provided to the target access network device 212 in various ways.
  • the first network and the second network involved in the first information and their network slices may be different in different ways. Two possible ways are listed below, including way A and way B.
  • the core network device 330 determines 301 first information, where the first information indicates that one or more network slices of one or more first networks are related to one or more second networks. The relationship of one or some network slices.
  • the core network device 330 may receive network slice information from multiple access network devices (for example, multiple access network devices 210, 212, and 214 in FIG. 2), and the network slice information indicates each One or more networks (for example, PLMN) supported by each access network device and one or more network slices supported in each network.
  • multiple access network devices may send network slice information to the core network device 330, such as AMF230, during the process of establishing the N2 interface.
  • the access network device transmits the supported network and network slice to the core network device 330 through the NG establishment message.
  • the core network device 330 includes the AMF 230 and other network functions of the core network.
  • the first information may be determined based on the network slice information.
  • the core device 330 may refer to the policy information of each network maintained on the core network side to determine the relationship between the network slices of each network indicated by the network slice information, for example, determine whether these network slices are equivalent. , Whether it can be remapped, etc., so that the first information to be sent can be determined.
  • the core network device 330 may also determine the first information in other ways.
  • the first information may be pre-configured in the core network device 330, for example, in the core network device 330 in the initial stage of network deployment. The embodiment of the present disclosure does not limit how the core network device 330 obtains the first information.
  • the first network indicated by the first information may include one or more networks within a TA range
  • the second network may include one or more networks within the same TA range.
  • the set of the first network and the set of the second network may overlap, but for a certain first network, the first information may indicate the difference between one or more first network slices of the first network and network slices of a different second network. relation. Since the first information covers the relationship between the network slices of the network in a certain area, no matter the terminal device wants to access any network in the area, the corresponding target access network device can perform access control according to the first information.
  • the core network device 330 transmits the first information determined by 302 to the target access network device 212, and the target access network device 212 receives 304 the first information from the core network device 330.
  • the first information is included in the NG establishment response transmitted to the target access network device 212, and the NG establishment response is a response to the NG establishment message sent by the target access network device 212.
  • the target access network device 212 can obtain the first information for access control in advance during the interface establishment phase.
  • the core network device 330 may also transmit the first information in other messages or signaling communicated with the target access network device 212, or transmit the first information through dedicated signaling.
  • the transmission of the first information by the core network device 330 may be extensive.
  • the core network device 330 may send the first information to multiple access network devices within a certain TA range, and the target access network device 212 is one of them.
  • the core network device 330 such as the AMF 230, may send the first information to the target access network device 212 through any type of signaling in the interface with the target access network device 212.
  • the target access network device 212 can determine the relationship between each network slice of each first network and each network slice of each second network slice. It should be understood that Table 3 only shows one possible representation form of the first information. In practical applications, the first information can also be expressed in any other way.
  • the core network device 330 may not consider whether the network slice relationship is applicable to a specific terminal device 220, but assumes that different terminal devices 220 are in these first and second networks.
  • the remapping strategy for network slicing is the same.
  • Such first information may sometimes be referred to as general first information, general remapping policy information, or remapping policy information that is not associated with the terminal device.
  • the source access network device 210 may send additional information (referred to as the "first" in this article) to the target access network device 212.
  • Two information may indicate identifiers of network slices allowed to be used by the terminal device 220 in different networks, where the network includes the second network indicated by the first information.
  • the second information may be used to further assist the target access network device 212 to perform access control, for example, to enable the target access network device 212 to determine which network slices the terminal device 220 is allowed to access in the second network.
  • the network slice indicated in the second information and the network slice indicated in the first information may not be completely the same, but partially overlap.
  • the second information may indicate that fewer network slices in the second network are allowed to be accessed by the terminal device 220.
  • the network slice in the second network indicated by the second information is sometimes referred to herein as the "third network slice" to distinguish it from the second network slice indicated by the first information, but the second network slice may include or part of Including the third network slice.
  • a possible form of the second information is given in Table 4 below.
  • Table 4 only shows one possible representation form of the second information. In practical applications, the second information can also be expressed in any other way.
  • the source access network device 210 may receive the second information for the terminal device 220 from the core network device 330.
  • the second information may be used as the UE context information of the terminal device 220, which is provided by the core network device 330 to the source access network device 210.
  • the source access network device 210 may also obtain the second information in other ways and provide it to the target access network device 212.
  • the source access network device 210 may send the second access network device 212 to the target access network device 212 when it is determined to switch the terminal device 220 from the current service network to the target network supported by the target access network device 212. information. For example, if a handover for the terminal device 220 is triggered, the source access network device 210 sends a handover request to the target access network device 212, and the handover request carries the second information.
  • the core network device 330 may also carry the second information in other types of messages or signaling communicated with the target access network device 212, or transmit the second information through dedicated signaling.
  • the first information can also be provided to the target access network device 212 in another way (namely way B).
  • the core network device 330 determines 311 the first information and sends 312 the first information to the source access network device 210 of the terminal device 220.
  • the source access network device 210 receives 314 the first information from the core network device 330, and sends 316 part or all of the received first information to the target access network device 212.
  • the target access network device 212 receives 318 the first information from the source access network device 210.
  • the target access network device 212 it is desirable to provide the target access network device 212 with slice related information specific to the terminal device 220.
  • the first network indicated by the first information sent by the core network device 330 to the source access network device 210 in the method B is specifically the service network of the terminal device 220, rather than any network in a certain area.
  • the target access network device 212 can directly use the information to perform access control for the terminal device 220.
  • the amount of information carried by the first information is less, the overhead of information transmission between devices can be reduced.
  • the core network device 330 may determine the current service network of the terminal device 220 through the source access network device 210 to which the terminal device 220 is currently connected. Specifically, when the terminal device 220 communicates in the service network, it usually initiates a session establishment request to the core network via the source access network device 230, which carries the identifier of the service network of the terminal device 220. The source access network device 230 forwards the session establishment request of the terminal device 220 to the core network device 330.
  • the core network device 330 can determine the service network of the terminal device 220 from the received session establishment request, and then determine that the first information sent to the source access network device 210 only indicates one or more of the service network The relationship between the network slice and the network slice of one or more second networks.
  • the core network device 330 may also determine which network slice of the serving network is served by the current session of the terminal device 220. For example, the session establishment request from the source access device 210 may also include the identifier of the network slice that the terminal device 220 requests to access for the session to be established. If the core network device 330 determines that the terminal device 220 is allowed to access the network slice, correspondingly, the core network device 330 may determine the relationship between the network slice of the serving network and the network slices of one or more second networks in the first information. , Such as the remapping relationship of these network slices.
  • the network slice of the service network involved in the first information may only be the network slice currently accessed by the terminal device 220, or it may also include the core network device 330 determining that the service network is allowed
  • the terminal device 220 accesses one or more other network slices serving the current service. This can further reduce the information volume of the first information, making the first information more suitable for access control of the terminal device 220 under the current traffic condition. In addition, the overhead required for the transmission of the first information is smaller.
  • the core network device 330 may also determine the first information based on the network slices allowed by the terminal device 220 in one or more second networks, so that the second network involved in the first information and The second network slice is allowed to be used by the terminal device 220.
  • the first information provided by the core network device 330 indicates the relationship between the network slice of the serving network and the network slice allowed to be used by the terminal device 220 in one or more second networks.
  • mode B for the current service of the terminal device 220, such as the current PDU session, a possible form is given in Table 5 below.
  • Table 5 only shows one possible representation form of the first information. In practical applications, the first information can also be expressed in any other way.
  • the core network device 330 may transmit the first information to the source access network device 210 in the session resource establishment request for the session establishment request.
  • the core network device 330 may also send the first information in other messages or signaling communicated with the source access network device 210, or transmit the first information through dedicated signaling.
  • the source access network device 210 may forward the first information to the target access network device 212.
  • the one or more second networks indicated by the first information received from the core network device 330 include the target network supported by the target access network device 212.
  • the source access network device 210 may send the first information to the target access network device 212 when it is determined to switch the terminal device 220 from the current service network to the target network supported by the target access network device 212 . For example, if a handover for the terminal device 220 is triggered, the source access network device 210 sends a handover request to the target access network device 212, and the handover request carries the first information.
  • the source access network device 210 may not directly forward the entire content of the first information received from the core network device 330, but depends on the target network to which the terminal device 220 is to be switched to the target access network.
  • the device 212 transmits the information part related to the target network to which the terminal device 220 is to be switched. That is, the first information sent by the source access network device 210 to the target access network device 212 may indicate the relationship between the network slice of the serving network and the network slice of the target network to which the terminal device 220 is to be switched. Therefore, the transmission overhead between the access network devices can be reduced, so that the target access network device 212 does not need to receive useless information.
  • the first information since the first information is related to the service network of the terminal device 220, and in some embodiments is also related to the target network of the terminal device 220, such first information may sometimes be referred to as specific to The first information of the terminal device 220 or the remapping policy information specific to the terminal device 220.
  • the target access network device 212 executes 320 access control from the terminal device 220 to the target access network device 212 based on the first information.
  • Access control may include various operations related to the access of the terminal device 220 to determine whether the terminal device 220 can access the target network supported by the target access network device 212, such as a target PLMN. In some cases, access control is sometimes referred to as "admission control".
  • the target access network device 212 may trigger access control for the terminal device 220 due to various factors. In some embodiments, if the terminal device 220 is being served by the source network supported by the source access network device 210 but needs to switch from the current serving network to the target network, the target access network device 212 needs to perform access control. In some examples, the target access network device 212 receives a switching request from the source access network device 210 to request the terminal device 220 to be switched from the current serving network to the target network. The target access network device 212 executes the access control of the terminal device 220 after receiving the handover request.
  • the target access network device 212 when performing access control, can determine the identity of the service network of the terminal device 220 (sometimes referred to as "service network identity"), and the terminal device 220 accesses the service network
  • the identifier of the service network slice (referred to as the “service slice identifier”) and the identifier of the target network to which the terminal device 220 is to be switched (referred to as the “target network identifier”).
  • the identifiers of these networks and network slices may be carried in the handover request from the source access network device 210.
  • the handover request includes the identifier of the network slice corresponding to the current PDU session of the terminal device 220, which indicates the serving network slice of the serving network.
  • the handover request also includes a mobility constraint list, which indicates the identity of the target network to be handed over.
  • the slicing request may optionally include other information. The embodiments of the present disclosure are not limited in this respect.
  • the target access network device 212 can determine a network slice (referred to as a "target network slice") in the target network that is related to the serving network slice from the acquired first information.
  • the target access network device 212 can determine from the first information whether the service of the terminal device 220 can be changed from corresponding to the serving network slice to corresponding to the target network slice, for example, whether it can be remapped from the serving network slice to Target network slice.
  • the target access network device 212 determines from the handover request that the identifier of the service network corresponding to the PDU session of the terminal device 220 is "V1" and the identifier of the service network slice is "S-NSSAI 1", and also determines the identifier of the target network As "V2". Using these network identifiers and service slice identifiers, the target access network device 212 finds the service network slice S-NSSAI of the service network V1 from the first information, which can be remapped to one or more target network slices of the target network V2 , For example, the target network slice identified by the identifiers S-NSSAI 1'and S-NSSAI 2'.
  • the target access network device 212 may also receive additional second information from the source access network device 210.
  • the second information indicates which of the network slices in the one or more second networks allows the terminal device 220 to access.
  • the target access network device 212 may use the identifier V2 of the target network to determine from the second information one or more target network slices that the terminal device 220 is allowed to use in the target network.
  • the target access network device 212 may take an intersection of the target network slice results determined from the first information and the second information, so as to determine the target network slice that can be remapped to the current serving network slice and also allows the terminal device 220 to use.
  • the first information is the first information specific to the terminal device 220 received by way B
  • one or more target network slices determined by the target access network device 212 from the first information have been allowed by the terminal device 220 by default.
  • the target access network device 212 may determine whether the terminal device 220 can be allowed to access based on the determined target network slice. For example, the target access network device 212 may determine whether it can provide the terminal device 220 with access to the target network slice S-NSSAI 1'and/or S-NSSAI 2', and whether it needs to perform the service network slice S-NSSAI 1 to Remapping of target network slice S-NSSAI 1'and/or S-NSSAI 2', etc.
  • the access control of the target access network device 212 to the terminal device 220 depends on its own specific access control strategy, and the embodiments of the present disclosure are not limited in this respect.
  • a subsequent handover process 332 is performed between the terminal device 220, the source access device 210, and the target access network device 212.
  • the subsequent handover process 332 depends on specific communication requirements, and the embodiments of the present disclosure are not limited in this respect.
  • the terminal device 220 currently accesses the network slice of the serving network via the source access network device 210 to obtain the communication service of the network slice.
  • the current serving network of the terminal device 220 may be a visited network of the terminal device 220. That is, the terminal device 220 is roaming. In other embodiments, the current serving network of the terminal device 220 may also be the home network of the terminal device 220.
  • the target network to be accessed by the terminal device 220, and the target network to be accessed via the target access network device 212 is another visited network of the terminal device 220.
  • the foregoing only describes a specific example in which the target access network device 212 performs access control in a handover scenario.
  • the access control process may also include other different operations, more operations, or some of the above operations may be omitted.
  • the first information indicating the relationship of the network slices of different networks can help the target access network device 212 complete the access control process under different conditions.
  • the target access network device 212 may also trigger access control on the terminal device 220 by other events.
  • the target access network device 212 may use the first information to perform initial access control of the terminal device 220.
  • the terminal device 220 sends 342 an initial access request to the target access network device 212 to request registration to the target network.
  • the target access network device 212 receives 344 the initial access request, it can perform 320 access control based on the first information. For example, based on the first information, the target access network device 212 may determine whether to allow the terminal device 220 to access the target network and how to implement the access of the terminal device 220, such as which network slice of the target network to access, and so on.
  • the target access network device can complete the access control of the terminal device in time, especially in the case of cross-network handover, avoiding the delay of cross-network handover, The possibility of service interruption of the terminal device is reduced, thereby ensuring the service continuity of the terminal device.
  • FIG. 4 and FIG. 5 respectively show the specific implementation of the signaling interaction of each communication entity in the mode A and mode B of Fig. 3.
  • the implementations of FIGS. 4 and 5 involve handover scenarios of the terminal device 220 between different networks, and some of the messages/signaling may have been mentioned above as example embodiments. It should be understood that FIG. 4 and FIG. 5 are only for explaining some specific implementations related to the signaling interaction process shown in FIG. 3, and the signaling interaction process shown in FIG. 3 can also have many other variations.
  • FIG. 4 shows a signaling diagram of a communication process 400 of each communication entity in the embodiment of mode A in FIG. 3.
  • the source access network device 210 transmits a 402NG establishment message to the core network device 330
  • the target access network device 212 also transmits a 406NG establishment message to the core network device 330. Therefore, the core network device 330 receives 404 the NG setup message from the source access network device 210 and receives 408 the NG setup message from the target access network device 212.
  • the terminal device 220 may not have or may have accessed the service network via the source access network device 210, and may not have yet or may have triggered the terminal device 220 to switch from the service network to the target network. .
  • each NG setup message includes a TA range identified by a TA code (TAC) and network information under the TA range.
  • the network information includes one or more network identities, such as PLMN ID.
  • each NG establishment message also includes network slice information supported by each network in the current TA range, also known as TA identifier (TAI) slice support information.
  • the network slice information includes the identification of one or more supported network slices, such as S-NSSAI.
  • the core network device 330 may also receive NG establishment messages from other access network devices to determine the network and network supported within the corresponding TA. Network slicing. Of course, in addition to the NG setup message, the core network device 330 may also learn about network slices supported in different networks through other messages or signaling.
  • the core network device 330 determines the first 409 to be provided to the access network device based on the network slice information of each network received from the access network device, and possibly also based on the policy information of each network maintained on the core network side. information.
  • the first information includes, for example, the information discussed above with reference to way A in FIG. 3.
  • FIG. 4 shows an exemplary embodiment in which the core network device 330 determines the first information based on the network slice information reported by the access network device, as mentioned above, in other embodiments, the core network device 330 may Such first information is pre-configured. In an embodiment where the first information is pre-configured, the core network device 330 may not need to receive network slice information from the access network device.
  • the core network device 330 transmits 410 the first information to the target access network device 212.
  • the core network device 330 may send the first information to multiple access network devices within the same TA.
  • the first information may be included in the NG establishment response, for example.
  • the target access network device 212 receives 412 the first information from the core network device 330, so that the first information can be subsequently used to perform access control.
  • the example of Fig. 4 shows access control in a handover scenario. Specifically, if the source access network device 210 determines to initiate a handover for the terminal device 220, for example, it is determined to switch the terminal device 220 from the current serving network (i.e., the first network) to a different target network (i.e., the second network), The source access network device 210 transmits 416 a handover request to the target access network device 212.
  • the handover request may include, for example, a list of PDU session resources to be established, which includes the current PDU session ID of the terminal device 220 and the identifier of the service network and the service network slice corresponding to each PDU session.
  • the handover request may also include a mobility restriction list, which indicates the identity of the target network to be handed over.
  • the handover request further includes the second information discussed above, which indicates the identification of the network slice that the terminal device 220 is allowed to use in one or more second networks.
  • the target access network device 212 executes 420 the access control from the terminal device 220 to the target access network device 212. Some embodiments of the access control of the target access network device 212 that have been discussed above with reference to FIG. 3 will not be repeated here.
  • the target access network device 212 determines that the terminal device 220 is allowed to access the target network.
  • the target access network device 212 transmits 422 a handover request response to the source access network device 210.
  • the response indicates that the handover request is successful and allows the terminal device 220 to switch from the current serving network to the target network.
  • the target access network device 212 may also determine to remap the PDU session of the terminal device 220 from the service network slice (identified by NSSAI 1, for example) of the current serving network (identified by V1) to the target network ( For example, the target network slice identified by V2 (for example, identified by NSSAI 2').
  • the identification of the target network slice may be carried in the handover request response, for example.
  • the source access network device 210 After receiving 424 the handover request response from the target access network device 212, the source access network device 210 transmits 426 information to the terminal device 220 to instruct the terminal device 220 to switch the service network from the current network to another different network. That is the target network.
  • Such information is referred to herein as "third information".
  • the terminal device 220 can quickly learn the success of the handover and the target network to be handed over.
  • the third information may include the identification of the target network to which the handover is made.
  • the third information may be included in a radio resource control (RRC) reconfiguration message (for example, an RRCReconfiguration message) transmitted by the source access network device 210 to the terminal device 220.
  • RRC radio resource control
  • the terminal device 220 uses 430 the third information.
  • the third information can have multiple functions at the terminal device 220.
  • the terminal device 220 since the transmission of the third information means that the target access network device 212 determines that the handover of the terminal device 220 is allowed, the terminal device 220 may perform random access to the target access network device in the target network. In this case, the terminal device 220 may perform random access to the target access network device based on the third information.
  • the probability of successful random access of the terminal device 220 can be improved.
  • the target access network device 212 supports multiple networks, and the available air interface random access channel (RACH) resource set may be divided into supported networks.
  • RACH available air interface random access channel
  • the terminal device 220 can determine the RACH resource allocated to the target network from the RACH resource set, and initiate random access to the target access network device 212 on the determined RACH resource . By using the RACH resources associated with the target network, the random access success rate of the terminal device 220 can be improved. In some embodiments, if the random access procedure is successfully completed, the serving network of the terminal device 220 will become the target network. The terminal device 220 may access the target network via the target access network device 212, in particular, access to the target network slice of the target network.
  • the terminal device 220 may also display the identification of the target network.
  • the displayed identification of the target network may be the PLMN or may be the name of the network operator of the PLMN, or the like. In this way, the user of the terminal device 220 can be notified of changes in the service network.
  • the source access network device 210 may also transmit additional information to the terminal device 220 to instruct the terminal device 220 to access a specific target network slice in the target network, where the terminal device The current session of 220 is switched from being served by the current serving network slicing to being served by the target network slicing.
  • additional information is referred to herein as "fourth information".
  • the fourth information may include the identification of the target network slice. By receiving the fourth information, the terminal device 220 can quickly learn the target network slice to which the session is to be switched.
  • the fourth information may be included in the RRC reconfiguration message transmitted by the source access network device 210 to the terminal device 220. For example, the fourth information may be sent to the terminal device 220 together with the foregoing third information.
  • the target access network device 212 is allowed to access after performing access control. If the target access network device 212 denies the access of the terminal device 220 after performing access control, the interaction between the target access network device 212, the source access network device 210, and the terminal device 220 may be different. For example, in the case of denying access, the source access network device 210 will not send an RRC reconfiguration message to the terminal device 220, and the terminal device 220 will not perform random access to the target access network device 212.
  • FIG. 5 shows a signaling diagram of a communication process 500 of each communication entity in the embodiment of mode A in FIG. 3.
  • the terminal device 220 is currently served by the source network via the source access network device 210, that is, the source network is the current serving network of the terminal device 220.
  • the terminal device 220 transmits 502 a session establishment request, such as a PDU session establishment request, to the source access network device 210.
  • the session establishment request is a non-access stratum (NAS) message, which can be used to request the establishment of a session for a certain type of service, for example, a session that carries a service of a certain application on a terminal device.
  • the session establishment request may carry the identification of the service network of the terminal device 220.
  • the session establishment request may further include the identification of the network slice that the terminal device 220 requests access to for the session to be established.
  • the source access network device 210 receives the session establishment request of 504, and transmits 506 the session establishment request for the terminal device 220 to the core network device 330.
  • the core network device 330 may perform a corresponding session establishment process.
  • the core network device 330 determines the first information to be provided to the source access network device 210.
  • the first information is determined as the information discussed above with reference to method B in FIG. 3.
  • the first information is specific to the terminal device 220, and indicates the relationship between one or more network slices of the service network of the terminal device 220 and one or more network slices of the second network.
  • the core network device 330 transmits 510 a session resource establishment request to the source access network device 210, and carries the determined first information in the session resource establishment request.
  • the source access network device 210 receives 512 the first information from the core network device 330.
  • the first information may be used to assist in realizing the access control of the terminal device 220 when the terminal device 220 is to be switched.
  • Figure 5 further shows an example of access control in a handover scenario. Specifically, if the source access network device 210 determines to initiate a handover for the terminal device 220, for example, it is determined to switch the terminal device 220 from the current serving network (i.e., the first network) to a different target network (i.e., the second network), The source access network device 210 transmits 516 a handover request to the target access network device 212.
  • the handover request also includes first information.
  • the first information carried in the handover request may be the first information received by the source access network device 210 from the core network device 330.
  • the handover request may include a part of the first information received from the core network device 330, the part of information indicating the relationship between one or more network slices of the serving network and one or more network slices of the target network, such as Remapping relationship.
  • the target access network device 212 executes 520 the access control from the terminal device 220 to the target access network device 212. Some embodiments of the access control of the target access network device 212 that have been discussed above with reference to FIG. 3 will not be repeated here.
  • the target access network device 212 transmits 522 the handover request response to the source access network device 210; the source access network device 210 transmits 526 the third information to the terminal device 220 after receiving 524 the handover request response; the terminal device 220 receives 528 the third information, and can Use 530 third information.
  • the source access network device 210 may also transmit the fourth information to the terminal device.
  • the operations from 522 to 530 in the process 500 are similar to the operations from 422 to 430 in the process 400, and will not be repeated here.
  • another solution is also provided to support the access control of the target access network device to the terminal device.
  • the target access network device obtains the slice identification information of the network slice of the terminal device in the home network, and also obtains slice correspondence information, which indicates the correspondence between the network slice of the terminal device in the visited network and the network slice of the home network Information. Based on such slice identification information and slice correspondence information, access control from the terminal device to the target access network device is performed. In this way, the target access network device can perform access control when the terminal device accesses across the network, especially when the terminal device wants to access the visited network, reduce the access delay and reduce the terminal device The business interruption caused by the rejection of the session ensures the business continuity of the terminal equipment.
  • each communication entity including the terminal device 220, the source access network device 210, the target access network device 212, and the core network device 330, are the same as those discussed above with reference to FIG. 3.
  • FIG. 6 shows a signaling interaction diagram of a communication process 600 according to some embodiments of the present disclosure.
  • the terminal device 220 is to switch from the current service network to the target network where the target access network device 212 is located, and the target network is the visited network of the terminal device 220 (sometimes referred to herein as "Second Interviewed Network").
  • slice identification information is provided to the target access network device 212 to indicate that the terminal device is in the home network (for example, HPLMN)
  • the identification of the home network slice in the target access network device 212 and also provide slice correspondence information to the target access network device 212 to indicate the correspondence between the network slice of the visited network (for example, VPLMN) and the network slice of the home network of the terminal device 220 sex.
  • the visited network indicated in the slice correspondence information refers to the target network where the target access network device 212 is located. How to provide this information to the target access network device 212 will be specifically discussed below.
  • the source access network device 210 may provide the above-mentioned slice identification information to the target access network device 212.
  • the source access network device 210 may also be in the visited network of the terminal device 220 (sometimes referred to as the "first visited network” in this document), that is, the terminal device 220 is roaming, and its current service network is Visit the network. Since the source access network device 210 is in the visited network of the terminal device 220, it may not have the aforementioned slice identification information related to the home network of the terminal device 220. In this case, the source access network device 210 can obtain the required slice identification information in a variety of ways, including the first and second methods discussed below.
  • the terminal device 220 transmits 602 the slice identification information to the source access network device 210, and the source access network device 210 receives 604 the slice identification information.
  • the slice identification information indicates the identification of the home network slice of the terminal device 220 in the home network.
  • the home network slice refers to a network slice corresponding to the current session of the terminal device 220 in the home network.
  • the terminal device 220 usually has such information about the home network.
  • the slice identification information may include the identification of the home network slice, such as S-NSSAI.
  • the slice identification information also carries the identification of the home network, so as to more clearly indicate that the slice identification information carried therein is identification information supported in the home network.
  • the slice identification information may be expressed as H_S-NSSAI 1, where H indicates the identity of the home network, and S-NSSAI 1 indicates the identity of the home network slice.
  • the slice identification information may be included in the session establishment request, for example, in the PDU session establishment request.
  • the session establishment request may be transmitted to the source access network device 210 as a NAS message.
  • the terminal device 220 may also transmit the slice identification information to the source access network device 210 through other messages/signaling.
  • the slice identification information may also indicate the identification of the network slice of the terminal device 220 in the source network (that is, the current serving network).
  • the network slice in the service network refers to the service network slice of the service network that the terminal device 220 accesses via the source access network device 210, and the network slice can be used for the current session of the service terminal device 220.
  • the slice identification information includes the identification of the network slice of the source network, which can be expressed as V1_S-NSSAI 2, where V1 indicates the serving network, and S-NSSAI 2 indicates the serving network slice on the serving network.
  • the core network device 330 transmits 608 the slice identification information to the source access network device 210, and the source access network device 210 receives 610 the slice identification information.
  • the core network device 330 may learn the identification of the home network slice of the terminal device 220 in the home network from the core network side.
  • the core network device 330 may determine the identity of the home network slice of the terminal device 220 in the home network after processing the session establishment request of the terminal device 220.
  • the core network device 330 may carry the slice identification information in the session resource establishment request transmitted to the source access network device 210.
  • the core network device 330 may also transmit the slice identification information to the source access network device 210 through other messages/signaling.
  • the source access network device 210 transmits 612 the slice identification information to the target access network device 212.
  • the source access network device 210 may transmit the slice identification information to the target access network device 212 when it is determined that the handover for the terminal device 220 is to be initiated.
  • the slice identification information may be included in the handover request sent by the source access network device 210 to the target access network device 212, for example.
  • the handover request may also include the identity of the service network of the terminal device 220, the identity of the service network slice that the terminal device 220 accesses in the service network, and the terminal device 220 to switch to The identity of the target network, etc.
  • the target access network device 212 receives 616 slice identification information.
  • the target access network device 212 may also obtain slice correspondence information to indicate the correspondence between the network slice of the visited network where the target access network device is located and the network slice of the home network of the terminal device 220.
  • the correspondence between two network slices in two networks means that the network slices indicated by different identifiers in the two networks actually correspond to each other, that is, the same network slice.
  • slice correspondence information is needed is that the same network slice may be indicated by different identifiers in different networks. Since the target access network device 212 is in the visited network of the terminal device 220, the target access network device 212 cannot determine the network slice corresponding to the current session of the terminal device 220 in the visited network based on only the identification information of the home network slice. With the help of the slice correspondence information, the target access network device 212 can determine the network slice in the visited network corresponding to the home network slice. In some cases, the slice correspondence information may also be referred to as network slice mapping information.
  • the core network device 330 transmits 622 such slice correspondence information to the target access network device 212.
  • the core network device 330 may receive 620 a request for slice correspondence information transmitted 618 by the target access network device 212.
  • the request may include the device identification of the terminal device 220 and the identification (for example, PLMN ID) of the visited network to be handed over (that is, the network where the target access network device 212 is located, which is also referred to as the target network during handover).
  • the request may also include the subscription permanent identifier (SUPI) of the terminal device 220.
  • SUPI subscription permanent identifier
  • the core network device 330 transmits slice correspondence information to the target access network device 212.
  • the core network device 330 can determine the home network of the terminal device 220. In some embodiments, if the request also includes SUPI, the core network device 330 can determine the home network more quickly. Further, through the identification of the visited network in the request, the core network device 330 can determine the corresponding slice correspondence information.
  • the target access network device 212 After receiving 624 the slice correspondence information from the core network device 330, the target access network device 212 executes 626 the terminal device 220 to the target access network device 212 based on the slice correspondence information and the slice identification information mentioned above. To determine whether to allow the terminal device 220 to switch to the network where the target access network device 212 is located.
  • the target access network device 212 when performing access control, is based on the identification of the home network slice of the terminal device 220 (for example, H_S-NSSAI 1), and the home network and the visited network indicated by the slice correspondence information.
  • the correspondence of the network slices of the network determines the network slice corresponding to the home network slice of the terminal device 220 in the visited network (referred to as "visited network slice").
  • the visited network slice may be identified as V2_S-NSSAI 3, for example, where V2 indicates the identity of the visited network where the target access network device 212 is located, and S-NSSAI 3 indicates the identity of the visited network slice in the visited network.
  • the target access network device 212 may determine whether it can provide the terminal device 220 with access to the visited network slice V2_S-NSSAI 3 based on its own ability to support the network slice. Based at least on the ability to support the visited network slice, the target access network device 212 determines whether to allow the terminal device 220 to access.
  • the target access network device 212 when performing access control, the target access network device 212 also determines whether the determined visited network slice can be remapped to other network slices in the visited network. In this way, when the visited network slice directly corresponding to the home network slice is not supported, support for the access of the terminal device 220 is realized through remapping.
  • the core network device 330 In order to support the target access network device 212 in determining the network slice to which the visited network slice can be remapped, in some embodiments, the core network device 330 also provides additional information to the target access network device 212 to indicate that it is in the home network The relationship between the various network slices, in particular, indicates the remapping relationship of the network slices in the home network. Such information is sometimes referred to herein as "fifth information" or remapping policy information for network slices in the home network. In some embodiments, the core network device 330 may transmit the fifth information to the target access network device 212 together with the slice correspondence information or separately.
  • the target access network device 212 also performs access control on the terminal device 220 based on the fifth information. Specifically, based on the fifth information, the target access network device 212 can determine one or more network slices in the home network to which the current home network slice H_S-NSSAI of the terminal device 220 can be remapped, for example, by H_S-NSSAI 3 And H_S-NSSAI 4 identification. Further, the target access network device 212 also determines the network slices (for example, H_S-NSSAI 3 and H_S-NSSAI 4) in the home network that can be remapped to the target access network device 212 based on the slice correspondence information.
  • the network slices for example, H_S-NSSAI 3 and H_S-NSSAI 4
  • the visited network slice V2_S-NSSAI 3 can also be remapped to the network slice in the visited network.
  • the target access network device 212 can perform the determination of the remappable network slice of the visited network slice.
  • the target access network device 212 may determine whether to perform network slice remapping based on the determination of the visited slice network remapping network slice, so as to support the access control of the terminal device 220.
  • the operations performed at include the target access network device 212 transmitting 628 the handover request response to the source access network device 210; the source access network device 210 transmits 632 the third information to the terminal device 220 after receiving 630 the handover request response; the terminal device 220 Receive 634 third information, and use 636 third information.
  • the source access network device 210 may also transmit the fourth information to the terminal device.
  • the operations from 628 to 636 in the process 600 are similar to the operations from 422 to 430 in the process 400, and will not be repeated here.
  • the target access network equipment has sufficient information to complete the access control of the terminal equipment in time. , Especially the access control in the case of switching across different networks, avoiding the delay in switching across networks, reducing the possibility of service interruption of the terminal equipment, thereby ensuring the business continuity of the terminal equipment.
  • FIG. 7 shows a schematic block diagram of a communication apparatus 700 implemented at a target access network device according to some embodiments of the present disclosure.
  • the communication apparatus 700 may be implemented as a device or a chip in a device, and the scope of the present disclosure is not limited in this respect.
  • the communication apparatus 700 may be implemented as the target access network device 212 or a part of the target access network device 212 as shown in FIGS. 2 to 5.
  • the communication device 700 includes a first receiving unit 710 configured to receive first information, the first information indicating the relationship between the first network slice of the first network and the second network slice of the second network, the first network It is different from the second network.
  • the communication device 700 further includes an access control unit 720 configured to perform access control from the terminal device to the target access network device based on at least the first information.
  • the first information includes the identification of the first network, the identification of the first network slice, the identification of the second network, and the identification of the second network slice.
  • the identity of the first network and the identity of the second network include the respective public land mobile network identities of the first network and the second network, and the identity of the first network slice and the identity of the second network slice include the first network slice.
  • the first information is remapping policy information for the first network slice and the second network slice.
  • the first receiving unit 710 is further configured to receive the first information from the core network device.
  • the first network and the second network are in the same tracking area.
  • the first information is included in the NG establishment response.
  • the communication apparatus 700 further includes: a second receiving unit (not shown) configured to receive second information from the source access network device, the second information including the terminal device's permission to use in the second network The identifier of the third network slice.
  • the access control unit 720 is further configured to perform access control based on the first information and the second information.
  • the first receiving unit 710 is further configured to receive first information for the terminal device from the source access network device, and the first network is a service network of the terminal device.
  • the second network includes the target network of the terminal device.
  • the first information is included in the handover request for the terminal device.
  • the access control unit 720 is further configured to: the target access network device determines the identity of the serving network of the terminal device, the identity of the serving network slice of the serving network, and the identity of the target network of the terminal device; The network device determines the target network slice related to the service network slice in the target network based on the service network identifier, the service network slice identifier, and the target network identifier from the first information; and the target access network device determines the target network slice based on To perform access control.
  • FIG. 8 shows a schematic block diagram of a communication apparatus 800 implemented at a source access network device according to some embodiments of the present disclosure.
  • the communication apparatus 800 may be implemented as a device or a chip in a device, and the scope of the present disclosure is not limited in this respect.
  • the communication apparatus 800 may be implemented as the source access network device 210 or a part of the source access network device 210 as shown in FIGS. 2 to 5.
  • the communication device 800 includes a receiving unit 810 configured to receive first information from a core network device for a terminal device, the first information indicating a first network slice of the first network and a second network of the second network In relation to slices, the first network is the service network of the terminal device, and the first network is different from the second network.
  • the communication device 800 further includes a first transmission unit 820 configured to transmit the first information to the target access network device.
  • the first information includes the identification of the first network, the identification of the first network slice, the identification of the second network, and the identification of the second network slice.
  • the identity of the first network and the identity of the second network include the respective public land mobile network identities of the first network and the second network, and the identity of the first network slice and the identity of the second network slice include the first network slice.
  • the first information is remapping policy information for the first network slice and the second network slice.
  • the second network includes the target network of the terminal device.
  • the first information is included in the handover request for the terminal device.
  • the communication device 800 further includes: a second transmission unit (not shown) configured to transmit the third information to the terminal device when the terminal device's access to the target access network device is allowed ,
  • the third information indicates that the service network of the terminal device is switched from the first network to the second network.
  • the third information includes the identification of the second network.
  • the third information is included in the radio resource control reconfiguration message.
  • the communication device 800 further includes: a third transmission unit (not shown) configured to transmit fourth information to the terminal device if the terminal device’s access to the target access network device is allowed, and the fourth information The information indicates that the session of the terminal device is changed to be served by the second network slice of the second network.
  • a third transmission unit (not shown) configured to transmit fourth information to the terminal device if the terminal device’s access to the target access network device is allowed, and the fourth information The information indicates that the session of the terminal device is changed to be served by the second network slice of the second network.
  • FIG. 9 shows a schematic block diagram of a communication device 900 implemented at a terminal device according to some embodiments of the present disclosure.
  • the communication device 900 may be implemented as a device or a chip in a device, and the scope of the present disclosure is not limited in this respect.
  • the communication device 900 may be implemented as the terminal device 220 or a part of the terminal device 220 as shown in FIGS. 2 to 5.
  • the communication device 900 includes a first receiving unit 910 configured to receive third information from a source access network device.
  • the third information indicates that the service network of the terminal device is switched from the first network to the second network, and the first network and the second network are different.
  • the communication device 900 further includes an information using unit 920 configured to use the third information.
  • the information using unit 920 is configured to perform random access to the target access network device in the second network based on the third information. In some embodiments, the information using unit 920 is configured to display the identity of the second network based on the third information.
  • the third information includes the identification of the second network.
  • the third information is included in the radio resource control reconfiguration message.
  • the communication device 900 further includes a second receiving unit (not shown) configured to receive the fourth information from the source access network device if the terminal device's access to the target access network device is allowed .
  • the fourth information indicates that the session of the terminal device is changed to be served by the second network slice of the second network.
  • FIG. 10 shows a schematic block diagram of a communication apparatus 1000 implemented at a core network device according to some embodiments of the present disclosure.
  • the communication apparatus 1000 may be implemented as a device or a chip in a device, and the scope of the present disclosure is not limited in this respect.
  • the communication apparatus 1000 may be implemented as a core network device 330 or a part of the core network device 330 as shown in FIGS. 2 to 5.
  • the core network device 330 includes, for example, AMF 230 and/or other core network network functions.
  • the communication device 1000 includes a determining unit 1010 configured to determine first information, the first information indicating the relationship between the first network slice of the first network and the second network slice of the second network, the first network and the second network slice Two networks are different.
  • the communication device 1000 further includes a transmission unit 1020 configured to transmit the first information to the access network device, so as to be used for the access network device to perform access control from the terminal device to the access network device.
  • the first information includes the identification of the first network, the identification of the first network slice, the identification of the second network, and the identification of the second network slice.
  • the identity of the first network and the identity of the second network include the respective public land mobile network identities of the first network and the second network, and the identity of the first network slice and the identity of the second network slice include the first network slice.
  • the first information is remapping policy information for the first network slice and the second network slice.
  • the first network is a service network of the terminal device, and the terminal device is served by the first network via the access network device.
  • the second network includes the target network of the terminal device.
  • the first network and the second network are in the same tracking area.
  • the first information is included in the NG establishment response.
  • FIG. 11 shows a schematic block diagram of a communication apparatus 1100 at a target access network device according to some embodiments of the present disclosure.
  • the communication apparatus 1100 may be implemented as a device or a chip in a device, and the scope of the present disclosure is not limited in this respect.
  • the communication apparatus 1100 may be implemented as the target access network device 212 or a part of the target access network device 212 as shown in FIG. 2 and FIG. 6.
  • the communication device 1100 includes a first receiving unit 1110 configured to receive slice identification information from a source access network device, the slice identification information indicates the identification of the home network slice of the terminal device in the home network, and the target access The network device is in the visited network of the terminal device.
  • the communication device 1100 further includes a second receiving unit 1120 configured to receive slice correspondence information from the core network device, where the slice correspondence information indicates the correspondence between the network slice of the visited network and the network slice of the home network.
  • the communication device 1100 further includes an access control unit 1130 configured to perform access control from the terminal device to the target access network device based on at least the slice identification information and the slice correspondence information.
  • the communication device 1100 further includes: a transmission unit (not shown) configured to transmit a request for network slice correspondence information to the core network device, and the request includes at least the device identification of the terminal device and the information of the visited network. logo.
  • the first receiving unit 1110 is further configured to receive a response to the request from the core network device, and obtain network slice correspondence information from the response.
  • the communication device 1100 further includes a third receiving unit (not shown) configured to receive fifth information about the home network from the core network device, the fifth information indicating the home network slice and the additional information of the home network The relationship of network slicing.
  • the access control unit 1130 is further configured to perform access control based on slice identification information, network slice correspondence information, and fifth information.
  • FIG. 12 shows a schematic block diagram of a communication apparatus 1200 at a source access network device according to some embodiments of the present disclosure.
  • the communication apparatus 1200 may be implemented as a device or a chip in a device, and the scope of the present disclosure is not limited in this respect.
  • the communication apparatus 1200 may be implemented as the source access network device 210 or a part of the source access network device 210 as shown in FIG. 2 and FIG. 6.
  • the communication device 1200 includes a receiving unit 1210 configured to receive slice identification information for the terminal device, the slice identification information indicates the identification of the home network slice of the terminal device in the home network, and the source access network device is in the terminal device.
  • the first interviewed network The communication device 1200 further includes a transmission unit 1220 configured to transmit slice identification information to a target access network device to which the terminal device is to be handed over, and the target access network device is in the second visited network of the terminal device.
  • the receiving unit is further configured to: the source access network device receives slice identification information from the terminal device or from the core network device.
  • the slice identification information is included in the session establishment request received from the terminal device.
  • the slice identification information is included in the session resource setting request for the terminal device received from the core network device.
  • FIG. 13 shows a schematic block diagram of a communication apparatus 1300 at a terminal device according to some embodiments of the present disclosure.
  • the communication apparatus 1300 may be implemented as a device or a chip in a device, and the scope of the present disclosure is not limited in this respect.
  • the communication apparatus 1300 may be implemented as the terminal device 220 or a part of the terminal device 220 as shown in FIGS. 2 and 6.
  • the communication device 1300 includes a transmission unit 1310 configured to transmit slice identification information, and the slice identification information indicates the identification of the home network slice of the terminal device in the home network.
  • the source access network device is in the first visited network of the terminal device.
  • the communication device 1300 further includes a first receiving unit 1320 configured to receive third information from the source access network device, the third information indicating that the service network of the terminal device is switched from the first visited network to the second visited network, The first interviewed network is different from the second interviewed network.
  • the transmission unit 1310 is further configured to transmit the slice identification information to the source access network device in the session establishment request.
  • the communication device 1300 further includes an information using unit (not shown) configured to use the third information.
  • the information using unit is further configured to perform random access to the target access network device of the second visited network based on the third information.
  • the information using unit is further configured to display the identity of the second visited network based on the third information.
  • the third information includes the identification of the second visited network.
  • the third information is included in the radio resource control reconfiguration message.
  • the communication device 1300 further includes a second receiving unit (not shown) configured to receive the fourth information from the source access network device if the terminal device's access to the target access network device is allowed ,
  • the fourth information indicates that the session of the terminal device is changed to be served by the second visited network slice of the second visited network.
  • Figure 14 is a simplified block diagram of an example device 1400 suitable for implementing embodiments of the present disclosure.
  • the device 1400 may be used to implement the terminal device, the access network device, and one or more core network devices/network functions as shown in FIG. 2.
  • the device 1400 includes one or more processors 1410, one or more memories 1420 coupled to the processor 1410, and a communication module 1440 coupled to the processor 1410.
  • the communication module 1440 may be used for two-way communication.
  • the communication module 1440 may have at least one communication interface for communication.
  • the communication interface may include any interface necessary for communication with other devices.
  • the processor 1410 may be of any type suitable for local technology networks, and may include but is not limited to at least one of the following: general-purpose computers, special-purpose computers, microcontrollers, digital signal controllers (DSP), or controller-based multi-core control One or more of the device architecture.
  • the device 1400 may have multiple processors, such as application specific integrated circuit chips, which are subordinate in time to a clock synchronized with the main processor.
  • the memory 1420 may include one or more non-volatile memories and one or more volatile memories.
  • non-volatile memory include but are not limited to at least one of the following: read only memory (ROM) 1424, erasable programmable read only memory (EPROM), flash memory, hard disk, compact disk (CD), digital video disk (DVD) ) Or other magnetic storage and/or optical storage.
  • volatile memory include, but are not limited to, at least one of the following: random access memory (RAM) 1422, or other volatile memory that does not last for the duration of the power failure.
  • the computer program 1430 includes computer-executable instructions executed by the associated processor 1410.
  • the program 1430 can be stored in the ROM 1420.
  • the processor 1410 can perform any suitable actions and processing by loading the program 1430 into the RAM 1420.
  • the embodiments of the present disclosure can be implemented by means of the program 1430, so that the device 1400 can perform any process as discussed with reference to FIGS. 3 to 6.
  • the embodiments of the present disclosure can also be implemented by hardware or by a combination of software and hardware.
  • the program 1430 may be tangibly contained in a computer-readable medium, which may be included in the device 1400 (such as in the memory 1420) or other storage devices that can be accessed by the device 1400.
  • the program 1430 can be loaded from the computer-readable medium to the RAM 1422 for execution.
  • the computer-readable medium may include any type of tangible non-volatile memory, such as ROM, EPROM, flash memory, hard disk, CD, DVD, etc.
  • various embodiments of the present disclosure may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. Some aspects may be implemented by hardware, while other aspects may be implemented by firmware or software, which may be executed by a controller, microprocessor or other computing device. Although various aspects of the embodiments of the present disclosure are shown and described as block diagrams, flowcharts, or some other diagrammatic representations, it should be understood that the blocks, devices, systems, techniques, or methods described herein can be implemented as, if not limiting, Illustrative examples are hardware, software, firmware, dedicated circuits or logic, general-purpose hardware or controllers or other computing devices, or some combination thereof.
  • the present disclosure also provides at least one computer program product tangibly stored on a non-transitory computer-readable storage medium.
  • the computer program product includes computer-executable instructions, such as instructions included in a program module, which are executed in a device on a real or virtual processor of the target to execute the process/method described above with reference to FIGS. 3 to 6.
  • program modules include routines, programs, libraries, objects, classes, components, data structures, etc. that perform specific tasks or implement specific abstract data types.
  • the functions of the program modules can be combined or divided among the program modules as needed.
  • Machine executable instructions for program modules can be executed in local or distributed devices. In distributed equipment, program modules can be located in local and remote storage media.
  • the computer program code used to implement the method of the present disclosure can be written in one or more programming languages. These computer program codes can be provided to the processors of general-purpose computers, special-purpose computers, or other programmable data processing devices, so that when the program codes are executed by the computer or other programmable data processing devices, they will cause changes in the flowcharts and/or block diagrams. The functions/operations specified in are implemented.
  • the program code can be executed entirely on a computer, partly on a computer, as a stand-alone software package, partly on a computer and partly on a remote computer, or entirely on a remote computer or server.
  • the computer program code or related data may be carried by any suitable carrier, so that the device, apparatus, or processor can perform the various processing and operations described above.
  • carriers include signals, computer-readable media, and so on.
  • signals may include electrical, optical, radio, sound, or other forms of propagated signals, such as carrier waves, infrared signals, and the like.
  • the computer-readable medium may be any tangible medium that contains or stores a program used in or related to an instruction execution system, apparatus, or device.
  • the computer-readable medium may be a computer-readable signal medium or a computer-readable storage medium.
  • the computer-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or any suitable combination thereof. More detailed examples of computer-readable storage media include electrical connections with one or more wires, portable computer disks, hard disks, random memory access (RAM), read-only memory (ROM), erasable programmable read-only Memory (EPROM or flash memory), optical storage device, magnetic storage device, or any suitable combination thereof.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开的实施例提供了通信方法以及相关联的通信装置、介质和芯片。在一种通信方法中,目标接入网设备接收第一信息,第一信息指示第一网络的第一网络切片与第二网络的第二网络切片的关系,第一网络和第二网络不同。目标接入网设备至少基于第一信息来执行终端设备到目标接入网设备的接入控制。以此方式,本公开的实施例使目标接入网设备能够执行对终端设备跨网络接入时的接入控制,降低接入时延,减少终端设备由于会话被拒而导致的业务中断问题,确保了终端设备的业务连续性。

Description

通信方法以及相关联的通信装置、介质和芯片
本申请要求于2020年6月3日提交中国专利局、申请号为202010496861.9、发明名称为“通信方法以及相关联的通信装置、介质和芯片”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本公开涉及通信领域,并且更具体地,涉及通信方法以及相关联的通信装置、介质和芯片。
背景技术
随着移动通信技术的发展,各类新业务以及应用场景不断涌现,这些业务对网络功能、连接性能及安全性等方面的需求存在很大的差别。如果利用单一网络去承载这些业务,将很难同时满足高带宽、低时延、高可靠性等多样化需求。另外,为每种业务单独新建网络又会带来巨大的成本。这就要求网络在具备灵活、可拓展性的同时,能够满足不同的业务需求。为此,新一代网络系统,例如第五代移动通信技术(5G)系统提出了网络切片技术,该技术通过对网络资源的灵活分配、按需组网来为不同用户以及它们的差异化业务提供网络服务。
由于网络切片部署的原因,不同的小区或者不同的接入网设备所支持的网络切片会存在差异。例如,存在部分小区或者接入网设备不支持某些或某个网络切片,或者,即使支持网络切片的功能,但由于运营商部署或者策略的原因,让该部分小区或者接入网设备不能为终端设备提供对应的网络切片用于服务。考虑到终端设备的移动性和业务变化的需要,终端设备可能会注册或切换到不同的接入网设备。因此,需要能够在不同接入网设备对网络切片的差异化支持的情况下实现终端设备的接入和服务。
发明内容
本公开的示例实施例提供了在通信系统中用于支持终端设备的接入控制的方案。
在本公开的第一方面,提供了一种通信方法。该方法包括目标接入网设备接收第一信息,所述第一信息指示第一网络的第一网络切片与第二网络的第二网络切片的关系,所述第一网络和所述第二网络不同;以及所述目标接入网设备至少基于所述第一信息来执行终端设备到所述目标接入网设备的接入控制。
通过向目标接入网设备提供指示不同网络的网络切片之间的关系的信息,目标接入网设备能够执行对终端设备跨网络的接入控制。这样的方案能够降低接入时延,减少终端设备由于会话被拒而导致的业务中断问题,确保了终端设备的业务连续性。
在一些实施例中,所述第一信息包括所述第一网络的标识、所述第一网络切片的标识、所述第二网络的标识以及所述第二网络切片的标识。在一些实施例中,所述第一网络的所述标识和所述第二网络的所述标识包括所述第一网络和所述第二网络各自的公共陆地移动网络标识。在一些实施例中,所述第一网络切片的所述标识和所述第二网络切片的所述标识包括所述第一网络切片和所述第二网络切片各自的单网络切片选择辅助信息。由此,在第一信息中可以通过网络的标识和切片的标识来指示对应的网络及其网络切片的关系。
在一些实施例中,所述第一信息是用于所述第一网络切片和所述第二网络切片的重映射策略信息。基于这样的第一信息,目标接入网设备在接入控制时能够判断是否通过网络切片的重映射来支持终端设备的接入。
在一些实施例中,接收所述第一信息包括:所述目标接入网设备接收来自核心网设备的所述第一信息。在这样的实施例中,核心网设备能够通过综合多个接入网设备上报的信息来确定第一信息,使第一信息适用于多个接入网设备对终端设备的接入控制。在一些实施例中,所述第一网络和所述第二网络处于相同的跟踪区范围。在核心网侧,核心网设备可以综合考虑一定区域内网络的网络切片的关系来确定和提供第一信息。由于第一信息涵盖了一定区域内网络的网络切片的关系,无论终端设备要接入该区域内的任何网络,对应的目标接入网设备均可以根据第一信息执行接入控制。
在一些实施例中,所述第一信息被包括在NG建立响应中。NG建立响应可以是从核心网传输给目标接入网设备,通常是作为目标接入网设备的NG建立消息的响应。以此方式,目标接入网设备可以在接口建立阶段就提前获得用于接入控制的第一信息。
在一些实施例中,第一方面的通信方法还包括:所述目标接入网设备接收来自源接入网设备的第二信息,所述第二信息包括所述终端设备在所述第二网络中允许使用的第三网络切片的标识。在一些实施例中,至少基于所述第一信息来执行所述接入控制包括:所述目标接入网设备基于所述第一信息和所述第二信息来执行所述接入控制。借助第一信息和第二信息,目标接入网设备能够更好地确定终端设备在第二网络中允许的网络切片,这对于不同终端设备在不同网络中允许的网络切片存在差异的场景特别有利。
在一些实施例中,接收所述第一信息包括:所述目标接入网设备接收来自源接入网设备的针对所述终端设备的所述第一信息,所述第一网络是所述终端设备的服务网络。在这样的实施例中,目标接入网设备通过与源接入网设备交互,可以获得更有针对性的第一信息用于执行针对终端设备的接入控制。第一信息的信息量降低还能够减少接入网设备之间的传输开销。
在一些实施例中,所述第二网络包括所述终端设备的目标网络。这意味着第一信息指示特定于当前终端设备的服务网络和目标网络的网络切片的关系。由此,目标接入网设备无需接收和保留过多冗余信息。
在一些实施例中,所述第一信息被包括在针对所述终端设备的切换请求中。因此,在确定终端设备要切换到目标接入网设备的目标网络时才向目标接入网设备及时提供第一信息。目标接入网设备能够据此信息,在切换过程中执行对终端设备的接入控制。
在一些实施例中,执行所述接入控制包括:所述目标接入网设备确定所述终端设备的服务网络的标识、所述服务网络的服务网络切片的标识和所述终端设备的目标网络的标识;所述目标接入网设备基于所述服务网络的标识、所述服务网络切片的标识和所述目标网络的标识,从所述第一信息确定所述目标网络中与所述服务网络切片有关的目标网络切片;以及所述目标接入网设备基于对所述目标网络切片的确定来执行所述接入控制。以此方式,借助第一信息,目标接入网设备能够有效实现接入控制,避免了切换的时延,减少了终端设备的会话在切换后被拒而导致的业务中断,保证了业务连续性。
在本公开的第二方面,提供了一种通信方法。该方法包括:源接入网设备接收来自核心网设备的针对终端设备的第一信息,所述第一信息指示第一网络的第一网络切片与第二网络的第二网络切片的关系,所述第一网络是所述终端设备的服务网络,所述第一网络和所述第 二网络不同;以及所述源接入网设备向目标接入网设备传输所述第一信息。
以此方式,借助源接入网设备提供的特定于终端设备的第一信息,目标接入网设备能够执行对终端设备跨网络的接入控制,降低接入时延,减少终端设备由于会话被拒而导致的业务中断问题,确保了终端设备的业务连续性。由于第一信息涉及特定于终端设备的服务网络,第一信息的信息量降低,这还减少了核心网设备和接入网设备之间的传输开销。
在一些实施例中,所述第一信息包括所述第一网络的标识、所述第一网络切片的标识、所述第二网络的标识以及所述第二网络切片的标识。在一些实施例中,所述第一网络的标识和所述第二网络的标识包括所述第一网络和所述第二网络各自的公共陆地移动网络标识。在一些实施例中,所述第一网络切片的标识和所述第二网络切片的标识包括所述第一网络切片和所述第二网络切片各自的单网络切片选择辅助信息。由此,在第一信息中可以通过网络的标识和切片的标识来指示对应的网络及其网络切片的关系。
在一些实施例中,所述第一信息是用于所述第一网络切片和所述第二网络切片的重映射策略信息。基于这样的第一信息,目标接入网设备在接入控制时能够判断是否通过网络切片的重映射来支持终端设备的接入。
在一些实施例中,所述第二网络包括所述终端设备的目标网络。这意味着第一信息指示特定于当前终端设备的服务网络和目标网络的网络切片的关系。由此,目标接入网设备无需接收和保留过多冗余信息。
在一些实施例中,所述第一信息被包括在针对所述终端设备的切换请求中。因此,在确定终端设备要切换到目标接入网设备的目标网络时才向目标接入网设备及时提供第一信息。目标接入网设备能够据此信息,在切换过程中执行对终端设备的接入控制。
在一些实施例中,第二方面的通信方法还包括:如果所述终端设备到所述目标接入网设备的接入被允许,所述源接入网设备向所述终端设备传输第三信息,所述第三信息指示所述终端设备的所述服务网络从所述第一网络切换到所述第二网络。以此方式,在跨网络接入的情况下,终端设备能够通过接收到的第三信息来快速获知服务网络的改变。
在一些实施例中,所述第三信息包括所述第二网络的标识。将第二网络的标识提供给终端设备,有助于终端设备明确从当前网络被切换到的具体网络。
在一些实施例中,所述第三信息被包括在无线电资源控制重配置消息中。由此,终端设备可以通过该消息确定要重配置无线电资源控制连接,同时还能获知服务网络的改变。
在一些实施例中,第二方面的通信方法还包括:如果所述终端设备到所述目标接入网设备的接入被允许,所述源接入网设备向所述终端设备传输第四信息,所述第四信息指示所述终端设备的会话被改变为由所述第二网络的所述第二网络切片服务。以此方式,在跨网络接入的情况下,终端设备不仅能够快速获知服务网络的改变,而且还能够通过接收到的第四信息确定要接入的网络切片。
在本公开的第三方面,提供了一种通信方法。该方法包括:终端设备接收来自源接入网设备的第三信息,所述第三信息指示所述终端设备的服务网络从第一网络切换到第二网络,所述第一网络和所述第二网络不同;以及所述终端设备使用所述第三信息。以此方式,在跨网络接入的情况下,终端设备能够通过接收到的第三信息来快速获知服务网络的改变,并相应使用第三信息。
在一些实施例中,使用所述第三信息包括所述终端设备基于所述第三信息,执行到所述第二网络中的目标接入网设备的随机接入。第三信息有助于引导终端设备的随机接入过程, 提高随机接入成功的可能性。在一些实施例中,使用所述第三信息包括所述终端设备基于所述第三信息显示所述第二网络的标识。通过显示第二网络的标识,可以向终端设备的用户通知服务网络的变化。
在一些实施例中,所述第三信息包括所述第二网络的标识。将第二网络的标识提供给终端设备,有助于终端设备明确从当前网络被切换到的具体网络。
在一些实施例中,所述第三信息被包括在无线电资源控制重配置消息中。由此,终端设备可以通过该消息确定要重配置无线电资源控制连接,同时还能获知服务网络的改变。
在一些实施例中,第三方面的通信方法还包括:如果所述终端设备到目标接入网设备的接入被允许,所述终端设备接收来自所述源接入网设备的第四信息,所述第四信息指示所述终端设备的会话被改变为由所述第二网络的所述第二网络切片服务。以此方式,在跨网络接入的情况下,终端设备不仅能够快速获知服务网络的改变,而且还能够通过接收到的第四信息确定要接入的网络切片。
在本公开的第四方面,提供了一种通信方法。该方法包括:核心网设备确定第一信息,所述第一信息指示第一网络的第一网络切片与第二网络的第二网络切片的关系,所述第一网络和所述第二网络不同;以及所述核心网设备向接入网设备传输所述第一信息,以用于终端设备到所述接入网设备的接入控制。
以此方式,通过由核心网设备向目标接入网设备提供第一信息,目标接入网设备能够利用第一信息来执行对终端设备跨网络的接入控制,降低接入时延,减少终端设备由于会话被拒而导致的业务中断问题,确保了终端设备的业务连续性。
在一些实施例中,所述第一信息包括所述第一网络的标识、所述第一网络切片的标识、所述第二网络的标识以及所述第二网络切片的标识。在一些实施例中,所述第一网络的所述标识和所述第二网络的所述标识包括所述第一网络和所述第二网络各自的公共陆地移动网络标识。在一些实施例中,所述第一网络切片的所述标识和所述第二网络切片的所述标识包括所述第一网络切片和所述第二网络切片各自的单网络切片选择辅助信息。由此,在第一信息中可以通过网络的标识和切片的标识来指示对应的网络及其网络切片的关系。
在一些实施例中,所述第一信息是用于所述第一网络切片和所述第二网络切片的重映射策略信息。基于这样的第一信息,目标接入网设备在接入控制时能够判断是否通过网络切片的重映射来支持终端设备的接入。
在一些实施例中,所述第一网络是所述终端设备的服务网络,并且所述终端设备经由所述接入网设备由所述第一网络服务。在一些实施例中,所述第二网络包括所述终端设备的目标网络。这样可以确保在终端设备从服务网络切换到目标网络时,目标接入网设备能够根据所获得的第一信息来执行接入控制。
在一些实施例中,所述第一网络和所述第二网络处于相同的跟踪区范围。在核心网侧,核心网设备可以综合考虑一定区域内网络的网络切片的关系来确定和提供第一信息。由于第一信息涵盖了一定区域内网络的网络切片的关系,无论终端设备要接入该区域内的任何网络,对应的目标接入网设备均可以根据第一信息执行接入控制。
在一些实施例中,所述第一信息被包括在NG建立响应中。NG建立响应可以是从核心网传输给目标接入网设备,通常是作为目标接入网设备的NG建立消息的响应。以此方式,目标接入网设备可以在接口建立阶段就提前获得用于接入控制的第一信息。
在本公开的第五方面,提供了一种被实现在目标接入网设备处的通信装置。该通信装置 包括第一接收单元,被配置为接收第一信息,所述第一信息指示第一网络的第一网络切片与第二网络的第二网络切片的关系,所述第一网络和所述第二网络不同;以及接入控制单元,被配置为至少基于所述第一信息来执行终端设备到所述目标接入网设备的接入控制。
在一些实施例中,所述第一信息包括所述第一网络的标识、所述第一网络切片的标识、所述第二网络的标识以及所述第二网络切片的标识。在一些实施例中,所述第一网络的所述标识和所述第二网络的所述标识包括所述第一网络和所述第二网络各自的公共陆地移动网络标识,并且所述第一网络切片的标识和所述第二网络切片的标识包括所述第一网络切片和所述第二网络切片各自的单网络切片选择辅助信息。
在一些实施例中,所述第一信息是用于所述第一网络切片和所述第二网络切片的重映射策略信息。
在一些实施例中,所述第一接收单元还被配置为接收来自核心网设备的所述第一信息。在一些实施例中,所述第一网络和所述第二网络处于相同的跟踪区范围。
在一些实施例中,所述第一信息被包括在NG建立响应中。
在一些实施例中,所述通信装置还包括:第二接收单元,被配置为接收来自源接入网设备的第二信息,所述第二信息包括所述终端设备在所述第二网络中允许使用的第三网络切片的标识。在一些实施例中,所述接入控制单元还被配置为基于所述第一信息和所述第二信息来执行所述接入控制。
在一些实施例中,所述第一接收单元还被配置为:接收来自源接入网设备的针对所述终端设备的所述第一信息,所述第一网络是所述终端设备的服务网络。
在一些实施例中,所述第二网络包括所述终端设备的目标网络。
在一些实施例中,所述第一信息被包括在针对所述终端设备的切换请求中。
在一些实施例中,所述接入控制单元还被配置为:所述目标接入网设备确定所述终端设备的服务网络的标识、所述服务网络的服务网络切片的标识和所述终端设备的目标网络的标识;所述目标接入网设备基于所述服务网络的标识、所述服务网络切片的标识和所述目标网络的标识,从所述第一信息确定所述目标网络中与所述服务网络切片有关的目标网络切片;以及所述目标接入网设备基于对所述目标网络切片的确定来执行所述接入控制。
在本公开的第六方面,提供了一种被实现在源接入网设备处的通信装置。该通信装置包括接收单元,被配置为接收来自核心网设备的针对终端设备的第一信息,所述第一信息指示第一网络的第一网络切片与第二网络的第二网络切片的关系,所述第一网络是所述终端设备的服务网络,所述第一网络和所述第二网络不同;以及第一传输单元,被配置为向目标接入网设备传输所述第一信息。
在一些实施例中,所述第一信息包括所述第一网络的标识、所述第一网络切片的标识、所述第二网络的标识以及所述第二网络切片的标识。在一些实施例中,所述第一网络的所述标识和所述第二网络的所述标识包括所述第一网络和所述第二网络各自的公共陆地移动网络标识,并且所述第一网络切片的标识和所述第二网络切片的标识包括所述第一网络切片和所述第二网络切片各自的单网络切片选择辅助信息。
在一些实施例中,所述第一信息是用于所述第一网络切片和所述第二网络切片的重映射策略信息。
在一些实施例中,所述第二网络包括所述终端设备的目标网络。
在一些实施例中,所述第一信息被包括在针对所述终端设备的切换请求中。
在一些实施例中,所述通信装置还包括:第二传输单元,被配置为在所述终端设备到所述目标接入网设备的接入被允许的情况下,向所述终端设备传输第三信息,所述第三信息指示所述终端设备的所述服务网络从所述第一网络切换到所述第二网络。
在一些实施例中,所述第三信息包括所述第二网络的标识。
在一些实施例中,所述第三信息被包括在无线电资源控制重配置消息中。
在一些实施例中,所述通信装置还包括:第三传输单元,被配置为如果所述终端设备到所述目标接入网设备的接入被允许,向所述终端设备传输第四信息,所述第四信息指示所述终端设备的会话被改变为由所述第二网络的所述第二网络切片服务。
在本公开的第七方面,提供了一种被实现在终端设备处的通信装置。该通信装置包括第一接收单元,被配置为接收来自源接入网设备的第三信息,所述第三信息指示所述终端设备的服务网络从第一网络切换到第二网络,所述第一网络和所述第二网络不同。该通信装置还包括信息使用单元,被配置为使用所述第三信息。
在一些实施例中,所述信息使用单元被配置为基于所述第三信息,执行到所述第二网络中的目标接入网设备的随机接入。在一些实施例中,所述信息使用单元被配置为基于所述第三信息显示所述第二网络的标识。
在一些实施例中,所述第三信息包括所述第二网络的标识。
在一些实施例中,所述第三信息被包括在无线电资源控制重配置消息中。
在一些实施例中,所述通信装置还包括第二接收单元,被配置为如果所述终端设备到目标接入网设备的接入被允许,接收来自所述源接入网设备的第四信息,所述第四信息指示所述终端设备的会话被改变为由所述第二网络的所述第二网络切片服务。
在本公开的第八方面,提供了一种被实现在核心网设备处的通信装置。该通信装置包括确定单元,被配置为确定第一信息,所述第一信息指示第一网络的第一网络切片与第二网络的第二网络切片的关系,所述第一网络和所述第二网络不同;以及传输单元,被配置为向接入网设备传输所述第一信息,以用于终端设备到所述接入网设备的接入控制。
在一些实施例中,所述第一信息包括所述第一网络的标识、所述第一网络切片的标识、所述第二网络的标识以及所述第二网络切片的标识。在一些实施例中,所述第一网络的所述标识和所述第二网络的所述标识包括所述第一网络和所述第二网络各自的公共陆地移动网络标识,并且所述第一网络切片的标识和所述第二网络切片的标识包括所述第一网络切片和所述第二网络切片各自的单网络切片选择辅助信息。
在一些实施例中,所述第一信息是用于所述第一网络切片和所述第二网络切片的重映射策略信息。
在一些实施例中,所述第一网络是所述终端设备的服务网络,并且所述终端设备经由所述接入网设备由所述第一网络服务;并且所述第二网络包括所述终端设备的目标网络。
在一些实施例中,所述第一网络和所述第二网络处于相同的跟踪区范围。
在一些实施例中,所述第一信息被包括在NG建立响应中。
在本公开的第九方面,提供了一种计算机可读存储介质。计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现根据上述第一方面到第四方面中任意一种可能的实现方式中的方法的操作。
在本公开的第十方面,本公开提供了一种芯片。该芯片被配置为执行根据上述第一方面到第四方面中任意一种可能的实现方式中的方法的操作。
在本公开的第十一方面,提供了一种通信设备。该通信设备包括:至少一个处理单元;以及至少一个存储器,所述至少一个存储器被耦合到所述至少一个处理单元并且存储用于由所述至少一个处理单元执行的指令,所述指令在由所述至少一个处理单元执行时使所述通信设备实现根据上述第一方面到第四方面中任意一种可能的实现方式中的方法的操作。
在本公开的第十二方面,提供了一种计算机程序产品。计算机程序产品被有形地存储在计算机可读介质上并且包括计算机可执行指令,所述计算机可执行指令在被执行时使设备实现根据上述第一方面到第四方面中任意一种可能的实现方式中的方法的操作。
在本公开的第十三方面,提供了一种通信方法。该方法包括:目标接入网设备接收来自源接入网设备的切片标识信息,所述切片标识信息指示所述终端设备在归属网络中的归属网络切片的标识,所述目标接入网设备处于所述终端设备的受访网络;所述目标接入网设备接收来自核心网设备的切片对应性信息,所述切片对应性信息指示所述受访网络的网络切片与所述归属网络的网络切片之间的对应性;以及所述目标接入网设备至少基于所述切片标识信息和所述切片对应性信息来执行所述终端设备到所述目标接入网设备的接入控制。
以此方式,目标接入网设备能够执行对终端设备跨网络接入时的接入控制,特别是在终端设备要接入受访网络时的接入控制,降低接入时延,减少终端设备由于会话被拒而导致的业务中断问题,确保了终端设备的业务连续性。
在一些实施例中,第十三方面的通信方法还包括:所述目标接入网设备向所述核心网设备传输对所述网络切片对应性信息的请求,所述请求至少包括所述终端设备的标识和所述受访网络的标识。在一些实施例中,接收所述网络切片对应性信息包括:所述目标接入网设备从所述核心网设备接收针对所述请求的响应,以及所述目标接入网设备从所述响应获取所述网络切片对应性信息。因此,目标接入网设备可以在需要执行接入控制时才从核心网设备请求网络切片对应性信息。
在一些实施例中,第十三方面的通信方法还包括:所述目标接入网设备接收来自所述核心网设备的针对所述归属网络的第五信息,所述第五信息指示所述归属网络切片与所述归属网络的另外的网络切片的关系。在一些实施例中,至少基于所述切片标识信息和所述切片对应性信息来执行所述接入控制包括:所述目标接入网设备基于所述切片标识信息、所述网络切片对应性信息以及所述第五信息来执行所述接入控制。借助第五信息,目标接入网设备能够通过归属网络中网络切片的关系,进一步确定受访网络中与归属网络切片对应的网络切片是否存在相关的其他网络切片(例如具有重映射关系的其他网络切片)。
在本公开的第十四方面,提供了一种通信方法。该方法包括:源接入网设备接收针对终端设备的切片标识信息,所述切片标识信息指示所述终端设备在归属网络中的归属网络切片的标识,所述源接入网设备处于所述终端设备的第一受访网络;以及所述源接入网设备向所述终端设备要切换到的目标接入网设备传输所述切片标识信息,所述目标接入网设备处于所述终端设备的第二受访网络。
以此方式,由源接入网设备提供给目标接入网设备的切片标识信息能够辅助执行对终端设备跨网络接入时的接入控制,特别是在终端设备要接入受访网络时的接入控制。这可以降低接入时延,减少终端设备由于会话被拒而导致的业务中断问题,确保了终端设备的业务连续性。
在一些实施例中,接收所述切片标识信息包括:所述源接入网设备从所述终端设备或从核心网设备接收所述切片标识信息。源接入网设备能够多种方式获得切片标识信息。
在一些实施例中,所述切片标识信息被包括从所述终端设备接收到的会话建立请求中。由此,源接入网设备可以在终端设备的会话建立初期就能够从终端设备获得切片标识信息。
在一些实施例中,所述切片标识信息被包括从所述核心网设备接收到的针对所述终端设备的会话资源建立请求中。由此,源接入网设备可以在终端设备的会话建立初期就能够从核心网设备获得切片标识信息。
在本公开的第十五方面,提供了一种通信方法。该方法包括:终端设备向源接入网设备传输切片标识信息,所述切片标识信息指示所述终端设备在归属网络中的归属网络切片的标识,所述源接入网设备处于所述终端设备的第一受访网络;以及所述终端设备接收来自所述源接入网设备的第三信息,所述第三信息指示所述终端设备的服务网络从所述第一受访网络切换到第二受访网络,所述第一受访网络和所述第二受访网络不同。以此方式,由终端设备向源接入网设备提供切片标识信息,进而源接入网设备可以将切片标识信息提供给目标接入网设备,以辅助目标接入网设备执行对终端设备跨网络接入时的接入控制,特别是在终端设备要接入受访网络时的接入控制。这可以降低接入时延,减少终端设备由于会话被拒而导致的业务中断问题,确保了终端设备的业务连续性。进一步地,终端设备可以接收到指示服务网络切换的第三信息,从而能够快速获知服务网络的改变。
在一些实施例中,向所述源接入网设备传输所述切片标识信息包括:所述终端设备在会话建立请求中向所述源接入网设备传输所述切片标识信息。由此,源接入网设备可以在终端设备的会话建立初期就能够从终端设备获得切片标识信息。
在一些实施例中,第十五方面的通信方法还包括所述终端设备使用所述第三信息。在一些实施例中,使用所述第三信息包括所述终端设备基于所述第三信息,执行到所述第二受访网络中的目标接入网设备的随机接入。第三信息有助于引导终端设备的随机接入过程,提高随机接入成功的可能性。在一些实施例中,使用所述第三信息包括所述终端设备基于所述第三信息显示所述第二受访网络的标识。通过显示第二受访网络的标识,可以向终端设备的用户通知服务网络的变化。
在一些实施例中,所述第三信息包括所述第二受访网络的标识。将第二受访网络的标识提供给终端设备,有助于终端设备明确从当前网络被切换到的具体网络。
在一些实施例中,所述第三信息被包括在无线电资源控制重配置消息中。由此,终端设备可以通过该消息确定要重配置无线电资源控制连接,同时还能获知服务网络的改变。
在一些实施例中,第十五方面的通信方法还包括:如果所述终端设备到目标接入网设备的接入被允许,所述终端设备接收来自所述源接入网设备的第四信息,所述第四信息指示所述终端设备的会话被改变为由所述第二受访网络的所述第二受访网络切片服务。以此方式,在跨网络接入的情况下,终端设备不仅能够快速获知服务网络的改变,而且还能够通过接收到的第四信息确定要接入的网络切片。
在本公开的第十六方面,提供了一种被实现在目标接入网设备处的通信装置。该通信装置包括第一接收单元,被配置为接收来自源接入网设备的切片标识信息,所述切片标识信息指示所述终端设备在归属网络中的归属网络切片的标识,所述目标接入网设备处于所述终端设备的受访网络;第二接收单元,被配置为接收来自核心网设备的切片对应性信息,所述切片对应性信息指示所述受访网络的网络切片与所述归属网络的网络切片之间的对应性;以及接入控制单元,被配置为至少基于所述切片标识信息和所述切片对应性信息来执行所述终端设备到所述目标接入网设备的接入控制。
在一些实施例中,第十六方面的通信装置还包括:传输单元,被配置为向所述核心网设备传输对所述网络切片对应性信息的请求,所述请求至少包括所述终端设备的标识和所述受访网络的标识。在一些实施例中,所述第一接收单元还被配置为:从所述核心网设备接收针对所述请求的响应,以及从所述响应获取所述网络切片对应性信息。
在一些实施例中,第十六方面的通信装置还包括:第三接收单元,被配置为接收来自所述核心网设备的针对所述归属网络的第五信息,所述第五信息指示所述归属网络切片与所述归属网络的另外的网络切片的关系。在一些实施例中,接入控制单元还被配置为:基于所述切片标识信息、所述网络切片对应性信息以及所述第五信息来执行所述接入控制。
在本公开的第十七方面,提供了一种被实现在源接入网设备处的通信装置。该通信装置包括接收单元,被配置为接收针对终端设备的切片标识信息,所述切片标识信息指示所述终端设备在归属网络中的归属网络切片的标识,所述源接入网设备处于所述终端设备的第一受访网络;以及传输单元,被配置为向所述终端设备要切换到的目标接入网设备传输所述切片标识信息,所述目标接入网设备处于所述终端设备的第二受访网络。
在一些实施例中,所述接收单元还被配置为:所述源接入网设备从所述终端设备或从核心网设备接收所述切片标识信息。
在一些实施例中,所述切片标识信息被包括从所述终端设备接收到的会话建立请求中。
在一些实施例中,所述切片标识信息被包括从所述核心网设备接收到的针对所述终端设备的会话资源建立请求中。
在本公开的第十八方面,提供了一种被实现在终端设备处的通信装置。该通信装置包括传输单元,被配置为传输切片标识信息,所述切片标识信息指示所述终端设备在归属网络中的归属网络切片的标识,所述源接入网设备处于所述终端设备的受访网络;以及第一接收单元,被配置为接收来自所述源接入网设备的第三信息,所述第三信息指示所述终端设备的服务网络从所述第一受访网络切换到第二受访网络,所述第一受访网络和所述第二受访网络不同。
在一些实施例中,所述传输单元还被配置为:所述终端设备在会话建立请求中向所述源接入网设备传输所述切片标识信息。
在一些实施例中,第十八方面的通信装置还包括信息使用单元,被配置为使用所述第三信息。在一些实施例中,所述信息使用单元还被配置为基于所述第三信息,执行到所述第二受访网络中的目标接入网设备的随机接入。在一些实施例中,所述信息使用单元还被配置为基于所述第三信息显示所述第二受访网络的标识。
在一些实施例中,所述第三信息包括所述第二受访网络的标识。
在一些实施例中,所述第三信息被包括在无线电资源控制重配置消息中。
在一些实施例中,第十八方面的通信装置还包括第二接收单元,被配置为如果所述终端设备到目标接入网设备的接入被允许,接收来自所述源接入网设备的第四信息,所述第四信息指示所述终端设备的会话被改变为由所述第二受访网络的所述第二受访网络切片服务。
在本公开的第十九方面,提供了一种计算机可读存储介质。计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现根据上述第十三方面到第十五方面中任意一种可能的实现方式中的方法的操作。
在本公开的第二十方面,本公开提供了一种芯片。该芯片被配置为执行根据上述第十三方面到第十五方面中任意一种可能的实现方式中的方法的操作。
在本公开的第二十一方面,提供了一种通信设备。该通信设备包括:至少一个处理单元;以及至少一个存储器,所述至少一个存储器被耦合到所述至少一个处理单元并且存储用于由所述至少一个处理单元执行的指令,所述指令在由所述至少一个处理单元执行时使所述通信设备实现根据上述第十三方面到第十五方面中任意一种可能的实现方式中的方法的操作。
在本公开的第二十二方面,提供了一种计算机程序产品。计算机程序产品被有形地存储在计算机可读介质上并且包括计算机可执行指令,所述计算机可执行指令在被执行时使设备实现根据上述第十三方面到第十五方面中任意一种可能的实现方式中的方法的操作。
附图说明
结合附图并参考以下详细说明,本公开各实现方式的特征、优点及其他方面将变得更加明显。在此以示例性而非限制性的方式示出了本公开的若干实现方式,在附图中:
图1示出了可以在其中本公开的实施例的基于网络切片的通信环境的示意框图;
图2示出了可以在其中本公开的实施例的网络切片的示例组网架构的示意框图;
图3示出了根据本公开的一些实施例的通信过程的交互信令图;
图4示出了根据本公开的另一些实施例的通信过程的交互信令图;
图5示出了根据本公开的又一些实施例的通信过程的交互信令图;
图6示出了根据本公开的再一些实施例的通信过程的交互信令图;
图7示出了根据本公开的一些实施例的被实现在目标接入网设备处的通信装置的示意框图;
图8示出了根据本公开的一些实施例的被实现在源接入网设备处的通信装置的示意框图;
图9示出了根据本公开的一些实施例的被实现在终端设备处的通信装置的示意框图;
图10示出了根据本公开的一些实施例的被实现在核心网设备处的通信装置的示意框图;
图11示出了根据本公开的另一些实施例的被实现在目标接入网设备处的通信装置的示意框图;
图12示出了根据本公开的另一些实施例的被实现在源接入网设备处的通信装置的示意框图;
图13示出了根据本公开的另一些实施例的被实现在终端设备处的通信装置的示意框图;以及
图14示出了适合实现本公开的实施例的示例设备的简化框图。
在各个附图中,相同或相似参考数字表示相同或相似元素。
具体实施方式
下面将参照附图更详细地描述本公开的实施例。虽然附图中显示了本公开的某些实施例,然而应当理解的是,本公开可以通过各种形式来实现,而且不应该被解释为限于这里阐述的实施例,相反提供这些实施例是为了更加透彻和完整地理解本公开。应当理解的是,本公开的附图及实施例仅用于示例性作用,并非用于限制本公开的保护范围。
在本公开的实施例的描述中,术语“包括”及其类似用语应当理解为开放性包含,即“包括但不限于”。术语“基于”应当理解为“至少部分地基于”。术语“一个实施例”或“该实 施例”应当理解为“至少一个实施例”。术语“第一”、“第二”等等可以指代不同的或相同的对象。下文还可能包括其他明确的和隐含的定义。
本公开的实施例可以根据任何适当的通信协议来实施,包括但不限于,第四代(4G)和第五代(5G)等蜂窝通信协议、诸如电气与电子工程师协会(IEEE)802.11等的无线局域网通信协议、和/或目前已知或者将来开发的任何其他协议。本公开实施例的技术方案应用于遵循任何适当的通信系统,例如:通用分组无线业务(GPRS)、长期演进(LTE)系统、频分双工(FDD)系统、时分双工(TDD)、通用移动通信系统(UMTS)、窄带物联网(NB-IoT)通信系统、未来的第五代(5G)系统或新无线(NR),等等。
出于说明的目的,下文中将5G的第三代合作伙伴计划(3GPP)通信系统为背景来描述本公开的实施例。然而,应当理解,本公开的实施例不限于被应用到5G的3GPP通信系统,而是可以被应用到任何存在类似问题的通信系统中,例如无线局域网(WLAN)、有线通信系统、或者将来开发的其他通信系统等。
在本公开中使用的术语“终端设备”指能够与网络设备之间或者彼此之间进行有线或无线通信的任何终端设备。终端设备有时可以称为用户设备(UE)。终端设备可以是任意类型的移动终端、固定终端或便携式终端。作为示例,终端设备可以包括移动手机、站点、单元、设备、移动终端(MT)、订阅台(SS)、便携式订阅台(PSS)、互联网节点、通信器、台式计算机、膝上型计算机、笔记本计算机、平板计算机、个人通信系统(PCS)设备、个人导航设备、个人数字助理(PDA)、定位设备、无线电广播接收器、电子书设备、游戏设备、物联网(IoT)设备、车载设备、飞行器、虚拟现实(VR)设备、增强现实(AR)设备、可穿戴设备、5G网络中的终端设备或者未来演进的公用陆地移动网络(PLMN)中的任何终端设备、可用于通信的其他设备、或者上述的任意组合。本公开的实施例对此并不做限定。
在本公开中使用的术语“接入网设备”是可以用于与终端设备通信的实体或节点。接入网设备例如可以是无线接入网(RAN)网络设备。接入网设备可以包括各种类型的基站。作为示例,接入网设备可以包括各种形式的宏基站、微基站、微微基站、毫微微基站、中继站、接入点、、远程无线电单元(RRU)、射频头(RH)、远程无线电头端(RRH)等等。在采用不同的无线接入技术的系统中,接入网设备的名称可能会有所不同,例如在LTE网络中称为演进的节点B(eNB或eNodeB),在3G网络中称为节点B(NodeB),在5G网络中可以称为g节点B(gNB)或NR节点B(NR NB),等等。本公开的实施例对此并不做限定。
在本公开中使用的术语“核心网设备”或“CN设备”可以核心网中的网络功能(NF)或网元。核心网设备可以包括终端设备的控制面锚点,为终端提供核心网接入、注册区更新、移动性管理、会话管理等功能。作为示例,核心网设备可以包括接入及移动性管理功能(AMF)、网络切片选择功能(NSSF)、网络存储功能(NRF)、会话管理功能(SMF)、策略控制功能(PCF)、用户面功能(UPF),等等。在本公开的实施例中,所描述的核心网的功能可以被实现在核心网的一个或多个功能实体上。
本公开的具体实施例主要在基于网络切片的架构上实现。在介绍本公开的具体实施例之前,为了便于理解,首先描述基于网络切片的示例环境,并且说明在本文中可能出现的一些术语。
1.基于网络切片的示例环境
图1示出了可以在其中本公开的实施例的基于网络切片的通信环境100的示意框图。如 图所示,在单个基础设施池110上,可以虚拟出多个网络切片120-1、120-2、……、120-N(为讨论方便,在本文中统称为或分别称为网络切片120),其中N是大于1的整数。应当理解,图1中所示出的网络切片数目和基础设施仅是示例。
基础设施池110可以包括用于支持网络服务所需要的各种物理或虚拟网络设备,诸如各种接入网设备、服务器、交换机、网关等。基础设施池110的网络资源将会根据不同的服务需求或者租户需求等分配到不同网络切片120。因此,不同类型的网络切片120将提供不同的网络能力和网络特性。网络切片120的类型通常与所要支持的业务类型相关,例如可以包括增强的移动宽带业务(eMBB)、超可靠低时延通信(URLLC),海量机器类通信(mMTC)等类型。在一些实施例中,对于每个类型,可以存在多个网络切片120。
在本文中,网络切片120可以被理解为包括接入网、传输网、核心网和应用服务器的完整的端到端逻辑子网络,能够提供电信服务,具有一定网络能力。网络切片120也可以是上述接入网、传输网、核心网和应用服务器的任意组合,例如,网络切片120可以仅包含接入网和核心网。对于特定网络切片120,某个接入网可能支持该网络切片,也可能不支持该网络切片。接入网可能是多个网络切片120共用的。不同的网络切片120的特性和组成它们的网络功能模块可能是不一样。网络切片也可简称为“切片”。
图2示出了可以在其中实现本公开的实施例的基于网络切片的示例组网架构200的示意图。在图2所示的示例中,多个接入网设备210、212、214等用于实现通信环境中接入网的网络功能。每个接入网设备可以支持一个或多个网络切片120。例如,接入网设备210支持网络切片120-2、120-N,这意味着网络切片120-2和120-N具有共享的接入网。图2还示出了接入网设备212支持网络切片120-2;接入网设备214支持网络切片120-2和120-N,等等。
图2中还示出了每个网络切片120的核心网设备,其中AMF 230由多个网络切片120共享,以为多个网络切片120提供接入和移动性管理。每个网络切片120还具有各自的核心网设备,例如网络切片120-1具有SMF 240-1、UPF 250-1等,网络切片120-2具有SMF 240-2、UPF 250-2等,并且网络切片120-N具有SMF 240-N、UPF 250-N等,等等。为讨论方便,在本文中,SMF 240-1、240-2、……、240-N可以统称为或分别称为SMF 240,UPF 250-1、250-2、……、250-N可以统称为或分别称为UPF 250。SMF 240和UPF 250可以基于各个网络切片120对时延、带宽和安全性等不同方面的需求来为网络切片120提供核心网的会话管理、用户面功能等相关服务。
进一步地,诸如NSSF 260和NRF 270等核心网设备可以按网络(例如,按PLMN)部署,以支持网络内的网络切片选择功能和网络存储功能。图2仅示意性示出了用于单个PLMN的NSSF和NRF。
终端设备220可以经由接入网设备来实现对网络切片120的接入。在同一网络下,例如同一PLMN,终端设备220可以只接入一个网络切片120,也可以接入多个网络切片120,以同时使用多个网络切片120提供的不同服务。在图2的示例中,假设终端设备220经由接入网设备210来接入网络切片120-2,从而实现最终终端设备220到数据网络(DN)的通信。不同网络切片120可能可以访问不同的DN。在图2的示例中,网络切片120-1和120-2可以访问DN 280-1,网络切片120-N可以访问DN 280-M。为讨论方便,在本文中,DN 280-1、……、280-M可以统称为或分别称为DN 280。
应当理解,图2示出的仅仅是网络切片的一种示例组网方式。在实际应用中,还可能存在很多其他不同的组网方式。例如,不同网络切片可以具有各自的AMF。此外,图2中示出 的设备类型、设备数目、设备之间的连接方式等都可以变化。例如,图2中仅示意性示出了一些核心网设备,但实际可能存在更多、更少或者其他类型的核心网设备。此外,还可以存在更多、更少或者其他接入网设备,更多的终端设备等等。这些部署方式的变形是本领域技术人员可实现的。本公开的实施例对此并不做限定。
为了在终端设备、接入网设备和核心网设备之间区分网络切片,不同网络切片120可以由相应的标识信息进行标识。在一些示例中,网络切片的标识(或者也称为切片标识)可以包括单网络切片选择辅助信息(S-NSSAI)。S-NSSAI可以至少包含切片类型/服务类型(SST)信息,用于指示网络切片的特征和所服务的业务类型。作为SST的补充,S-NSSAI还可以包括切片区分信息(SD),以用于进一步区分满足相同SST的多个网络切片实例。SD是可选的。
针对网络切片选择辅助信息(NSSAI),即S-NSSAI的集合,可以存在多种分类,这些分类用于指示在不同场景或条件下对于NSSAI的称呼。下文将简单说明一些示例NSSAI以及相关的信息。
网络切片120的NSSAI可以包括配置NSSAI(configured NSSAI),具体可以有以下各种类型:
-归属PLMN(HPLMN)配置NSSAI:其包含HPLMN S-NSSAI,也称为订阅S-NSSAI;终端设备220在归属网络中,例如在HPLMN中可以使用HPLMN配置NSSAI来入网;
-受访PLMN(VPLMN)配置NSSAI:在受访网络中,例如在受访PLMN中,终端设备使用VPLMN配置NSSAI来入网;
-默认配置NSSAI:在受访网络中,例如在受访PLMN中,如果终端设备220没有VPLMN配置NSSAI,终端设备220可以用默认NSSAI来注册入网;默认配置NSSAI通常是标准定义的S-NSSAI。
注意,上文中提及的入网指的是终端设备220基于配置NSSAI来构造请求NSSAI(requested NSSAI),以用于请求接入到某个网络切片120。在不同PLMN中,同一网络切片120可能具有不同的标识(例如,不同的NSSAI)。
通常终端设备220所获得的网络切片选择策略(NSSP)中包含终端设备220的业务会话(例如,应用的会话)与归属网络下的网络切片120的HPLMN S-NSSAI之间的对应关系。在一些实施例中,终端设备还可以获得配置NSSAI到HPLMN S-NSSAI的映射信息,用于辅助终端设备220确定要用于承载业务的网络切片120对应的配置NSSAI,以便在后续的注册请求中包含新的配置NSSAI。
网络切片120的NSSAI还包括请求NSSAI。请求NSSAI由终端设备220构造,以用于向网络侧(接入网侧和核心网侧)指示请求接入的网络切片120。请求NSSAI可以来自下列参数:
-默认配置NSSAI(default configured NSSAI):如果终端设备220在当前PLMN中没有任何配置NSSAI或允许的NSSAI,可以使用默认配置NSSAI;
-配置NSSAI:终端设备220在当前PLMN中可以获得该PLMN的配置NSSAI;
-允许的NSSAI(allowed NSSAI):终端设备220在当前PLMN中可以获得该PLMN允许的NSSAI;
-允许的NSSAI+尚未被包括的配置NSSAI:终端设备220曾经接入过当前PLMN并且接收到允许的NSSAI,同时终端设备220还要在该PLMN中请求新的配置S-NSSAI。
网络切片120的NSSAI还包括订阅S-NSSAI,其可以包括:
-订阅S-NSSAI(subscribed S-NSSAI):是用户签约的S-NSSAI,即HPLMN S-NSSAI;订阅S-NSSAI可以是标准值,也可以是在HPLMN中所定义的非标准值(例如,某个HPLMN可以定义一个非标准值S-NSSAI,用于标识能够同时支持eMBB和URLLC业务的网络切片);
-默认订阅S-NSSAI(default Subscribed S-NSSAI):根据网络运营商的策略,用户的订阅S-NSSAI可能会有一个或多个标识被设置为默认S-NSSAI;如果终端设备220在入网时未携带任何请求NSSAI,核心网的网元(例如,NSSF)会根据默认订阅S-NSSAI来确定终端设备220请求接入的网络切片120。
网络切片120的NSSAI还包括允许的NSSAI,用于标识终端设备220在网络中允许使用的网络切片。允许的NSSAI在终端设备220的注册区范围内是有效的。也就是说,网络在分配跟踪区(TA)时,需要考虑网络切片120对终端设备220的可用性。如果终端设备220当前的服务网络是受访网络(例如,VPLMN),还需要向终端设备220提供受访网络的允许的NSSAI到归属网络的NSSAI(例如,VPLMN的允许的NSSAI到HPLMN NSSAI)的映射信息,以指示同一网络切片120在受访网络和归属网络中可能的不同NSSAI的映射。
类似地,由于NSSP中仅包含终端设备220的业务会话(例如,应用的会话)与承载业务的网络切片120的HPLMN S-NSSAI之间的对应关系,在一些实施例中,终端设备220还可以获得允许的NSSAI到HPLMN S-NSSAI的映射信息,用于辅助终端设备220根据业务确定允许的NSSAI,以便用于业务后续的会话请求,例如,协议数据单元(PDU)会话请求。
应当理解,以上给出的NSSAI信息仅是用于标识网络切片120的标识的一种示例。网络切片120的标识还可以额外地包括或者备选地包括其他信息。用于标识网络切片的其他信息例如可以包括业务类型信息,其指示网络切片120所支持的具体业务;租户信息,用于指示创建或者租用该网络切片的客户信息;用户组信息,用于指示按照某种特征、诸如用户的级别等将用户进行分组后的分组信息;切片组信息,用于指示按照某种特征划分网络切片的分组,例如将终端设备能够接入的所有网络切片作为一个切片组,或者也可以按照其他标准划分网络切片的分组;网络切片实例信息,用于指示为该网络切片创建的实例标识以及特征信息,例如可以为网络切片实例分配一个标识,用于具体指示该网络切片实例,等等。
应理解,在本公开实施例中,网络切片可以采用上述标识信息中的至少一种来指示网络切片,本公开实施例对此不作限定。若终端设备、接入网设备或核心网设备支持多个网络切片,则终端设备、接入网设备或核心网设备支持的网络切片的标识可以由多种标识信息中的不同标识来指示。
为了更好理解终端设备在基于网络切片的通信环境中如何进行数据通信,下面将结合图2的示例来简单说明终端设备如何建立业务通信。注意,在本文中所提及的终端设备220的业务可以是终端设备220的会话,例如PDU会话,或者可以是终端设备220的业务流、无线电承载等。在下文的一些实施例中主要以会话作为业务的示例进行描述。
具体地,如以上提及的,终端设备220通常具有会话(例如,某个应用的会话)与归属网络下的网络切片120的HPLMN S-NSSAI之间的对应关系。该对应关系通常被包括在NSSP中,并且可以由归属网络,例如HPLMN的核心网设备PCF(图2中未示出)提供给终端设备220。NSSP的一个示例在以下表1中示出。
表1网络切片选择策略(NSSP)
规则 应用 网络切片的标识
默认规则 - HPLMN S-NSSAI 1
NSSP规则1 应用A HPLMN S-NSSAI 1
NSSP规则2 应用B HPLMN S-NSSAI 2
…… …… ……
表1给出了与终端设备220的各个应用相关联的网络切片在HPLMN下的标识。取决于要发起的PDU会话所属的应用,终端设备220可以确定要接入的网络切片在HPLMN下的标识。由于同一网络切片在不同网络中可能具有不同标识,如果在发起PDU会话请求时终端设备220的服务网络为受访网络而不是归属网络,根据NSSP可能无法确定相关联的网络切片在受访网络中的标识。为解决这个问题,终端设备220还可以获得受访网络允许的NSSAI到归属网络NSSAI的映射信息。这样的映射信息的一个示例在以下表2中示出。
表2受访网络允许的NSSAI到归属网络NSSAI的映射信息
归属网络NSSAI 受访网络允许的NSSAI
HPLMN S-NSSAI 1 允许的S-NSSAI 1
HPLMN S-NSSAI 2 允许的S-NSSAI 1
HPLMN S-NSSAI 3 允许的S-NSSAI 2
…… ……
在图2中,如果终端设备220当前的服务网络是受访网络并且要在其中发起应用B的PDU会话,终端设备220可以利用表1的NSSP来确定对应的网络切片在归属网络中的标识为HPLMN S-NSSAI 2。终端设备220还根据表2的映射信息确定由HPLMN S-NSSAI 2标识的网络切片在受访网络下的标识信息为允许的S-NSSAI 1。在确定标识信息后,终端设备220将在PDU会话建立请求中携带HPLMN S-NSSAI 2和允许的S-NSSAI 1。PDU会话建立请求会被传输到终端设备220所连接的接入网设备,然后被传输到核心网设备,例如AMF 230。在接入网侧和和核心网侧,通过该请求所携带的信息,可以确定终端设备220请求接入的网络切片类型。
响应于来自终端设备220的PDU会话建立请求,AMF 230将请求中的HPLMN S-NSSAI2和允许的S-NSSAI 1提供给受访网络下的NSSF 260。NSSF 260至少基于这些标识来为AMF230选择网络切片专属的NRF以及网络切片实例(NSI)标识(ID)。AMF 230向对应的NRF270提供HPLMN S-NSSAI 2、允许的S-NSSAI 1以及NSI ID来选择网络切片所在的SMF 240。
在上述示例中说明了同一网络切片在不同网络中的标识不同,从而需要通过NSSP和不同网络的网络切片的标识之间的映射信息,来正确标识对应的网络切片。在一些情况下,在不同网络切片之间还可以实现重映射。网络切片的“重映射”指的是一个网络切片可以重映射到另一个网络切片,这样一个网络切片上承载的业务(例如,PDU会话)可以由重映射到的另一个网络切片服务。也就是说,利用另一个网络切片的网络资源来实现前一网络切片的业务。
网络切片的重映射可以应用于在切换场景,例如终端设备从一个接入网设备要切换到另一个接入网设备,而要切换到的接入网设备不支持终端设备当前业务所在的网络切片。为了确保终端设备的业务连续性,可以通过网络切片的重映射来选择其他网络切片用于为终端设 备提供服务。当前存在一些方案通过向终端设备所连接到的接入网设备提供同一网络下的网络切片之间的重映射关系来辅助接入网设备执行网络切片的重映射。
除切换场景之外,在其他通信场景中也可以执行网络切片的重映射。在一些示例中,如果某个网络切片上的业务负载过大,接入网设备也可以通过重映射来将终端设备的业务转到另一网络切片上,从而实现网络切片的负载均衡,以为终端设备提供期望的服务质量。
通过以上讨论可以看出,考虑到在不同网络对网络切片的支持能力不同、不同终端设备在不同网络中被允许接入的网络切片等差异化因素,在基于网络切片的通信中,接入网设备往往需要足够的信息才能够正确标识用于支持终端设备的通信的网络切片。
在一些场景中,可能会存在由于网络切片之间的关系指示不充分而导致通信的时延、业务中断等问题。例如,如果终端设备要从一个网络切换到另一个网络,目标网络的目标接入网设备在处理终端设备的切换请求时,可能无法识别终端设备的当前PDU会话对应的网络切片,并且也无法确定终端设备在目标网络中允许的网络切片(没有获得与允许的NSSAI有关的信息)。这样,接入网设备无法处理终端设备的接入控制。这主要发生在通过接入网设备之间的Xn接口执行终端设备的切换场景中。
根据当前的通信协议,跨网络的终端设备切换可以通过接入网设备与核心网设备的N2(控制平面)接口来实现。AMF可以根据核心网中维护的终端设备的UE上下文信息,确定终端设备在目标网络中允许的网络切片的NSSAI信息,并且基于该信息来对终端设备到目标接入网设备的接入控制。
如果已经通过Xn接口发起切换,由于目标接入网设备不具备足够的信息来执行接入控制,可能会先允许终端设备切换到目标网络,然后要求终端设备根据条件发起跟踪区域更新(TAU)或注册,进而获得终端设备在目标网络中允许的网络切片的标识信息。目标接入网设备由此再执行终端设备的接入控制。这个过程将会引入时延问题。如果确定无法允许终端设备的接入,PDU会话会被拒绝,将会影响终端设备的业务连续性。
2.本公开的第一实现方式
根据本公开的示例实施例,提供了一种改进的方案,用于支持终端设备的接入控制。具体地,在一些实施例中,终端设备要接入的目标接入网设备从核心网设备或者源接入网设备获得指示不同网络的多个网络切片的关系的信息。目标接入网设备能够基于所获得的信息来执行终端设备到目标接入网设备的接入控制。通过本公开的方案,目标接入网设备能够执行对终端设备跨网络接入时的接入控制,降低接入时延,减少终端设备由于会话被拒而导致的业务中断问题,确保了终端设备的业务连续性。
下文将参考附图来具体讨论本公开的示例实施例。在下文描述图3至图5的信令交互过程时,为便于讨论,将参考图2的示例架构来描述根据本公开示例实施例的通信实体间信令交互。应理解,本公开的示例实施例可以类似应用于基于网络切片的其他通信环境以及网络切片的其他组网架构中。在下文中,网络切片指的是图2的网络切片120。
图3至图5的信令交互涉及终端设备220的目标接入网设备,并且在一些实现方式中涉及核心网设备,在另一些实现方式中涉及终端设备220的源接入网设备。在本文中,目标接入网设备指的是终端设备220要接入的物理或虚拟接入网设备,其中终端设备220当前可能已经连接到其他网络设备或者正在执行对目标接入网设备的初始注册接入。
在本文中,源接入网设备指的是终端设备220当前已经连接到的物理或虚拟接入网设 备。终端设备220可经由源接入网设备接入源网络的网络切换服务(例如,接入该服务网络的网络切片)。如果终端设备220正在由源网络服务,那么该源网络称为终端设备220的服务网络。在下文中,出于讨论的目的,假设在图2的接入网设备210是终端设备220当前连接的源接入网设备,接入网设备212是终端设备220的目标接入网设备。
在一些情况下,如果终端设备220要从当前服务网络切换到另一个网络,例如经由目标接入网设备接入的网络,该网络可以称为终端设备220的目标网络。如果目标接入网设备212确定允许终端设备220接入到目标网络的一个网络切片,在切换完成后,该目标网络将变为终端设备220的服务网络。
在本文中,核心网设备指的是实现核心网侧的相关功能的物理或虚拟设备,其可以是能够直接与接入网设备对接的AMF 230,或者可以是AMF 230与核心网中一个或多个其他网络功能的总称。为下文讨论方便,将核心网设备统一标示为核心网设备330。
2.1总体信令交互
图3示出了根据本公开的一些实施例的通信过程300的交互信令图。在图3的实施例中,要向目标接入网设备212提供指示不同网络的网络切片的关系的信息(在本文中称为“第一信息”)。第一信息具体指示一个或多个第一网络的某个或某些网络切片与一个或多个第二网络的某个或某些网络切片的关系。在此,第一网络和第二网络是不同的网络。在一些实施例中,第一网络和第二网络可以是不同的PLMN,不同的PLMN可以由不同的网络运营商部署。在一些实施例中,第一网络和第二网络还可以是其他类型的网络。第一网络的每个网络切片在本文中有时称为第一网络切片,第二网络的每个网络切片在本文中有时称为第二网络切片。第一信息中指示的网络切片均是第一网络和第二网络中各自支持的网络切片。
在一些实施例中,如果第一信息指示第一网络的某个第一网络切片与第二网络的某个第二网络切片的关系,这意味着终端设备220的业务可以从与该第一网络切片对应改变为与该第二网络切片对应,即终端设备220的业务与网络切片的对应关系可以在第一网络切片和第二网络切片之间变化。在这种情况下,第二网络切片可以提供与第一网络切片基本相同的服务质量(QoS),或者可以提供比第一网络切片更低或更高的QoS,但QoS的降低或提高均在可容忍的范围内。在一些示例中,第一信息所指示的关系可以是第一网络的第一网络切片到第二网络的第二网络切片的重映射关系,其中重映射关系指示终端设备220在第一网络的第一网络切片上的业务可以被重映射到第二网络的第二网络切片,以由第二网络切片提供通信服务。在这样的示例中,第一信息也可称为重映射策略信息,其具体指示在不同网络的网络切片之间如何执行重映射。在本公开的实施例中,指示不同网络的网络切片的关系的第一信息有助于目标接入网设备212执行针对终端设备220的接入控制,特别是在终端设备220在不同网络进行切换情况下。
在一些实施例中,第一信息可以包括第一网络的标识、第一网络切片的标识、第二网络的标识以及第二网络切片的标识。网络的标识有时也称为网络标识,用于唯一标识不同网络。网络切片的标识有时也称为切片标识,用于在对应网络中标识不同的网络切片。不同网络中可以支持同一网络切片,但同一网络切片在不同网络中的标识可以相同或者不同。在第一信息中,可以通过网络的标识和切片的标识来指示对应的网络及其网络切片的关系。
如果第一网络和第二网络是PLMN,第一网络和第二网络的标识例如可以包括第一网络和第二网络各自的PLMN标识(PLMN ID)。当然,网络的标识还可以包括或者备选地包括 有助于标识特定网络的其他信息,例如网络运营商的名称等。在不同网络中,网络切片的标识可以包括各自的S-NSSAI。当然,除S-NSSAI之外或者作为备选,网络切片的标识还可以包括有助于标识特定网络切片的其他信息。
可以通过多种方式向目标接入网设备212提供第一信息。在不同方式中第一信息中涉及的第一网络和第二网络以及它们的网络切片可能不同。以下列出两种可能的方式,包括方式A和方式B。
如图3所示,在方式A中,核心网设备330确定301第一信息,其中第一信息指示一个或多个第一网络的某个或某些网络切片与一个或多个第二网络的某个或某些网络切片的关系。
在方式A的一些实施例中,核心网设备330可以从多个接入网设备(例如,图2的多个接入网设备210、212、214)接收网络切片信息,该网络切片信息指示每个接入网设备支持的一个或多个网络(例如,PLMN)以及在各个网络中支持的一个或多个网络切片。在一些实施例中,多个接入网设备可以在建立N2接口的过程中可以向核心网设备330,诸如AMF230,发送网络切片信息。在一些实施例中,接入网设备通过NG建立消息向核心网设备330传输所支持的网络以及网络切片。核心网设备330,包括AMF 230以及核心网的其他网络功能,在接收到多个接入网设备发送的网络切片信息后,可以基于网络切片信息来确定第一信息。在一些实施例中,核心设备330可以参考在核心网侧所维护的各个网络的策略信息,确定网络切片信息所指示的各个网络的网络切片之间的关系,例如确定这些网络切片间是否等效、是否可以重映射等,从而可以确定要发送的第一信息。
除通过接入网设备上报所支持的网络切片信息之外,核心网设备330还可以通过其他方式来确定第一信息。在一些实施例中,第一信息可以被预先配置在核心网设备330中,例如在网络部署的初始阶段被预先配置在核心网设备330中。本公开的实施例对于核心网设备330如何获得第一信息不做限定。
在方式A的一些实施例中,第一信息所指示的第一网络可以包括一个TA范围内的一个或多个网络,第二网络可以包括同一TA范围内的一个或多个网络。第一网络的集合和第二网络的集合可以重叠,但对于某个第一网络,第一信息可以指示该第一网络的一个或多个第一网络切片与不同的第二网络的网络切片的关系。由于第一信息涵盖了一定区域内网络的网络切片的关系,无论终端设备要接入该区域内的任何网络,对应的目标接入网设备均可以根据第一信息执行接入控制。
在方式A中,核心网设备330向目标接入网设备212传输302所确定的第一信息,并且目标接入网设备212接收304来自核心网设备330的第一信息。在一些实施例中,第一信息被包括在传输给目标接入网设备212的NG建立响应中,该NG建立响应是针对目标接入网设备212发送的NG建立消息的响应。以此方式,目标接入网设备212可以在接口建立阶段就提前获得用于接入控制的第一信息。当然,核心网设备330还可以在与目标接入网设备212通信的其他消息或信令中传输第一信息,或者通过专用信令来传输第一信息。
核心网设备330对第一信息的传输可以是广泛的。在一些实施例中,核心网设备330可以将第一信息发送给一定TA范围内的多个接入网设备,目标接入网设备212是其中之一。在一些实施例中,核心网设备330,例如AMF 230可以通过与目标接入网设备212的接口中的任何类型的信令,将第一信息发送到目标接入网设备212。
在方式A的一些实施例中,第一信息的一种可能的形式在以下表3中给出。
表3第一信息的示例形式
Figure PCTCN2021096340-appb-000001
通过表3的示例第一信息,目标接入网设备212可以确定每个第一网络的各个网络切片与每个第二网络切片的各个网络切片的关系。应当理解,表3仅示出了第一信息的一种可能的表示形式。在实际应用中,第一信息还可以以任何其他方式表示。
在方式A的实施例中,核心网设备330在确定第一信息时可能没有考虑网络切片的关系对于特定终端设备220是否适用,而是假设不同终端设备220在这些第一和第二网络中的网络切片的重映射策略相同。这样的第一信息有时可以被称为通用第一信息、通用重映射策略信息或者与终端设备不关联的重映射策略信息。
如果不同终端设备在不同网络中允许的网络切片是不同的,在方式A的一些实施例中,源接入网设备210可以向目标接入网设备212发送附加信息(在本文中称为“第二信息”)。第二信息可以指示终端设备220在不同网络中允许使用的网络切片的标识,这里的网络包括第一信息所指示的第二网络。第二信息可以被用于进一步辅助目标接入网设备212执行接入控制,例如使目标接入网设备212确定终端设备220在第二网络中被允许接入哪些网络切片。
对于每个第二网络,第二信息中所指示的网络切片与第一信息中所指示的网络切片可能不完全相同,而是有部分重叠。例如,相比于第一信息中所指示的网络切片,第二信息中可能指示第二网络中更少的网络切片是允许终端设备220接入的。在第二信息所指示的第二网络中的网络切片在本文中有时称为“第三网络切片”,以区别于第一信息所指示的第二网络切片,但第二网络切片可以包括或部分包括第三网络切片。
在一些实施例中,第二信息的一种可能的形式在以下表4中给出。
表4第二信息的示例形式
Figure PCTCN2021096340-appb-000002
应当理解,表4仅示出了第二信息的一种可能的表示形式。在实际应用中,第二信息还可以以任何其他方式表示。
在一些实施例中,源接入网设备210可以从核心网设备330接收到针对终端设备220的第二信息。在一个示例中,第二信息可以作为终端设备220的UE上下文信息,由核心网设备330提供给源接入网设备210。源接入网设备210还可以通过其他方式获得第二信息并且提供给目标接入网设备212。
在一些实施例中,源接入网设备210可以在确定要将终端设备220从当前服务网络切换到由目标接入网设备212所支持的目标网络时,向目标接入网设备212发送第二信息。例如,如果触发针对终端设备220的切换时,源接入网设备210向目标接入网设备212发送切换请求,并且在切换请求中携带第二信息。当然,核心网设备330还可以在与目标接入网设备212通信的其他类型的消息或信令中携带第二信息,或者通过专用信令来传输第二信息。
除方式A外,第一信息还可以以另一种方式(即方式B)被提供给目标接入网设备212。如图3所示,在方式B中,核心网设备330确定311第一信息并且向终端设备220的源接入网设备210发送312第一信息。由此,源接入网设备210接收314来自核心网设备330的第一信息,并且将接收到的第一信息部分或全部发送316给目标接入网设备212。这样,目标接入网设备212接收318来自源接入网设备210的第一信息。
在方式B的实施例中,期望向目标接入网设备212提供特定于终端设备220的切片相关信息。与方式A相比,在方式B中由核心网设备330向源接入网设备210发送的第一信息所指示的第一网络具体是终端设备220的服务网络,而不是一定区域内的任意网络。由于第一信息特定于终端设备220,目标接入网设备212能够直接利用该信息来执行针对该终端设备220的接入控制。此外,由于第一信息所承载的信息量更少,设备之间信息传输的开销得以降低。
在确定特定于终端设备220的第一信息时,核心网设备330可以通过终端设备220当前连接到的源接入网设备210来确定终端设备220的当前服务网络。具体地,终端设备220在服务网络中进行通信时,通常会经由源接入网设备230向核心网发起会话建立请求,其中携带终端设备220的服务网络的标识。源接入网设备230会向核心网设备330转发终端设备220的会话建立请求。相应地,核心网设备330可以从接收到的会话建立请求中确定终端设备220的服务网络,进而确定在向源接入网设备210发送的第一信息中仅指示该服务网络的一个或多个网络切片与一个或多个第二网络的网络切片的关系。
在一些实施例中,在确定特定于终端设备220的第一信息时,核心网设备330还可以确定终端设备220的当前会话由服务网络的哪个网络切片服务。例如,来自源接入设备210的会话建立请求中还可以包括终端设备220为要建立的会话请求接入的网络切片的标识。如果核心网设备330确定终端设备220允许接入该网络切片,相应地,核心网设备330可以确定 在第一信息中指示服务网络的该网络切片与一个或多个第二网络的网络切片的关系,例如这些网络切片的重映射关系。
因此,在方式B的一些实施例中,第一信息中所涉及的服务网络的网络切片可以仅是终端设备220当前接入的网络切片,或者还可以包括核心网设备330确定服务网络中可允许终端设备220接入服务当前业务的一个或多个其他网络切片。这可以进一步缩减第一信息的信息量,使第一信息更适合于针对终端设备220在当前通行状况下的接入控制。此外,第一信息的传输所需的开销更小。
在方式B的一些实施例中,核心网设备330还可以基于终端设备220在一个或多个第二网络中允许的网络切片来确定第一信息,以使第一信息中涉及的第二网络和第二网络切片是终端设备220允许使用的。在这样的实施例中,核心网设备330所提供的第一信息指示服务网络的网络切片与终端设备220在一个或多个第二网络中允许使用的网络切片的关系。
在方式B的一些实施例中,针对终端设备220的当前业务,例如当前PDU会话,一种可能的形式在以下表5中给出。
表5第一信息的示例形式
Figure PCTCN2021096340-appb-000003
应当理解,表5仅示出了第一信息的一种可能的表示形式。在实际应用中,第一信息还可以以任何其他方式表示。
在方式B的一些实施例中,在传输第一信息时,核心网设备330可以在针对会话建立请求的会话资源建立请求中将第一信息传输给源接入网设备210。当然,核心网设备330还可以在与源接入网设备210通信的其他消息或信令中发送第一信息,或者通过专用信令来传输第一信息。
在方式B的一些实施例中,在从核心网设备330接收到第一信息后,源接入网设备210可以将第一信息转发给目标接入网设备212。在这样的实施例中,从核心网设备330接收到的第一信息所指示的一个或多个第二网络包括目标接入网设备212所支持的目标网络。在一些实施例中,源接入网设备210可以在确定要将终端设备220从当前服务网络切换到由目标接入网设备212支持的目标网络时,向目标接入网设备212发送第一信息。例如,如果触发针对终端设备220的切换时,源接入网设备210向目标接入网设备212发送切换请求,并且在切换请求中携带第一信息。
在一些实施例中,源接入网设备210可以不直接转发从核心网设备330接收到的第一信息的全部内容,而是取决于终端设备220要切换到的目标网络,向目标接入网设备212发送与终端设备220要切换到的目标网络相关的信息部分。也就是说,源接入网设备210发送给目标接入网设备212的第一信息可以指示服务网络的网络切片与终端设备220要切换到的目标网络的网络切片的关系。由此,可以降低在接入网设备之间的传输开销,使目标接入网设 备212无需接收无用信息。
在方式B的实施例中,由于第一信息与终端设备220的服务网络有关,并且在一些实施例中还与终端设备220的目标网络有关,因此这样的第一信息有时可以被称为特定于终端设备220的第一信息或者特定于终端设备220的重映射策略信息。
以上讨论了在目标接入网设备212获得第一信息的若干方式。在获得第一信息后,目标接入网设备212基于第一信息来执行320终端设备220到目标接入网设备212的接入控制。接入控制可以包括涉及终端设备220的接入的各种操作,以确定终端设备220是否可以接入由目标接入网设备212所支持的目标网络,例如目标PLMN。在一些情况下,接入控制有时也称为“准入控制”。
目标接入网设备212可能因为各种因素而触发针对终端设备220的接入控制。在一些实施例中,如果终端设备220正由源接入网设备210支持的源网络进行服务,但要从当前的服务网络切换到目标网络,目标接入网设备212要执行接入控制。在一些示例中,目标接入网设备212从源接入网设备210接收切换请求,以请求将终端设备220从当前服务网络切换到目标网络。目标接入网设备212在接收到切换请求后执行终端设备220的接入控制。
在切换的场景下,在执行接入控制时,目标接入网设备212可以确定终端设备220的服务网络的标识(有时也称为“服务网络标识”)、终端设备220在服务网络中接入的服务网络切片的标识(称为“服务切片标识”)以及终端设备220要切换到的目标网络的标识(称为“目标网络标识”)。这些网络和网络切片的标识可以被携带在来自源接入网设备210的切换请求中。例如,切换请求中包括终端设备220的当前PDU会话对应的网络切片的标识,其指示服务网络的服务网络切片。切换请求还包括移动性约束列表,其中指示要切换到的目标网络的标识。当然,除了上述信息之外,切片请求可选地还可以包括其他信息。本公开的实施例在此方面不受限制。
基于上述网络和网络切片的标识,目标接入网设备212可以从所获取的第一信息中确定目标网络中与服务网络切片有关系的网络切片(称为“目标网络切片”)。在一个实施例中,目标接入网设备212可以从第一信息确定终端设备220的业务是否可以从与服务网络切片对应改变为与目标网络切片对应,例如是否可以从服务网络切片可重映射到目标网络切片。
例如,目标接入网设备212从切换请求中确定终端设备220的PDU会话对应的服务网络的标识为“V1”并且服务网络切片的标识为“S-NSSAI 1”,并且还确定目标网络的标识为“V2”。利用这些网络的标识和服务切片的标识,目标接入网设备212从第一信息中查找到服务网络V1的服务网络切片S-NSSAI 1可重映射到目标网络V2的一个或多个目标网络切片,例如由标识S-NSSAI 1’和S-NSSAI 2’所标识的目标网络切片。
考虑到终端设备220在不同网络中允许的网络切片可能不同,如果目标接入网设备212所使用的第一信息是通过方式A从核心网设备330接收到的通用第一信息,如以上一些实施例提及的,目标接入网设备212还可以从源接入网设备210接收到附加的第二信息。第二信息指示一个或多个第二网络中的网络切片中哪些网络切片允许终端设备220接入。目标接入网设备212可以利用目标网络的标识V2,从第二信息确定终端设备220在目标网络中允许使用的一个或多个目标网络切片。目标接入网设备212可以将从第一信息和第二信息确定的目标网络切片结果取交集,从而确定即可重映射到当前服务网络切片并且还允许终端设备220使用的目标网络切片。
如果第一信息是通过方式B接收到的特定于终端设备220的第一信息,那么目标接入 网设备212从第一信息中确定的一个或多个目标网络切片已经默认为是终端设备220允许使用的网络切片。
在确定一个或多个目标网络切片后,目标接入网设备212可以在所确定的目标网络切片的基础上确定是否可以允许终端设备220的接入。例如,目标接入网设备212可以确定自身是否能够为终端设备220提供对目标网络切片S-NSSAI 1’和/或S-NSSAI 2’的接入,是否需要执行服务网络切片S-NSSAI 1到目标网络切片S-NSSAI 1’和/或S-NSSAI 2’的重映射,等等。目标接入网设备212对终端设备220的接入控制取决于自身的具体接入控制策略,本公开的实施例在此方面不受限制。
在一些实施例中,基于目标接入网设备212的接入控制的结果,在终端设备220、源接入设备210和目标接入网设备212之间执行后续的切换过程332。后续的切换过程332取决于具体通信要求,本公开的实施例在此方面不受限制。
在涉及切换的一些实施例中,终端设备220当前经由源接入网设备210接入到服务网络的网络切片,以获得该网络切片的通信服务。在一些实施例中,终端设备220的当前服务网络可以是终端设备220的受访网络。也就是说,终端设备220正在漫游。在其他实施例中,终端设备220的当前服务网络也可以是终端设备220的归属网络。在一些实施例中,终端设备220要接入的目标网络,要经由目标接入网设备212接入的目标网络是终端设备220的另一个受访网络。
以上仅描述了在切换场景中目标接入网设备212执行接入控制的一个具体示例。接入控制过程还可以包括其他不同的操作、更多的操作、或者上述一些操作可以被省略。无论目标接入网设备212执行接入控制的策略如何,指示不同网络的网络切片的关系的第一信息均有助于目标接入网设备212在不同条件下完成接入控制过程。
除切换场景之外,在其他示例中,目标接入网设备212还可以由其他事件触发对终端设备220的接入控制。在一个示例中,目标接入网设备212可以利用第一信息来执行对终端设备220的初始接入的控制。如图3所示,终端设备220向目标接入网设备212发送342初始接入请求,以请求注册到目标网络。目标接入网设备212接收344初始接入请求后,可以基于第一信息来执行320接入控制。例如,基于第一信息,目标接入网设备212可以确定是否允许终端设备220接入到目标网络以及如何实现终端设备220的接入,例如接入到目标网络的哪个网络切片,等等。
以上讨论了本公开的一些实施例。在这些实施例中,借助第一信息,目标接入网设备可以及时完成终端设备的接入控制,特别是在跨不同网络切换情况下的接入控制,避免了在跨网络切换的时延,降低了终端设备的业务中断的可能性,从而保证了终端设备的业务连续性。
以上参考图3描述了根据本公开的一些实施例的用于支持目标接入网设备对终端设备的接入控制的过程。下文的图4和图5分别示出了在图3的方式A和方式B中各个通信实体的信令交互的具体实现。图4和图5的实现涉及终端设备220在不同网络之间的切换场景,其中的一些消息/信令在上文中可能已经作为示例实施例被提及。应当理解,图4和图5仅为了解释说明与图3所示的信令交互过程有关的一些具体实现,而图3所示的信令交互过程还可以存在其他很多变形方式。
2.2基于方式A的示例实现
图4示出了在图3的方式A的实施例中各个通信实体的通信过程400的信令图。源接 入网设备210向核心网设备330传输402NG建立消息,目标接入网设备212也向核心网设备330传输406NG建立消息。因而核心网设备330接收404来自源接入网设备210和接收408来自目标接入网设备212的NG建立消息。注意,在传输NG建立消息时,终端设备220可能还没有或者也可能已经经由源接入网设备210接入服务网络,并且可能还没有或者可能已经触发终端设备220从服务网络到目标网络的切换。
每个NG建立消息包括的网络切片信息,该网络切片信息指示源接入网设备210或目标接入网设备212在某个TA范围内所支持的网络以及所支持的网络切片。例如,每个NG建立消息包括由TA码(TAC)标识的TA范围,以及该TA范围下的网络信息。该网络信息中包括一个或多个网络的标识,例如PLMN ID。此外,每个NG建立消息还包括每个网络在当前TA范围中支持的网络切片信息,也称为TA标识(TAI)切片支持信息。该网络切片信息包括支持的一个或多个网络切片的标识,例如S-NSSAI。
虽然未示出,但除源接入网设备210和目标接入网设备212外,核心网设备330还可以从其他接入网设备接收NG建立消息,以确定对应TA范围内所支持的网络和网络切片。当然,除了NG建立消息之外,核心网设备330还可以通过其他消息或信令来获知不同网络中支持的网络切片。
核心网设备330基于从接入网设备接收到的各个网络的网络切片信息,并且可能还基于在核心网侧所维护的各个网络的策略信息,来确定409要向接入网设备提供的第一信息。第一信息例如包括如以上在图3中参考方式A讨论的信息。
注意,虽然图4中示出核心网设备330基于接入网设备上报的网络切片信息来确定第一信息的示例实施例,但如以上提及的,在其他实施例中,核心网设备330可以被预先配置这样的第一信息。在第一信息被预先配置的实施例中,核心网设备330可以无需从接入网设备接收网络切片信息。
在确定第一信息后,核心网设备330向目标接入网设备212传输410第一信息。在一些实施例中,核心网设备330可以向同一TA范围内的多个接入网设备发送第一信息。第一信息例如可以被包括在NG建立响应中。
目标接入网设备212接收412来自核心网设备330的第一信息,从而可以在后续利用第一信息来执行接入控制。图4的示例示出了在切换场景下的接入控制。具体地,如果源接入网设备210确定要发起针对终端设备220的切换,例如确定要将终端设备220从当前服务网络(即第一网络)切换到不同的目标网络(即第二网络),源接入网设备210向目标接入网设备212传输416切换请求。
切换请求例如可以包括要被建立的PDU会话资源列表,其中包括终端设备220当前的PDU会话ID以及每个PDU会话对应的服务网络的标识和服务网络切片的标识。切换请求还可以包括移动性约束列表,其中指示要切换到的目标网络的标识。在一些实施例中,切换请求还包括以上讨论的第二信息,其指示终端设备220在一个或多个第二网络中允许使用的网络切片的标识。
响应于接收到418来自源接入网设备210的切换请求,目标接入网设备212执行420终端设备220到目标接入网设备212的接入控制。上文已经参考图3讨论的目标接入网设备212的接入控制的一些实施例,在此不再赘述。
在图4的示例中,假设目标接入网设备212确定允许终端设备220接入目标网络。目标接入网设备212向源接入网设备210传输422切换请求响应,该响应指示切换请求成功,允 许终端设备220从当前服务网络切换到目标网络。
在一些实施例中,目标接入网设备212还可以确定要将终端设备220的PDU会话从当前服务网络(例如由V1标识)的服务网络切片(例如由NSSAI 1标识)重新映射到目标网络(例如由V2标识)的目标网络切片(例如由NSSAI 2’标识)。目标网络切片的标识例如可以被携带在切换请求响应中。
在接收到424来自目标接入网设备212的切换请求响应之后,源接入网设备210向终端设备220传输426信息,以指示终端设备220的服务网络从当前网络切换到另一个不同的网络,即目标网络。这样的信息在本文中称为“第三信息”。由此,终端设备220可以快速获知切换成功以及要切换到的目标网络。在一些示例中,第三信息可以包括切换到的目标网络的标识。在一些实施例中,第三信息可以被包括在源接入网设备210向终端设备220传输的无线电资源控制(RRC)重配置消息(例如,RRCReconfiguration消息)中。
在接收428第三信息后,终端设备220使用430第三信息。第三信息在终端设备220处可以有多种的作用。在一些实施例中,由于第三信息的传输意味着目标接入网设备212确定允许终端设备220的切换,终端设备220可以执行到目标网络中的目标接入网设备的随机接入。在这种情况下,终端设备220可以基于第三信息来执行到目标接入网设备的随机接入。借助第三信息,终端设备220的随机接入成功的可能性可以得到提高。例如,目标接入网设备212支持多个网络,并且可以将可用的空口随机接入信道(RACH)资源集合按支持的网络进行划分。由于第三信息明确指示要切换的目标网络,终端设备220可以从RACH资源集合中确定被划分给目标网络的RACH资源,并且在所确定的RACH资源上向目标接入网设备212发起随机接入。通过利用与目标网络相关联的RACH资源,终端设备220的随机接入成功率可以提高。在一些实施例中,如果随机接入过程成功完成,终端设备220的服务网络将变为目标网络。终端设备220可以经由目标接入网设备212接入该目标网络,特别是接入到目标网络的目标网络切片。
除用于引导随机接入过程之外或者备选地,基于接收到的第三信息,终端设备220还可以显示目标网络的标识。所显示的目标网络的标识可以是PLMN或者可以是PLMN的网络运营商的名称等。这样,可以向终端设备220的用户通知服务网络的变化。
在一些实施例中,除第三信息外,源接入网设备210还可以向终端设备220传输另外的信息,以指示终端设备220要接入到目标网络中的具体目标网络切片,其中终端设备220的当前会话从由当前服务网络切片服务切换为由目标网络切片服务。这样的信息在本文中称为“第四信息”。在一些示例中,第四信息可以包括目标网络切片的标识。通过接收第四信息,终端设备220可以快速获知会话要被切换到的目标网络切片。在一些实施例中,第四信息可以被包括在源接入网设备210向终端设备220传输的RRC重配置消息中,例如第四信息可以与上述第三信息一起发送给终端设备220。
应当理解,以上讨论了目标接入网设备212执行接入控制后允许接入的示例。如果目标接入网设备212在执行接入控制后拒绝终端设备220的接入,目标接入网设备212、源接入网设备210和终端设备220之间的交互可能会不同。例如,在拒绝接入的情况下,源接入网设备210不会向终端设备220发送RRC重配置消息,并且终端设备220也不会执行到目标接入网设备212的随机接入。
2.3基于方式B的示例实现
图5示出了在图3的方式A的实施例中各个通信实体的通信过程500的信令图。
在初始,终端设备220当前经由源接入网设备210由源网络进行服务,即源网络是终端设备220当前的服务网络。终端设备220向源接入网设备210传输502会话建立请求,例如PDU会话建立请求。会话建立请求是一种非接入层(NAS)消息,可以用于请求建立针对某个类型的业务的会话,例如承载终端设备上的某个应用的业务的会话。会话建立请求可以携带终端设备220的服务网络的标识。在一些实施例中,会话建立请求还可以包括终端设备220为要建立的会话请求接入的网络切片的标识。
源接入网设备210接收到504的会话建立请求,向核心网设备330传输506针对终端设备220的会话建立请求。响应于接收到508会话建立请求,核心网设备330可以执行相应的会话建立过程。此外,核心网设备330确定要向源接入网设备210提供的第一信息。第一信息的确定如以上在图3中参考方式B讨论的信息。如以上描述的,在方式B中,第一信息特定于终端设备220,指示终端设备220的服务网络的一个或多个网络切片与一个或多个第二网络的网络切片的关系。在第一信息确定后,核心网设备330向源接入网设备210传输510会话资源建立请求,并在会话资源建立请求中携带所确定的第一信息。
源接入网设备210接收512来自核心网设备330的第一信息。第一信息可以在终端设备220要切换的情况下用于辅助实现终端设备220的接入控制。图5进一步示出了在切换场景下的接入控制的示例。具体地,如果源接入网设备210确定要发起针对终端设备220的切换,例如确定要将终端设备220从当前服务网络(即第一网络)切换到不同的目标网络(即第二网络),源接入网设备210向目标接入网设备212传输516切换请求。
在图5的示例中,除以上在图4的示例中提及的信息之外,切换请求还包括第一信息。被携带在切换请求中的第一信息可以是源接入网设备210从核心网设备330接收到的第一信息。在另一个示例中,切换请求可以包括从核心网设备330接收的第一信息的一部分,该部分信息指示服务网络的一个或多个网络切片与目标网络的一个或多个网络切片的关系,诸如重映射关系。
响应于接收到518来自源接入网设备210的切换请求,目标接入网设备212执行520终端设备220到目标接入网设备212的接入控制。上文已经参考图3讨论的目标接入网设备212的接入控制的一些实施例,在此不再赘述。
在图5的示例中还继续描述了在确定允许终端设备220接入目标网络的情况下,由目标接入网设备212、源接入网设备210和终端设备220处执行的操作,包括目标接入网设备212向源接入网设备210传输522切换请求响应;源接入网设备210接收524切换请求响应后向终端设备220传输526第三信息;终端设备220接收528第三信息,并且可以使用530第三信息。在一些实施例中,如果源接入网设备210在执行接入控制时确定要执行网络切片的重映射,源接入网设备210还可以向终端设备传输第四信息。过程500中从522至530的操作与过程400中从422至430的操作类似,在此不在赘述。
3.本公开的第二实现方式
根据本公开的一些实施例中,还提供了另外一种方案用于支持目标接入网设备对终端设备的接入控制。目标接入网设备获得终端设备在归属网络中的网络切片的切片标识信息,并且还获得切片对应性信息,其指示终端设备在受访网络的网络切片与归属网络的网络切片之间的对应性的信息。基于这样的切片标识信息和切片对应性信息来执行终端设备到目标接入 网设备的接入控制。以此方式,目标接入网设备能够执行对终端设备跨网络接入时的接入控制,特别是在终端设备要接入受访网络时的接入控制,降低接入时延,减少终端设备由于会话被拒而导致的业务中断问题,确保了终端设备的业务连续性。
下文将参考附图来具体讨论本公开的示例实施例。在图6中,各个通信实体,包括终端设备220、源接入网设备210、目标接入网设备212和核心网设备330的定义与上文参考图3所讨论的相同。
图6示出了根据本公开的一些实施例的通信过程600的信令交互图。在图6的实施例中,终端设备220要从当前的服务网络切换到目标接入网设备212所处的目标网络,并且该目标网络是终端设备220的受访网络(在本文中有时称为“第二受访网络”)。
在图6的实施例中,为了辅助目标接入网设备212执行针对终端设备220的接入控制,要向目标接入网设备212提供切片标识信息,以指示终端设备在归属网络(例如HPLMN)中的归属网络切片的标识,并且还要向目标接入网设备212提供切片对应性信息,以指示受访网络(例如VPLMN)的网络切片与终端设备220的归属网络的网络切片之间的对应性。切片对应性信息中所指示的受访网络指的是目标接入网设备212所处的目标网络。下文将具体讨论如何向目标接入网设备212提供这些信息。
源接入网设备210可以向目标接入网设备212提供上述切片标识信息。在一些情况下,源接入网设备210可能也处于终端设备220的受访网络(在本文中有时称为“第一受访网络”),即终端设备220正在漫游,其当前服务网络是受访网络。由于源接入网设备210处于终端设备220的受访网络,因而可能不具备与终端设备220的归属网络相关的上述切片标识信息。在这种情况下,源接入网设备210可以通过多种方式来获得所需要的切片标识信息,包括下文讨论的方式一和方式二。
在方式一中,如图6所示,终端设备220向源接入网设备210传输602切片标识信息,并且源接入网设备210接收604该切片标识信息。切片标识信息指示终端设备220在归属网络中的归属网络切片的标识。在此,归属网络切片指的是终端设备220的当前会话在归属网络中对应的网络切片。终端设备220通常具有关于归属网络的这样的信息。
在一些实施例中,切片标识信息可以包括归属网络切片的标识,例如S-NSSAI。在一些实施例中,切片标识信息中还承载归属网络的标识,以更清楚指示其中承载的切片标识信息是在归属网络中支持的标识信息。例如,切片标识信息可以被表示为H_S-NSSAI 1,其中H指示归属网络的标识,S-NSSAI 1指示归属网络切片的标识。在一些实施例中,切片标识信息可以被包括在会话建立请求中,例如被包括在PDU会话建立请求中。该会话建立请求可以作为NAS消息被传输给源接入网设备210。在其他实施例中,终端设备220还可以通过其他消息/信令向源接入网设备210传输切片标识信息。
在一些实施例中,切片标识信息还可以指示终端设备220在源网络(即当前的服务网络)中的网络切片的标识。服务网络中的网络切片指的是终端设备220经由源接入网设备210接入的服务网络的服务网络切片,该网络切片可以用于服务终端设备220的当前会话。例如,切片标识信息包括源网络的网络切片的标识,其可以被表示为V1_S-NSSAI 2,其V1指示服务网络,S-NSSAI 2指示在服务网络的服务网络切片。
在方式二中,由核心网设备330向源接入网设备210传输608切片标识信息,并且源接入网设备210接收610该切片标识信息。在一些实施例中,核心网设备330可以从核心网侧获知终端设备220在归属网络中的归属网络切片的标识。在一些实施例中,核心网设备330 在处理终端设备220的会话建立请求后,可以确定终端设备220在归属网络中的归属网络切片的标识。核心网设备330可以将切片标识信息承载在向源接入网设备210传输的会话资源建立请求。在其他实施例中,核心网设备330还可以通过其他消息/信令向源接入网设备210传输切片标识信息。
在过程600中,获得针对终端设备220的切片标识信息后,源接入网设备210向目标接入网设备212传输612该切片标识信息。在一些实施例中,源接入网设备210可以在确定要发起针对终端设备220的切换的情况下,向目标接入网设备212传输切片标识信息。该切片标识信息例如可以被包括在源接入网设备210发送给目标接入网设备212的切换请求中。除切片标识信息之外,如以上提及的,切换请求中还可以包括终端设备220的服务网络的标识、终端设备220在服务网络中接入的服务网络切片的标识以及终端设备220要切换到的目标网络的标识,等等。
目标接入网设备212接收到616切片标识信息。目标接入网设备212还可获得切片对应性信息,以指示目标接入网设备所处的受访网络的网络切片与终端设备220的归属网络的网络切片之间的对应性。两个网络中的两个网络切片的对应性指的是在两个网络中由不同标识指示的网络切片实际上彼此对应,即为同一网络切片。
之所以需要切片对应性信息,是因为可能在不同网络中,同一网络切片可能由不同的标识指示。由于目标接入网设备212处于终端设备220的受访网络,仅根据归属网络切片的标识信息,目标接入网设备212无法确定终端设备220的当前会话在受访网络中对应的网络切片。借助切片对应性信息,目标接入网设备212可以确定归属网络切片对应的受访网络中的网络切片。在一些情况中,切片对应性信息还可以称为网络切片的映射信息。
在图6中,核心网设备330向目标接入网设备212传输622这样的切片对应性信息。在一些实施例中,核心网设备330可以接收620到由目标接入网设备212传输618的对切片对应性信息的请求。该请求可以包括终端设备220的设备标识和要切换到的受访网络(即目标接入网设备212所处的网络,在切换时也称为目标网络)的标识(例如,PLMN ID)。在一些实施例中,请求还可以包括终端设备220的订阅永久标识符(SUPI)。
响应于来自目标接入网设备212的请求,核心网设备330向目标接入网设备212传输切片对应性信息。通过请求中携带的设备标识,核心网设备330可以确定终端设备220的归属网络。在一些实施例中,如果请求中还包括SUPI,核心网设备330可以更快确定归属网络。进一步地,通过请求中的受访网络的标识,核心网设备330可以确定对应的切片对应性信息。
在接收到624来自核心网设备330的切片对应性信息后,目标接入网设备212基于切片对应性信息和上文提及的切片标识信息,来执行626终端设备220到目标接入网设备212的接入控制,以确定是否允许终端设备220切换到目标接入网设备212所处的网络。
在一些实施例,在执行接入控制时,目标接入网设备212根据终端设备220的归属网络切片的标识(例如,H_S-NSSAI 1),以及切片对应性信息所指示的归属网络和受访网络的网络切片的对应性,确定终端设备220在归属网络切片在受访网络中对应的网络切片(称为“受访网络切片”)。受访网络切片例如可以被标识为V2_S-NSSAI 3,其中V2指示目标接入网设备212所处的受访网络的标识,S-NSSAI 3指示受访网络切片在该受访网络中的标识。
在确定受访网络切片后,目标接入网设备212可以基于自身对网络切片的支持能力,确定是否能够为终端设备220提供对该受访网络切片V2_S-NSSAI 3的接入。至少基于对受访网络切片的支持能力,目标接入网设备212确定是否允许终端设备220的接入。
在一些实施例中,在执行接入控制时,目标接入网设备212还确定所确定的受访网络切片是否可以被重映射到受访网络中的其他网络切片。这样以便于在不支持与归属网络切片直接对应的受访网络切片时,通过重映射来实现对终端设备220的接入的支持。
为了支持目标接入网设备212确定受访网络切片可重映射到的网络切片,在一些实施例中,核心网设备330还向目标接入网设备212提供另外的信息,以指示在归属网络中各个网络切片的关系,特别是指示归属网络中网络切片的重映射关系。这样的信息在本文中有时被称为“第五信息”或者称为归属网络内的网络切片的重映射策略信息。在一些实施例中,核心网设备330可以将第五信息可以与切片对应性信息一起或单独地传输给目标接入网设备212。
除切片标识信息和切片对应性信息之外,目标接入网设备212还基于第五信息来执行对终端设备220的接入控制。具体地,基于第五信息,目标接入网设备212可以确定终端设备220的当前归属网络切片H_S-NSSAI 1可重映射到的归属网络中的一个或多个网络切片,例如由H_S-NSSAI 3和H_S-NSSAI 4标识。进一步地,目标接入网设备212还基于切片对应性信息,确定归属网络中可重映射到的网络切片(例如,H_S-NSSAI 3和H_S-NSSAI 4)在目标接入网设备212所处的受访网络中是否存在对应的网络切片。如果存在对应的网络切片(例如,由V2_S-NSSAI 3’和V2_S-NSSAI 4’),受访网络切片V2_S-NSSAI 3也将可以重映射到受访网络中的网络切片。
通过上述过程,借助第五信息和切片对应性信息,目标接入网设备212可以执行对受访网络切片的可重映射网络切片的确定。
在执行接入控制时,目标接入网设备212可以基于对受访切片网络可重映射网络切片的确定,判断是否要执行网络切片的重映射,以便支持终端设备220的接入控制。
在图6的示例中还继续描述了在确定允许终端设备220接入目标接入网设备212的受访网络的情况下,由目标接入网设备212、源接入网设备210和终端设备220处执行的操作,包括目标接入网设备212向源接入网设备210传输628切换请求响应;源接入网设备210接收630切换请求响应后向终端设备220传输632第三信息;终端设备220接收634第三信息,并且使用636第三信息。在一些实施例中,如果源接入网设备210在执行接入控制时确定要执行网络切片的重映射,源接入网设备210还可以向终端设备传输第四信息。过程600中从628至636的操作与过程400中从422至430的操作类似,在此不在赘述。
以上讨论了本公开的一些实施例。在这些实施例中,通过源接入网设备、核心网设备、终端设备和目标接入网设备之间的交互,使目标接入网设备具有充足的信息用来及时完成终端设备的接入控制,特别是在跨不同网络切换情况下的接入控制,避免了在跨网络切换的时延,降低了终端设备的业务中断的可能性,从而保证了终端设备的业务连续性。
4.通信装置的实施例
4.1在第一实现方式中装置的实现方式
图7示出了根据本公开的一些实施例的被实现在目标接入网设备处的通信装置700的示意框图。通信装置700可以被实现为设备或者设备中的芯片,本公开的范围在此方面不受限制。通信装置700可以被实现为如图2至图5中示出的目标接入网设备212或者目标接入网设备212的一部分。
如图所示,通信装置700包括第一接收单元710,被配置为接收第一信息,第一信息指 示第一网络的第一网络切片与第二网络的第二网络切片的关系,第一网络和第二网络不同。通信装置700还包括接入控制单元720,被配置为至少基于第一信息来执行终端设备到目标接入网设备的接入控制。
在一些实施例中,第一信息包括第一网络的标识、第一网络切片的标识、第二网络的标识以及第二网络切片的标识。在一些实施例中,第一网络的标识和第二网络的标识包括第一网络和第二网络各自的公共陆地移动网络标识,并且第一网络切片的标识和第二网络切片的标识包括第一网络切片和第二网络切片各自的单网络切片选择辅助信息。
在一些实施例中,第一信息是用于第一网络切片和第二网络切片的重映射策略信息。
在一些实施例中,第一接收单元710还被配置为接收来自核心网设备的第一信息。在一些实施例中,第一网络和第二网络处于相同的跟踪区范围。
在一些实施例中,第一信息被包括在NG建立响应中。
在一些实施例中,通信装置700还包括:第二接收单元(未示出),被配置为接收来自源接入网设备的第二信息,第二信息包括终端设备在第二网络中允许使用的第三网络切片的标识。在一些实施例中,接入控制单元720还被配置为基于第一信息和第二信息来执行接入控制。
在一些实施例中,第一接收单元710还被配置为:接收来自源接入网设备的针对终端设备的第一信息,第一网络是终端设备的服务网络。
在一些实施例中,第二网络包括终端设备的目标网络。
在一些实施例中,第一信息被包括在针对终端设备的切换请求中。
在一些实施例中,接入控制单元720还被配置为:目标接入网设备确定终端设备的服务网络的标识、服务网络的服务网络切片的标识和终端设备的目标网络的标识;目标接入网设备基于服务网络的标识、服务网络切片的标识和目标网络的标识,从第一信息确定目标网络中与服务网络切片有关的目标网络切片;以及目标接入网设备基于对目标网络切片的确定来执行接入控制。
图8示出了根据本公开的一些实施例的被实现在源接入网设备处的通信装置800的示意框图。通信装置800可以被实现为设备或者设备中的芯片,本公开的范围在此方面不受限制。通信装置800可以被实现为如图2至图5中示出的源接入网设备210或者源接入网设备210的一部分。
如图所示,通信装置800包括接收单元810,被配置为接收来自核心网设备的针对终端设备的第一信息,第一信息指示第一网络的第一网络切片与第二网络的第二网络切片的关系,第一网络是终端设备的服务网络,第一网络和第二网络不同。通信装置800还包括第一传输单元820,被配置为向目标接入网设备传输第一信息。
在一些实施例中,第一信息包括第一网络的标识、第一网络切片的标识、第二网络的标识以及第二网络切片的标识。在一些实施例中,第一网络的标识和第二网络的标识包括第一网络和第二网络各自的公共陆地移动网络标识,并且第一网络切片的标识和第二网络切片的标识包括第一网络切片和第二网络切片各自的单网络切片选择辅助信息。
在一些实施例中,第一信息是用于第一网络切片和第二网络切片的重映射策略信息。
在一些实施例中,第二网络包括终端设备的目标网络。
在一些实施例中,第一信息被包括在针对终端设备的切换请求中。
在一些实施例中,通信装置800还包括:第二传输单元(未示出),被配置为在终端设 备到目标接入网设备的接入被允许的情况下,向终端设备传输第三信息,第三信息指示终端设备的服务网络从第一网络切换到第二网络。
在一些实施例中,第三信息包括第二网络的标识。
在一些实施例中,第三信息被包括在无线电资源控制重配置消息中。
在一些实施例中,通信装置800还包括:第三传输单元(未示出),被配置为如果终端设备到目标接入网设备的接入被允许,向终端设备传输第四信息,第四信息指示终端设备的会话被改变为由第二网络的第二网络切片服务。
图9示出了根据本公开的一些实施例的被实现在终端设备处的通信装置900的示意框图。通信装置900可以被实现为设备或者设备中的芯片,本公开的范围在此方面不受限制。通信装置900可以被实现为如图2至图5中示出的终端设备220或者终端设备220的一部分。
如图所示,通信装置900包括第一接收单元910,被配置为接收来自源接入网设备的第三信息。第三信息指示终端设备的服务网络从第一网络切换到第二网络,并且第一网络和第二网络不同。通信装置900还包括信息使用单元920,被配置为使用第三信息。
在一些实施例中,信息使用单元920被配置为基于第三信息执行到第二网络中的目标接入网设备的随机接入。在一些实施例中,信息使用单元920被配置为基于第三信息显示第二网络的标识。
在一些实施例中,第三信息包括第二网络的标识。
在一些实施例中,第三信息被包括在无线电资源控制重配置消息中。
在一些实施例中,通信装置900还包括第二接收单元(未示出),被配置为如果终端设备到目标接入网设备的接入被允许,接收来自源接入网设备的第四信息。第四信息指示终端设备的会话被改变为由第二网络的第二网络切片服务。
图10示出了根据本公开的一些实施例的被实现在核心网设备处的通信装置1000的示意框图。通信装置1000可以被实现为设备或者设备中的芯片,本公开的范围在此方面不受限制。通信装置1000可以被实现为如图2至图5中示出的核心网设备330或者核心网设备330的一部分。核心网设备330例如包括AMF 230和/或其他核心网的网络功能。
如图所示,通信装置1000包括确定单元1010,被配置为确定第一信息,第一信息指示第一网络的第一网络切片与第二网络的第二网络切片的关系,第一网络和第二网络不同。通信装置1000还包括传输单元1020,被配置为向接入网设备传输第一信息,以用于接入网设备执行终端设备到接入网设备的接入控制。
在一些实施例中,第一信息包括第一网络的标识、第一网络切片的标识、第二网络的标识以及第二网络切片的标识。在一些实施例中,第一网络的标识和第二网络的标识包括第一网络和第二网络各自的公共陆地移动网络标识,并且第一网络切片的标识和第二网络切片的标识包括第一网络切片和第二网络切片各自的单网络切片选择辅助信息。
在一些实施例中,第一信息是用于第一网络切片和第二网络切片的重映射策略信息。
在一些实施例中,第一网络是终端设备的服务网络,并且终端设备经由接入网设备由第一网络服务。在一些实施例中,第二网络包括终端设备的目标网络。
在一些实施例中,第一网络和第二网络处于相同的跟踪区范围。
在一些实施例中,第一信息被包括在NG建立响应中。
4.2在第二实现方式中装置的实现方式
图11示出了根据本公开的一些实施例的在目标接入网设备处的通信装置1100的示意框图。通信装置1100可以被实现为设备或者设备中的芯片,本公开的范围在此方面不受限制。通信装置1100可以被实现为如图2和图6中示出的目标接入网设备212或者目标接入网设备212的一部分。
如图所示,通信装置1100包括第一接收单元1110,被配置为接收来自源接入网设备的切片标识信息,切片标识信息指示终端设备在归属网络中的归属网络切片的标识,目标接入网设备处于终端设备的受访网络。通信装置1100还包括第二接收单元1120,被配置为接收来自核心网设备的切片对应性信息,切片对应性信息指示受访网络的网络切片与归属网络的网络切片之间的对应性。通信装置1100还包括接入控制单元1130,被配置为至少基于切片标识信息和切片对应性信息来执行终端设备到目标接入网设备的接入控制。
在一些实施例中,通信装置1100还包括:传输单元(未示出),被配置为向核心网设备传输对网络切片对应性信息的请求,请求至少包括终端设备的设备标识和受访网络的标识。在一些实施例中,第一接收单元1110还被配置为:从核心网设备接收针对请求的响应,以及从响应获取网络切片对应性信息。
在一些实施例中,通信装置1100还包括第三接收单元(未示出),被配置为接收来自核心网设备的针对归属网络的第五信息,第五信息指示归属网络切片与归属网络的另外的网络切片的关系。在一些实施例中,接入控制单元1130还被配置为:基于切片标识信息、网络切片对应性信息以及第五信息来执行接入控制。
图12示出了根据本公开的一些实施例的在源接入网设备处的通信装置1200的示意框图。通信装置1200可以被实现为设备或者设备中的芯片,本公开的范围在此方面不受限制。通信装置1200可以被实现为如图2和图6中示出的源接入网设备210或者源接入网设备210的一部分。
如图所示,通信装置1200包括接收单元1210,被配置为接收针对终端设备的切片标识信息,切片标识信息指示终端设备在归属网络中的归属网络切片的标识,源接入网设备处于终端设备的第一受访网络。通信装置1200还包括传输单元1220,被配置为向终端设备要切换到的目标接入网设备传输切片标识信息,目标接入网设备处于终端设备的第二受访网络。
在一些实施例中,接收单元还被配置为:源接入网设备从终端设备或从核心网设备接收切片标识信息。
在一些实施例中,切片标识信息被包括从终端设备接收到的会话建立请求中。
在一些实施例中,切片标识信息被包括从核心网设备接收到的针对终端设备的会话资源设置请求中。
图13示出了根据本公开的一些实施例的在终端设备处的通信装置1300的示意框图。通信装置1300可以被实现为设备或者设备中的芯片,本公开的范围在此方面不受限制。通信装置1300可以被实现为如图2和图6中示出的终端设备220或者终端设备220的一部分。
如图所示,通信装置1300包括传输单元1310,被配置为传输切片标识信息,切片标识信息指示终端设备在归属网络中的归属网络切片的标识。在这些实施例中,源接入网设备处于终端设备的第一受访网络。通信装置1300还包括第一接收单元1320,被配置为接收来自源接入网设备的第三信息,第三信息指示终端设备的服务网络从第一受访网络切换到第二受访网络,第一受访网络和第二受访网络不同。
在一些实施例中,传输单元1310还被配置为在会话建立请求中向源接入网设备传输切 片标识信息。
在一些实施例中,通信装置1300还包括信息使用单元(未示出),被配置为使用第三信息。在一些实施例中,信息使用单元还被配置为基于第三信息,执行到第二受访网络的目标接入网设备的随机接入。在一些实施例中,信息使用单元还被配置为基于第三信息显示第二受访网络的标识。
在一些实施例中,第三信息包括第二受访网络的标识。
在一些实施例中,第三信息被包括在无线电资源控制重配置消息中。
在一些实施例中,通信装置1300还包括第二接收单元(未示出),被配置为如果终端设备到目标接入网设备的接入被允许,接收来自源接入网设备的第四信息,第四信息指示终端设备的会话被改变为由第二受访网络的第二受访网络切片服务。
5.设备的实施例
图14是适合于实现本公开的实施例的示例设备1400的简化框图。设备1400可以用于实现如图2所示的终端设备、接入网设备以及一个或多个核心网设备/网络功能。如图所示,设备1400包括一个或多个处理器1410,耦合到处理器1410的一个或多个存储器1420,以及耦合到处理器1410的通信模块1440。
通信模块1440可以用于双向通信。通信模块1440可以具有用于通信的至少一个通信接口。通信接口可以包括与其他设备通信所必需的任何接口。
处理器1410可以是适合于本地技术网络的任何类型,并且可以包括但不限于以下至少一种:通用计算机、专用计算机、微控制器、数字信号控制器(DSP)、或基于控制器的多核控制器架构中的一个或多个。设备1400可以具有多个处理器,例如专用集成电路芯片,其在时间上从属于与主处理器同步的时钟。
存储器1420可以包括一个或多个非易失性存储器和一个或多个易失性存储器。非易失性存储器的示例包括但不限于以下至少一种:只读存储器(ROM)1424、可擦除可编程只读存储器(EPROM)、闪存、硬盘、光盘(CD)、数字视频盘(DVD)或其他磁存储和/或光存储。易失性存储器的示例包括但不限于以下至少一种:随机存取存储器(RAM)1422、或不会在断电持续时间中持续的其他易失性存储器。
计算机程序1430包括由关联处理器1410执行的计算机可执行指令。程序1430可以存储在ROM 1420中。处理器1410可以通过将程序1430加载到RAM 1420中来执行任何合适的动作和处理。
可以借助于程序1430来实现本公开的实施例,使得设备1400可以执行如参考图3至图6中所讨论的任何过程。本公开的实施例还可以通过硬件或通过软件和硬件的组合来实现。
在一些实施例中,程序1430可以有形地包含在计算机可读介质中,该计算机可读介质可以包括在设备1400中(诸如在存储器1420中)或者可以由设备1400访问的其他存储设备。可以将程序1430从计算机可读介质加载到RAM 1422以供执行。计算机可读介质可以包括任何类型的有形非易失性存储器,例如ROM、EPROM、闪存、硬盘、CD、DVD等。
通常,本公开的各种实施例可以以硬件或专用电路、软件、逻辑或其任何组合来实现。一些方面可以用硬件实现,而其他方面可以用固件或软件实现,其可以由控制器,微处理器或其他计算设备执行。虽然本公开的实施例的各个方面被示出并描述为框图,流程图或使用一些其他图示表示,但是应当理解,本文描述的框,装置、系统、技术或方法可以实现为, 如非限制性示例,硬件、软件、固件、专用电路或逻辑、通用硬件或控制器或其他计算设备,或其某种组合。
本公开还提供有形地存储在非暂时性计算机可读存储介质上的至少一个计算机程序产品。该计算机程序产品包括计算机可执行指令,例如包括在程序模块中的指令,其在目标的真实或虚拟处理器上的设备中执行,以执行如上参考图3至图6所述的过程/方法。通常,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、库、对象、类、组件、数据结构等。在各种实施例中,可以根据需要在程序模块之间组合或分割程序模块的功能。用于程序模块的机器可执行指令可以在本地或分布式设备内执行。在分布式设备中,程序模块可以位于本地和远程存储介质中。
用于实现本公开的方法的计算机程序代码可以用一种或多种编程语言编写。这些计算机程序代码可以提供给通用计算机、专用计算机或其他可编程的数据处理装置的处理器,使得程序代码在被计算机或其他可编程的数据处理装置执行的时候,引起在流程图和/或框图中规定的功能/操作被实施。程序代码可以完全在计算机上、部分在计算机上、作为独立的软件包、部分在计算机上且部分在远程计算机上或完全在远程计算机或服务器上执行。
在本公开的上下文中,计算机程序代码或者相关数据可以由任意适当载体承载,以使得设备、装置或者处理器能够执行上文描述的各种处理和操作。载体的示例包括信号、计算机可读介质、等等。信号的示例可以包括电、光、无线电、声音或其它形式的传播信号,诸如载波、红外信号等。
计算机可读介质可以是包含或存储用于或有关于指令执行系统、装置或设备的程序的任何有形介质。计算机可读介质可以是计算机可读信号介质或计算机可读存储介质。计算机可读介质可以包括但不限于电子的、磁的、光学的、电磁的、红外的或半导体系统、装置或设备,或其任意合适的组合。计算机可读存储介质的更详细示例包括带有一根或多根导线的电气连接、便携式计算机磁盘、硬盘、随机存储存取器(RAM)、只读存储器(ROM)、可擦除可编程只读存储器(EPROM或闪存)、光存储设备、磁存储设备,或其任意合适的组合。
此外,尽管在附图中以特定顺序描述了本公开的方法的操作,但是这并非要求或者暗示必须按照该特定顺序来执行这些操作,或是必须执行全部所示的操作才能实现期望的结果。相反,流程图中描绘的步骤可以改变执行顺序。附加地或备选地,可以省略某些步骤,将多个步骤组合为一个步骤执行,和/或将一个步骤分解为多个步骤执行。还应当注意,根据本公开的两个或更多装置的特征和功能可以在一个装置中具体化。反之,上文描述的一个装置的特征和功能可以进一步划分为由多个装置来具体化。
以上已经描述了本公开的各实现,上述说明是示例性的,并非穷尽的,并且也不限于所公开的各实现。在不偏离所说明的各实现的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。本文中所用术语的选择,旨在很好地解释各实现的原理、实际应用或对市场中的技术的改进,或者使本技术领域的其他普通技术人员能理解本文公开的各个实现方式。

Claims (30)

  1. 一种通信方法,包括:
    目标接入网设备接收第一信息,所述第一信息指示第一网络的第一网络切片与第二网络的第二网络切片的关系,所述第一网络和所述第二网络不同;以及
    所述目标接入网设备至少基于所述第一信息来执行终端设备到所述目标接入网设备的接入控制。
  2. 根据权利要求1所述的通信方法,其中所述第一信息包括所述第一网络的标识、所述第一网络切片的标识、所述第二网络的标识以及所述第二网络切片的标识。
  3. 根据权利要求2所述的通信方法,其中所述第一网络的所述标识和所述第二网络的所述标识包括所述第一网络和所述第二网络各自的公共陆地移动网络标识,并且
    其中所述第一网络切片的所述标识和所述第二网络切片的所述标识包括所述第一网络切片和所述第二网络切片各自的单网络切片选择辅助信息。
  4. 根据权利要求1至3中任一项所述的通信方法,其中接收所述第一信息包括:
    所述目标接入网设备接收来自核心网设备的所述第一信息。
  5. 根据权利要求4所述的通信方法,还包括:
    所述目标接入网设备接收来自源接入网设备的第二信息,所述第二信息包括所述终端设备在所述第二网络中允许使用的第三网络切片的标识;并且
    其中至少基于所述第一信息来执行所述接入控制包括:所述目标接入网设备基于所述第一信息和所述第二信息来执行所述接入控制。
  6. 根据权利要求1至3中任一项所述的通信方法,其中接收所述第一信息包括:
    所述目标接入网设备接收来自源接入网设备的针对所述终端设备的所述第一信息,所述第一网络是所述终端设备的服务网络。
  7. 根据权利要求6所述的通信方法,其中所述第二网络包括所述终端设备的目标网络。
  8. 一种通信方法,包括:
    源接入网设备接收来自核心网设备的针对终端设备的第一信息,所述第一信息指示第一网络的第一网络切片与第二网络的第二网络切片的关系,所述第一网络是所述终端设备的服务网络,所述第一网络和所述第二网络不同;以及
    所述源接入网设备向目标接入网设备传输所述第一信息。
  9. 根据权利要求8所述的通信方法,其中所述第一信息包括所述第一网络的标识、所述第一网络切片的标识、所述第二网络的标识以及所述第二网络切片的标识。
  10. 根据权利要求9所述的通信方法,其中所述第一网络的所述标识和所述第二网络的所述标识包括所述第一网络和所述第二网络各自的公共陆地移动网络标识,并且
    其中所述第一网络切片的所述标识和所述第二网络切片的所述标识包括所述第一网络切片和所述第二网络切片各自的单网络切片选择辅助信息。
  11. 根据权利要求8所述的通信方法,还包括:
    如果所述终端设备到所述目标接入网设备的接入被允许,所述源接入网设备向所述终端设备传输第三信息,所述第三信息指示所述终端设备的所述服务网络从所述第一网络切换到所述第二网络。
  12. 根据权利要求11所述的通信方法,其中所述第三信息包括所述第二网络的标识。
  13. 一种通信方法,包括:
    核心网设备确定第一信息,所述第一信息指示第一网络的第一网络切片与第二网络的第二网络切片的关系,所述第一网络和所述第二网络不同;以及
    所述核心网设备向接入网设备传输所述第一信息,以用于终端设备到所述接入网设备的接入控制。
  14. 根据权利要求13所述的通信方法,其中所述第一信息包括所述第一网络的标识、所述第一网络切片的标识、所述第二网络的标识以及所述第二网络切片的标识。
  15. 根据权利要求13所述的通信方法,其中所述第一网络的所述标识和所述第二网络的所述标识包括所述第一网络和所述第二网络各自的公共陆地移动网络标识,并且
    其中所述第一网络切片的所述标识和所述第二网络切片的所述标识包括所述第一网络切片和所述第二网络切片各自的单网络切片选择辅助信息。
  16. 根据权利要求13至15中任一项所述的通信方法,其中所述第一网络是所述终端设备的服务网络,并且所述终端设备经由所述接入网设备由所述第一网络服务;并且
    其中所述第二网络包括所述终端设备的目标网络。
  17. 一种被实现在目标接入网设备处的通信装置,包括:
    第一接收单元,被配置为接收第一信息,所述第一信息指示第一网络的第一网络切片与第二网络的第二网络切片的关系,所述第一网络和所述第二网络不同;以及
    接入控制单元,被配置为至少基于所述第一信息来执行终端设备到所述目标接入网设备的接入控制。
  18. 根据权利要求17所述的通信装置,其中所述第一接收单元还被配置为接收来自核心网设备的所述第一信息。
  19. 根据权利要求18所述的通信装置,还包括:
    第二接收单元,被配置为接收来自源接入网设备的第二信息,所述第二信息包括所述终端设备在所述第二网络中允许使用的第三网络切片的标识;并且
    其中所述接入控制单元还被配置为基于所述第一信息和所述第二信息来执行所述接入控制。
  20. 根据权利要求17至19中任一项所述的通信装置,其中所述第一接收单元还被配置为:
    接收来自源接入网设备的针对所述终端设备的所述第一信息,所述第一网络是所述终端设备的服务网络。
  21. 根据权利要求20所述的通信装置,其中所述第二网络包括所述终端设备的目标网络。
  22. 一种被实现在源接入网设备处的通信装置,包括:
    接收单元,被配置为接收来自核心网设备的针对终端设备的第一信息,所述第一信息指示第一网络的第一网络切片与第二网络的第二网络切片的关系,所述第一网络是所述终端设备的服务网络,所述第一网络和所述第二网络不同;以及
    第一传输单元,被配置为向目标接入网设备传输所述第一信息。
  23. 根据权利要求22所述的通信装置,还包括:
    第二传输单元,被配置为在所述终端设备到所述目标接入网设备的接入被允许的情况下,向所述终端设备传输第三信息,所述第三信息指示所述终端设备的所述服务网络从所述第一网络切换到所述第二网络。
  24. 根据权利要求23所述的通信装置,其中所述第三信息包括所述第二网络的标识。
  25. 一种被实现在核心网设备处的通信装置,包括:
    确定单元,被配置为确定第一信息,所述第一信息指示第一网络的第一网络切片与第二网络的第二网络切片的关系,所述第一网络和所述第二网络不同;以及
    传输单元,被配置为向接入网设备传输所述第一信息,以用于终端设备到所述接入网设备的接入控制。
  26. 根据权利要求25所述的通信装置,其中所述第一网络是所述终端设备的服务网络,并且所述终端设备经由所述接入网设备由所述第一网络服务;并且
    其中所述第二网络包括所述终端设备的目标网络。
  27. 根据权利要求17、22和25中任一项所述的通信装置,其中所述第一信息包括所述第一网络的标识、所述第一网络切片的标识、所述第二网络的标识以及所述第二网络切片的标识。
  28. 根据权利要求27所述的通信装置,其中所述第一网络的所述标识和所述第二网络的所述标识包括所述第一网络和所述第二网络各自的公共陆地移动网络标识,并且
    其中所述第一网络切片的所述标识和所述第二网络切片的所述标识包括所述第一网络切片和所述第二网络切片各自的单网络切片选择辅助信息。
  29. 一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现根据权利要求1至7中任一项,权利要求8至12中任一项,或权利要求13至16中任一项的方法所述的操作。
  30. 一种芯片,被配置为执行根据权利要求1至7中任一项,权利要求8至12中任一项,或权利要求13至16中任一项的方法所述的操作。
PCT/CN2021/096340 2020-06-03 2021-05-27 通信方法以及相关联的通信装置、介质和芯片 WO2021244389A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP21818827.4A EP4152829A4 (en) 2020-06-03 2021-05-27 COMMUNICATION METHOD AND ASSOCIATED COMMUNICATION DEVICE AS WELL AS MEDIUM AND CHIP
US18/073,842 US20230094040A1 (en) 2020-06-03 2022-12-02 Communication method, and associated communication apparatus, medium, and chip

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010496861.9A CN113766581A (zh) 2020-06-03 2020-06-03 通信方法以及相关联的通信装置、介质和芯片
CN202010496861.9 2020-06-03

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/073,842 Continuation US20230094040A1 (en) 2020-06-03 2022-12-02 Communication method, and associated communication apparatus, medium, and chip

Publications (1)

Publication Number Publication Date
WO2021244389A1 true WO2021244389A1 (zh) 2021-12-09

Family

ID=78783487

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/096340 WO2021244389A1 (zh) 2020-06-03 2021-05-27 通信方法以及相关联的通信装置、介质和芯片

Country Status (4)

Country Link
US (1) US20230094040A1 (zh)
EP (1) EP4152829A4 (zh)
CN (1) CN113766581A (zh)
WO (1) WO2021244389A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114258154B (zh) * 2021-12-30 2023-05-12 中国联合网络通信集团有限公司 会话方法、终端及会话功能实体设备
CN117412387A (zh) * 2022-07-05 2024-01-16 华为技术有限公司 通信方法与通信装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107820291A (zh) * 2016-09-12 2018-03-20 华为技术有限公司 网络切片控制方法及相关设备
WO2018082221A1 (zh) * 2016-11-04 2018-05-11 华为技术有限公司 一种网络切换方法、装置及相关设备
CN108616959A (zh) * 2017-01-06 2018-10-02 华为技术有限公司 一种通信方法、接入网设备、核心网设备和用户设备
CN110603854A (zh) * 2017-05-08 2019-12-20 摩托罗拉移动有限责任公司 重新配置数据连接的方法和设备

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110419240B (zh) * 2017-03-24 2023-09-29 华为技术有限公司 切片兼容的切换控制设备和方法
EP4376495A3 (en) * 2017-03-31 2024-09-04 ZTE Corporation Method and apparatus for session management function selection
WO2018205150A1 (zh) * 2017-05-09 2018-11-15 华为技术有限公司 网络切片选择策略更新方法、及装置
CN109168180B (zh) * 2017-08-11 2020-03-10 华为技术有限公司 通信方法及源基站、目标基站、核心网设备、终端设备
CN109803336B (zh) * 2017-11-17 2024-04-12 华为技术有限公司 会话建立方法和装置
KR20240116587A (ko) * 2017-12-22 2024-07-29 레노보 (싱가포르) 피티이. 엘티디. 네트워크 슬라이스 선택 보조 정보 구성
CN110838927B (zh) * 2018-08-15 2023-01-03 中国移动通信有限公司研究院 切片映射重映射方法及接入网网元

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107820291A (zh) * 2016-09-12 2018-03-20 华为技术有限公司 网络切片控制方法及相关设备
WO2018082221A1 (zh) * 2016-11-04 2018-05-11 华为技术有限公司 一种网络切换方法、装置及相关设备
CN108616959A (zh) * 2017-01-06 2018-10-02 华为技术有限公司 一种通信方法、接入网设备、核心网设备和用户设备
CN110603854A (zh) * 2017-05-08 2019-12-20 摩托罗拉移动有限责任公司 重新配置数据连接的方法和设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4152829A4

Also Published As

Publication number Publication date
EP4152829A4 (en) 2023-11-15
EP4152829A1 (en) 2023-03-22
US20230094040A1 (en) 2023-03-30
CN113766581A (zh) 2021-12-07

Similar Documents

Publication Publication Date Title
US11160015B2 (en) Isolated network slice selection
CN112055983B (zh) 互通方法、用于互通的设备和计算机可读存储介质
US11564271B2 (en) User equipment category signaling in an LTE-5G configuration
WO2019157942A1 (zh) 通信方法和通信装置
JP2021052409A (ja) ネットワークスライシングを実装する5gネットワークにrrc手順を適合させる通信システムおよび方法
CN109756951B (zh) 用于网络选择的方法和用户设备
WO2023280121A1 (zh) 一种获取边缘服务的方法和装置
WO2021057794A1 (zh) 配置业务的方法、通信装置和通信系统
US20230094040A1 (en) Communication method, and associated communication apparatus, medium, and chip
WO2019199311A1 (en) Qos and home routed roaming
WO2021068830A1 (zh) 用于多播传输的方法和装置
JP2022546669A (ja) アクセスネットワークノード、ユーザ機器、ネットワーク機能ノードおよび制御方法
JP2022541184A (ja) 互換性のないネットワークスライスのサポートと管理
KR102243263B1 (ko) 가상 랜 게이트웨이 시스템, 제어 평면 게이트웨이의 동작 방법 및 mme의 동작 방법
US20230180157A1 (en) Apparatus, Method and Computer Program
CN114514764B (zh) 设备、方法和计算机程序
WO2021087996A1 (zh) 通信方法和通信装置
EP4410017A1 (en) Method, apparatus and computer program
WO2022113370A1 (ja) ネットワークノード及び通信方法
CN113329392B (zh) 家庭网关接入网络的方法和通信装置
WO2023185295A1 (zh) 通信方法及终端设备、核心网设备
EP4322581A1 (en) Method and apparatus to control network slices requested by a user equipment
WO2023123218A1 (zh) 网络切片的请求方法、设备、存储介质及程序产品
WO2022237898A1 (zh) 用于在线签约的方法、通信装置、介质及芯片
WO2023220998A1 (zh) 无线通信的方法、用户设备及网络设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21818827

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2021818827

Country of ref document: EP

Effective date: 20221215

NENP Non-entry into the national phase

Ref country code: DE