WO2021244585A1 - 制定背景数据传输策略的方法、装置及系统 - Google Patents
制定背景数据传输策略的方法、装置及系统 Download PDFInfo
- Publication number
- WO2021244585A1 WO2021244585A1 PCT/CN2021/098005 CN2021098005W WO2021244585A1 WO 2021244585 A1 WO2021244585 A1 WO 2021244585A1 CN 2021098005 W CN2021098005 W CN 2021098005W WO 2021244585 A1 WO2021244585 A1 WO 2021244585A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network element
- data transmission
- background data
- transmission strategy
- decision information
- Prior art date
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 1148
- 238000000034 method Methods 0.000 title claims abstract description 196
- 238000004891 communication Methods 0.000 claims abstract description 181
- 238000007726 management method Methods 0.000 claims description 110
- 230000006870 function Effects 0.000 claims description 78
- 239000000203 mixture Substances 0.000 claims description 76
- 238000009472 formulation Methods 0.000 claims description 69
- 238000012217 deletion Methods 0.000 claims description 48
- 230000037430 deletion Effects 0.000 claims description 48
- 230000015654 memory Effects 0.000 claims description 29
- 238000012545 processing Methods 0.000 claims description 29
- 238000004590 computer program Methods 0.000 claims description 15
- 238000013523 data management Methods 0.000 claims description 11
- 230000001934 delay Effects 0.000 claims description 10
- 238000013473 artificial intelligence Methods 0.000 abstract 1
- 230000006855 networking Effects 0.000 abstract 1
- 238000013461 design Methods 0.000 description 102
- 101150099374 PCF2 gene Proteins 0.000 description 94
- 101100206190 Arabidopsis thaliana TCP20 gene Proteins 0.000 description 80
- 101100082494 Oryza sativa subsp. japonica PCF1 gene Proteins 0.000 description 80
- 101100045761 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) TFC4 gene Proteins 0.000 description 80
- 230000004044 response Effects 0.000 description 40
- 230000008569 process Effects 0.000 description 32
- 238000012790 confirmation Methods 0.000 description 18
- 238000010586 diagram Methods 0.000 description 14
- 230000008859 change Effects 0.000 description 11
- 238000013475 authorization Methods 0.000 description 8
- 238000012546 transfer Methods 0.000 description 6
- 230000009471 action Effects 0.000 description 5
- 238000011161 development Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000001960 triggered effect Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000003111 delayed effect Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000008054 signal transmission Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 238000012517 data analytics Methods 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 239000013020 final formulation Substances 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/80—Actions related to the user profile or the type of traffic
- H04L47/803—Application aware
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
- H04L12/1403—Architecture for metering, charging or billing
- H04L12/1407—Policy-and-charging control [PCC] architecture
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/82—Miscellaneous aspects
- H04L47/826—Involving periods of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/82—Miscellaneous aspects
- H04L47/828—Allocation of resources per group of connections, e.g. per group of users
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/66—Policy and charging system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/80—Rating or billing plans; Tariff determination aspects
- H04M15/8016—Rating or billing plans; Tariff determination aspects based on quality of service [QoS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/80—Rating or billing plans; Tariff determination aspects
- H04M15/8083—Rating or billing plans; Tariff determination aspects involving reduced rates or discounts, e.g. time-of-day reductions or volume discounts
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/24—Accounting or billing
Definitions
- the embodiments of the present application relate to the field of communication technology, and in particular, to a method, device, and system for formulating a background data transmission strategy.
- network-side devices provide functions such as policy control, application detection and service awareness, billing control, usage control, and traffic guidance for user service access. , Provides quality of service (QoS) guarantees, sponsored data services, and background data transmission strategy negotiation for third-party applications.
- QoS quality of service
- the network side device When the network side device provides the background data transmission strategy negotiation function for third-party applications, the network side device obtains all existing background data transmission strategies, and determines candidate background data transmission strategies based on all the acquired background data transmission strategies and other information , The third-party application server selects a background data transmission strategy from the candidate background data transmission strategies as its own background data transmission strategy to perform background data transmission.
- the background data transmission strategy that other network-side devices are developing for other third-party application servers is not taken into consideration.
- the established background data transmission strategy may not be optimal, which affects the normal transmission of background data.
- the network-side device executes the strategy in accordance with the background data transmission strategy, it does not consider that the background data transmission strategy may be being modified by other network-side devices, resulting in an error in executing the background data transmission strategy.
- the embodiments of the present application provide a method, device, and system for formulating a background data transmission strategy to solve the problem of conflicts between multiple policy control network elements when formulating a background data transmission strategy.
- an embodiment of the present application provides a method for formulating a background data transmission strategy.
- the method may include: a first policy control network element sends to the first network element a request for storing a background data transmission strategy stored by the first network element.
- the first message is to obtain from the first network element the background data transmission strategy saved by the first network element and the second decision information used to formulate the second background data transmission strategy, according to the first decision information used to formulate the first background data transmission strategy ,
- the second decision information and the background data transmission strategy saved by the first network element formulate the first background data transmission strategy.
- the strategy control network element when the strategy control network element formulates the background data transmission strategy, it refers to the existing background data transmission strategy and other strategy control network elements are making the decision information corresponding to the background data transmission strategy to avoid the background data transmission strategy.
- the data transmission strategy conflicts with the background data transmission strategy formulated by other strategy control network elements to ensure the availability of the background data transmission strategy.
- the first decision information includes one or more of the following: the number of first terminals, the first time window, the first network area information, the first traffic when each terminal transmits background data, or the The reason for the first background data transmission strategy;
- the second decision information includes one or more of the following: the number of second terminals, the second time window, the second network area information, the second traffic when each terminal transmits background data, Or the reason for the development of the second background data transmission strategy.
- one or more decision information can be provided to the policy control network element, and the accuracy of the policy control network element in formulating a background data transmission strategy based on the policy information can be improved.
- the second decision information includes one or more of the following: the number of second terminals, the second time window, the second network area information, the second traffic when each terminal transmits background data, or the first 2. An indication that the background data transmission strategy is being negotiated, or the reason for formulating the second background data transmission strategy. Based on this possible design, one or more decision information can be provided to the policy control network element, and the accuracy of the policy control network element in formulating a background data transmission strategy based on the policy information can be improved.
- the first strategy control network element formulates the first background data transmission strategy based on the first decision information, the second decision information, and the background data transmission strategy saved by the first network element, including: when determining the second decision information When affecting the formulation of the first background data transmission strategy, the first policy control network element formulates the first background data transmission strategy according to the first decision information, the second decision information, and the background data transmission strategy saved by the first network element, and the first background data The execution of the transmission strategy and the second background data transmission strategy does not affect each other.
- the first policy control network element when the second decision information affects the formulation of the first background data transmission strategy, the first policy control network element does not delay formulating the first background data transmission strategy, but continues to use all the acquired background data transmission strategies And the first decision information formulates the first background data transmission strategy, that is, it is formulated in parallel with the second background data transmission strategy to increase the speed of background data transmission, and at the same time, in order to avoid conflicts between the first background data transmission strategy and the second background data transmission strategy , It is required that the execution of the first background data transmission strategy and the second background data transmission strategy do not affect each other, avoid network congestion, and ensure the normal transmission of background data.
- the first strategy control network element formulates the first background data transmission strategy based on the first decision information, the second decision information, and the background data transmission strategy saved by the first network element, including: when determining the second decision information When affecting the formulation of the first background data transmission strategy, after the first strategy controls the network element to obtain the second background data transmission strategy, it is based on the first decision information, the background data transmission strategy saved by the first network element, and the second background data transmission strategy Formulate the first background data transmission strategy.
- the first policy controls the network element to delay the formulation of the first background data transmission strategy.
- the second background data transmission strategy is formulated first, and then combined All the background data transmission strategies formulated
- the first background data transmission strategy is formulated to avoid the conflict between the first background data transmission strategy and the second background data transmission strategy, and to ensure the normal transmission of the background data.
- the first policy control network element formulates the first background data transmission strategy based on the first decision information, the second decision information, and the background data transmission strategy saved by the first network element Including: the first strategy controls the network element to delay the formulation of the first background data transmission strategy, and after acquiring the second background data transmission strategy, the first context is formulated according to the first decision information and the background data transmission strategy saved by the first network element Data transmission strategy.
- the first strategy controls the network element to delay the formulation of the first background data transmission strategy.
- the second background data transmission strategy After the second background data transmission strategy is formulated, it combines all the established background data transmission strategies (including the second background data transmission strategy). ) Formulate a first background data transmission strategy to avoid conflicts between the first background data transmission strategy and the second background data transmission strategy, and ensure the normal transmission of background data.
- the first strategy control network element formulates the first background data transmission strategy according to the first decision information, the second decision information, and the background data transmission strategy saved by the first network element, including: the first strategy control network element
- the formulation of the first background data transmission strategy is delayed, and after the deletion instruction corresponding to the second decision information is obtained, the first background data transmission strategy is formulated according to the first decision information and the background data transmission strategy saved by the first network element.
- the first policy control network element refers to the second decision information to formulate the first background data transmission strategy, if it receives a deletion instruction corresponding to the second decision information, it deletes the second decision information or the second decision.
- the background data transmission strategy corresponding to the information is no longer referenced to the second decision information or the background data transmission strategy corresponding to the second decision information to formulate the first background data transmission strategy, to improve the accuracy of the first background data transmission strategy formulation and to delete it in time.
- Use/invalid background data transmission strategy to improve resource utilization.
- the influence of the second decision information on the formulation of the first background data transmission strategy includes one or more of the following situations: the first time window overlaps the second time window, and the network indicated by the first network area information The area overlaps with the network area indicated by the second network area information.
- the first decision information affects the formulation of the first background data transmission strategy according to whether the transmission time windows corresponding to the background data overlap and/or whether the applicable network area of the background data transmission strategy overlaps, so as to avoid the same time Develop multiple background data transmission strategies on the window and/or the same network area, and use multiple background data transmission strategies to transmit a large amount of background data to ensure the normal transmission of background data.
- the first message includes a first reference identifier and first decision information, and the first reference identifier is used to identify the first background data transmission strategy.
- the first policy control network element can send the first decision information to the first network element, so that the first network element saves the first decision information, and formulates the first background data transmission strategy based on the first decision information During the period, when other policy control network elements formulate background data transmission strategies, the first decision information is sent to other policy control network elements so that other policy control network elements can refer to the first decision information to formulate their own background data transmission strategies to avoid different backgrounds Conflicts between data transmission strategies affect the availability of background data transmission strategies and cause network congestion.
- the method before the first policy control network element sends the first message to the first network element, the method further includes: the first policy control network element receives the first policy control network element that includes the first decision information from the first application server. Two messages, the second message is used to request the first policy control network element to formulate the first background data transmission policy. Based on this possible design, the first policy control network element obtains the first decision information from the first application server, that is, the application server sends the user's background data transmission requirements to the policy control network element, without the user having to pass through multiple network elements. Sent to the policy control network element to reduce signaling overhead.
- the method further includes: when the network performance index is lower than or recovers to a preset threshold, the first policy control network element sends a first message to the first network element, and the network performance index event is the third In the event that the network performance index during the time window of the background data transmission strategy falls below or recovers to the preset threshold, the third background data transmission strategy is given to the background data transmission strategy formulated according to the first decision information.
- the first message can be sent to the first network element in time to obtain
- the established background data transmission strategy according to the established background data transmission strategy, adaptively adjusts the currently used background data transmission strategy, so that the currently used background data transmission strategy meets the network transmission needs and improves the usability of the background data transmission strategy .
- the method further includes: the first policy control network element sends a subscription request for obtaining a network performance index event to the NWDAF, and receives the network performance index event notified by the NWDAF.
- the first strategy control network element can learn through NWDAF that the network performance index is lower than or restored to the preset threshold, that is, NWDAF analyzes whether the network performance index is lower than or restored to the preset threshold, and notifies the first
- the policy control network element reduces the power consumption of the first policy control network element to determine whether the network performance index is lower than or restored to a preset threshold.
- the first network element includes a unified data management (UDM) network element or a network repository function (NRF) network element or a unified data repository (UDR) network element .
- UDM unified data management
- NRF network repository function
- UDR unified data repository
- the method further includes: the first policy control network element sends a third message including a first reference identifier and first decision information to the first network element, where the first reference identifier is used to identify the first context Data transmission strategy.
- the first policy control network element can carry the first reference identifier and the first decision information in a third message and send it to the first network element, so that the first network element saves the first decision information, and then according to
- the first decision information is formulating the first background data transmission strategy
- other strategy control network elements formulate the background data transmission strategy
- the first decision information is sent to other strategy control network elements so that other strategy control network elements can refer to the first decision information Develop your own background data transmission strategy to avoid conflicts between different background data transmission strategies, which will affect the availability of the background data transmission strategy and cause network congestion.
- an embodiment of the present application also provides a method for formulating a background data transmission strategy.
- the method includes: a first network element receives second decision information from a second policy control network element, and the second decision information corresponds to the second Background data transmission strategy; the first network element receives the first message from the first strategy control network element, the first message is used to request the background data transmission strategy saved by the first network element; the first network element sends the first strategy control network element The background data transmission strategy and the second decision information saved by the first network element are sent; the second decision information and the background data transmission strategy saved by the first network element are used to formulate the first background data transmission strategy.
- the first network element sends the saved background data transmission strategy and the decision information corresponding to the background data transmission strategy being negotiated to the first policy control network element that is to formulate the background data transmission strategy for the first time
- a strategy control network element refers to the existing background data transmission strategy and other strategies when formulating the background data transmission strategy.
- the control network element is formulating the decision information corresponding to the background data transmission strategy to avoid the development of the background data transmission strategy and other strategy controls.
- the network element formulates the background data transmission strategy conflict to ensure the availability of the background data transmission strategy.
- the method further includes: the first network element receives the second background data transmission strategy from the second policy control network element; the first network element sends the second background data transmission to the first policy control network element Strategy, the second background data transmission strategy is used to formulate the first background data transmission strategy.
- the successfully negotiated background data transmission strategy can be sent to the first policy control network element, so that the first policy control network element can formulate its own background data transmission strategy according to the negotiated background data transmission strategy to avoid different backgrounds The problem of data transmission strategy conflict.
- the method further includes: the first network element receives a deletion instruction corresponding to the deletion of the second decision information from the second policy control network element; the first network element deletes the second decision information according to the deletion instruction; A network element sends a deletion instruction corresponding to the second decision information to the first policy control network element, and the deletion instruction is used to instruct the first policy control network element to delete the second decision information.
- the second decision information or the background data transmission strategy corresponding to the second decision information can be deleted to facilitate the first
- a policy control network element deletes the acquired second decision information and/or the background data transmission strategy corresponding to the second decision information according to the deletion instruction sent by the first network element, and no longer refers to the first background data transmission strategy when formulating its own background data transmission strategy.
- the second decision information and/or the background data transmission strategy corresponding to the second decision information improves the accuracy of the background data transmission strategy formulation and improves the resource utilization rate.
- the related description of the second decision information described in the second aspect or the possible design of the second aspect may refer to the description of the first aspect or the possible design of the first aspect, and will not be repeated.
- an embodiment of the present application also provides a session management method, the method includes: a second policy control network element receives a policy association establishment request corresponding to a session establishment request of a user equipment UE, and sends a request to the first network The element sends a fourth message for requesting the first background data transmission strategy applied to the session, obtains first decision information corresponding to the first background data transmission strategy from the first network element, and manages the session according to the first decision information.
- the policy control network element when the policy control network element formulates the session management strategy of the UE, it can obtain the decision information needed to formulate the UE’s session management strategy from the first network element, and refer to the obtained decision information.
- the session is managed to avoid the problem of conflict between the background data transmission strategy and the UE’s session of the decision-making information formulated, and to ensure the background data transmission strategy and the availability of the UE’s session.
- the management of the session by the second policy control network element according to the first decision information includes: the second policy control network element rejects the establishment request of the policy association according to the first decision information.
- the request for establishment of the policy association is rejected, the session management policy of the session is stopped, and the PDU session is established, so as to avoid the session management policy of the session and the first decision information.
- Corresponding background data transmission strategy conflicts to ensure the normal transmission of background data.
- the management of the session by the second policy control network element according to the first decision information includes: the second policy control network element accepts the establishment request of the policy association according to the first decision information.
- a request for establishing a policy association is accepted, and a session management strategy for the session is formulated on the basis of the background data transmission strategy corresponding to the first decision information to ensure the normal transmission of the background data.
- the method further includes: after the second policy control network element receives the first background data transmission strategy corresponding to the first decision information sent by the first network element, formulating a data transmission strategy for the first background data according to the first background data transmission strategy
- the session management policy of the session that performs policy and charging control on the session, and the session management policy of the session is sent to the session management network element.
- the second strategy controls the network element to delay the formulation of the first strategy.
- all the established background data transmission strategies (including the first background data transmission strategy) are combined to formulate the session.
- Manage the strategy establish a session, avoid the conflict between the first background data transmission strategy and the session management strategy, and ensure the normal transmission of background data.
- the method further includes: after the second policy control network element receives the first background data transmission policy sent by the first network element, terminating the policy association according to the first background data transmission policy.
- the strategy association is terminated according to the first context data transmission strategy to avoid the first context
- the data transmission strategy conflicts with the session management strategy to ensure the normal transmission of background data.
- the method further includes: after receiving the deletion instruction corresponding to the first decision information, the second policy control network element terminates the policy association.
- the second policy control network element receives the deletion instruction corresponding to the first decision information, determines that the first background data transmission policy is unavailable/invalid, and there is no first background data transmission policy associated with the session management policy, Then terminate the policy association to avoid the background data transmission failure caused by the invalid terminal session.
- the relevant description of the first decision information described in the third aspect or the possible design of the third aspect may refer to the description of the first aspect or the possible design of the first aspect, and will not be repeated.
- the fourth message includes the first reference identifier, and the related description of the first reference identifier may refer to the first aspect or the possible design of the first aspect, and details are not repeated.
- an embodiment of the present application also provides a UE policy management method, the method includes: a second policy control network element receives a policy association establishment request corresponding to a registration request of a user equipment, and sends a first network element to the first network element.
- the fourth message is used to request the first background data transmission strategy applied to the UE, obtain first decision information from the first network element, the first decision information corresponds to the first background data transmission strategy, and is formulated according to the first decision information UE's UE strategy.
- the policy control network element when the policy control network element formulates the UE policy of the UE, it can obtain the decision information needed to formulate the UE policy of the UE from the first network element, and refer to the obtained decision information to manage the session. Avoid the problem of conflicts between the background data transmission strategy and the UE that the decision information made corresponds to, and ensure the background data transmission strategy and the availability of the UE strategy of the UE.
- the second strategy control network element formulates the UE strategy of the UE according to the first decision information, including: the second strategy control network element delays formulating the UE strategy of the UE, and after obtaining the first decision information After deciding the first background data transmission strategy corresponding to the information, the UE strategy of the UE is formulated according to the first background data transmission strategy.
- the formulation of the UE strategy of the UE is delayed.
- the first decision information corresponds to The UE strategy is formulated on the basis of the background data transmission strategy to ensure the normal transmission of background data.
- the method further includes: the second policy control network element sends a policy association establishment response, and the policy association establishment response does not carry the UE policy of the UE.
- the relevant description of the first decision information described in the fourth aspect or the possible design of the fourth aspect may refer to the description of the first aspect or the possible design of the first aspect, and will not be repeated.
- the fourth message includes the first reference identifier, and the related description of the first reference identifier may refer to the first aspect or the possible design of the first aspect, and details are not repeated.
- the present application provides a communication device.
- the communication device may be a first policy control network element or a chip or a system on a chip in the first policy control network element, and may also be a first policy control network element for implementing The module or unit of the method for formulating the background data transmission strategy described in the embodiment of the present application or other module or unit that can implement the method for controlling the execution of the network element by the first strategy.
- the communication device can implement the functions performed by the first policy control network element in the first aspect or each possible design.
- the communication device may include a module unit or means that performs one-to-one correspondence of the method/operation/step/action described in the first aspect, and the module, unit, or means may be implemented by hardware , Software implementation, or implementation of corresponding software through hardware.
- the hardware or software includes one or more modules or units corresponding to the above-mentioned functions.
- the communication device may include: a sending unit, a receiving unit, and a processing unit;
- the sending unit is configured to send a first message to the first network element, where the first message is used to request the background data transmission strategy saved by the first network element.
- the receiving unit is configured to obtain the background data transmission strategy and the second decision information stored in the first network element from the first network element, and the second decision information is used to formulate the second background data transmission strategy.
- the processing unit is used to formulate a first background data transmission strategy based on the first decision information, the second decision information and the background data transmission strategy saved by the first network element, and the first decision information is used to formulate the information of the first background data transmission strategy .
- the relevant definitions of the first decision information and the second decision information and the manner in which the processing unit formulates the first background data transmission strategy can refer to the first aspect or the possible design of the first aspect, and will not be repeated.
- the communication device For the specific implementation of the communication device, reference may be made to the behavior and function of the terminal in the data transmission method provided in the first aspect or any possible design of the first aspect, which will not be repeated here. Therefore, the provided communication device can achieve the same beneficial effects as the first aspect or any possible design of the first aspect.
- the communication device described in the fifth aspect may be a first network element or a chip or a system-on-chip in the first network element, and may also be the first network element used to implement the method described in the embodiments of this application.
- the module or unit of the method for formulating the background data transmission strategy described above may be other modules or units that can implement the method executed by the first network element.
- the communication device can implement the functions performed by the first network element in the second aspect or the possible design of the second aspect.
- the communication device may include a module unit or means that performs one-to-one correspondence of the method/operation/step/action described in the second aspect, and the module, unit, or means may be implemented by hardware and software. , Or implement the corresponding software through hardware.
- the hardware or software includes one or more modules or units corresponding to the above-mentioned functions.
- the communication device may be used to receive second decision information from a second policy control network element, the second decision information corresponding to the second background data transmission strategy, and to receive the first message of the first policy control network element, the first message is used for Upon requesting the background data transmission strategy saved by the first network element, send the background data transmission strategy saved by the first network element and the second decision information to the first policy control network element; the second decision information and the background data saved by the first network element The transmission strategy is used to formulate the first background data transmission strategy.
- the communication device described in the fifth aspect may be a second policy control network element or a chip or a system on a chip in the second policy control network element, or may be used in the second policy control network element
- the communication device can implement the functions performed by the second policy control network element in the foregoing third aspect or each possible design of the third aspect.
- the communication device may include a module unit or means that performs one-to-one correspondence of the method/operation/step/action described in the third aspect, and the module, unit, or means may be implemented by hardware , Software implementation, or implementation of corresponding software through hardware.
- the hardware or software includes one or more modules or units corresponding to the above-mentioned functions.
- the communication device is configured to receive a request for establishing a policy association corresponding to a session establishment request of a user equipment UE, and send a fourth message for requesting a first background data transmission strategy applied to the session to the first network element, from The first network element obtains first decision information corresponding to the first background data transmission strategy, and manages the session according to the first decision information.
- the communication apparatus is configured to receive a request for establishing a policy association corresponding to a registration request of a user equipment, and send a fourth message for requesting the first background data transmission policy applied to the UE to the first network element.
- the network element obtains the first decision information, which corresponds to the first background data transmission strategy, and formulates the UE strategy of the UE according to the first decision information.
- a communication device may be a first policy control network element or a chip or a system on a chip in the first policy control network element, or other devices that can implement the first policy control network element side method Module or unit.
- the communication device may implement the functions performed by the first policy control network element in the first aspect or each possible design, and the functions may be implemented by hardware.
- the communication device may include: a processor and a communication interface, and the processor is configured to send a first message for requesting the background data transmission strategy saved by the first network element to the first network element through the communication interface, from The first network element obtains the background data transmission strategy saved by the first network element and the second decision information used to formulate the second background data transmission strategy, according to the first decision information and the second decision information used to formulate the first background data transmission strategy Information and the background data transmission strategy saved by the first network element, and formulate the first background data transmission strategy.
- the communication device described in the sixth aspect may be a first network element or a chip or a system on a chip in the first network element, or may be a first network element used to implement the method described in the embodiment of the present application.
- the module or unit of the method for formulating the background data transmission strategy, or other module or unit that can implement the method executed by the first network element, for example, the communication device may include: a processor and a communication interface.
- the processor and the communication interface included in the communication device are used to support the communication device to implement the second aspect or the functions performed by the first network element in each possible design of the second aspect.
- the communication device described in the sixth aspect may be a second policy control network element or a chip or a system on a chip in the second policy control network element, and may also be used in the second policy control network element
- the module or unit that implements the session management method described in the embodiments of the present application, or other modules or units that can implement the method for controlling the network element execution by the second policy for example, the communication device may include: a processor and a communication interface.
- the processor and the communication interface included in the communication device are used to support the communication device to implement the functions performed by the second policy control network element in the third aspect or each possible design of the third aspect, or to implement the fourth aspect or In each possible design of the fourth aspect, the second strategy controls the functions performed by the network element.
- the communication device of the sixth aspect may further include a memory, and the memory is used to store computer instructions and/or data.
- the processor executes the computer instructions stored in the memory, so that the communication device executes the method for formulating a background data transmission strategy described in the first aspect or any one of the possible designs of the first aspect ; Or, execute the method of formulating a background data transmission strategy described in the second aspect or any one of the possible designs of the second aspect; or, execute the method of the third aspect or any one of the possible designs of the third aspect Session management method; or, execute the UE policy management method described in the fourth aspect or any one of the possible designs of the fourth aspect.
- the communication interface may be a transceiver, an interface circuit, a bus interface, a pin, or other device capable of implementing the transceiver function.
- a computer-readable storage medium stores instructions that, when run on a computer, enable the computer to execute the first aspect above or any possible design of the above aspects
- the method for formulating a background data transmission strategy; or, the method for formulating a background data transmission strategy described in the second aspect or any one of the possible designs of the second aspect is executed; or, the third aspect or the third aspect is executed Any possible design of the aforementioned session management method of the aspect; or, execute the aforementioned fourth aspect or the UE policy management method of any possible design of the fourth aspect.
- a computer program product containing instructions.
- the computer program product may include program instructions.
- the computer can execute the first aspect or any one of the foregoing aspects.
- the session management method of any possible design of the third aspect; or, the UE policy management method of any possible design of the fourth aspect or the fourth aspect is executed.
- a chip system in a ninth aspect, includes a processor and a communication interface.
- the chip system can be used to implement the first policy control network element in the first aspect or any possible design of the first aspect.
- the processor is configured to send a first message for requesting the background data transmission strategy saved by the first network element to the first network element through the communication interface, and obtain from the first network element the background data transmission strategy saved by the first network element and Formulate the second decision information of the second background data transmission strategy, and formulate the first background data based on the first decision information used to formulate the first background data transmission strategy, the second decision information, and the background data transmission strategy saved by the first network element Transmission strategy.
- the chip system can realize the functions performed by the first network element in the second aspect or the possible designs of the second aspect, or realize the third aspect or the possibilities of the third aspect.
- the second strategy controls the function performed by the network element in the design, or realizes the function performed by the second strategy control network element in the fourth aspect or each possible design of the fourth aspect.
- the chip system further includes a memory for storing program instructions and/or data.
- the processor executes the program instructions stored in the memory to
- the chip system is made to execute the method for formulating a background data transmission strategy described in the first aspect or any one of the possible designs of the first aspect.
- the chip system can be composed of chips, or include chips and other discrete devices, without limitation.
- an embodiment of the present application further provides a communication system, the communication system including the communication device according to the fifth aspect or the sixth aspect and the first network element.
- Figure 1 is a flow chart of an existing method for formulating a background data transmission strategy
- FIG. 2a is a schematic diagram of the architecture of a communication system provided by an embodiment of this application.
- FIG. 2b is a schematic structural diagram of another communication system provided by an embodiment of this application.
- FIG. 3a is a schematic diagram of the architecture of a 5G communication system provided by an embodiment of this application.
- FIG. 3b is a schematic diagram of the architecture of a 4G communication system provided by an embodiment of this application.
- FIG. 4 is a schematic diagram of the composition of a communication device 400 provided by an embodiment of the application.
- FIG. 5 is a flowchart of a method for formulating a background data transmission strategy provided by an embodiment of the application
- FIG. 6 is a flowchart of a method for formulating a background data transmission strategy according to an embodiment of the application
- FIG. 7 is a flowchart of a method for formulating a background data transmission strategy according to an embodiment of the application.
- FIG. 8 is a schematic diagram of the composition of a communication device 80 provided by an embodiment of this application.
- FIG. 9 is a schematic structural diagram of another communication system provided by an embodiment of this application.
- FIG. 10 is a flowchart of a method for session management provided by an embodiment of this application.
- FIG. 11 is a flowchart of a method for session management provided by an embodiment of this application.
- FIG. 12 is a schematic diagram of the composition of a communication device 120 provided by an embodiment of this application.
- Background data It is a type of data that is not transmitted in real time. This type of data is usually executed on the background side of the mobile device. For example, sometimes the user needs to upload or download a large amount of data to his/her mobile device: smart phone and tablet computer, such as uploading a batch of photos to his/her blog or Download a video from his/her friend’s blog. Because the aforementioned data transmission of uploading or downloading photos or videos requires time and system resources for processing, the aforementioned data transmission is usually performed on the background side of the mobile device. These uploaded or downloaded photos or videos can be called background data.
- Background data transfer is a transmission method proposed by 3GPP for the communication problem between an application and a large number of terminal devices in the Internet of Things. It provides a lower rate for applications and terminal devices by setting a network non-peak time window. , Faster communication, but also reduce the transmission pressure of the network during peak hours. BDT is the core mode of AESE data transmission and is very popular in current 3GPP research. Background data transmission means that each node in the 3GPP system (such as terminal, server, application server, etc.) requests data transmission from AESE. AESE controls each data transmission request to determine when and at what rate. Respond to each data transmission request to ensure load balance.
- the background data transmission strategy is a strategy that can be used to transmit the background data, and the background data transmission strategy is formulated by the strategy control network element.
- the background data transmission strategy corresponds to the background data, and the background data transmission strategy is uniquely identified by the strategy ID/reference ID.
- the background data transmission strategy may include one or more of the following: time window, rate within the time window, maximum aggregate bit rate, billing group identification, reference identifier (reference ID) corresponding to the background data transmission strategy,
- the background data transmission strategy provides the transmission basis for the background data and guarantees the transmission requirements of the background data.
- the background data transmission strategy is bound to the decision information.
- the strategy control network element can formulate the background based on the decision information and other information, such as all existing background data transmission strategies, other network information (terminal access types, etc.), operator strategies, etc. Data transmission strategy.
- the decision information may include one or more types of information, such as the number of terminals, time windows, network area information, traffic when each terminal transmits background data, or reasons for formulating background data transmission strategies.
- the number of terminals may refer to the estimated number of terminals that use the background data transmission strategy to transmit background data.
- the time window can refer to the time period specified by the end user or preset by the system for the transmission of background data.
- the flow rate when the terminal transmits background data may refer to the maximum transmission rate required when the terminal transmits background data.
- the network area information may be used to indicate the applicable range of the background data transmission strategy, and the network area information may be physical area information or geographic location, such as the geographic location in a 3GPP network. If the decision information does not carry network area information, it means that the applicable range of the background data transmission strategy corresponding to the decision information is the entire public land mobile network (PLMN).
- PLMN public land mobile network
- the network information may refer to the current network status, and may be used to indicate the type of access network through which the terminal accesses, the type of wireless access technology used, the maximum transmission rate of the current network, and so on.
- the operator strategy can refer to the operator's pre-made strategy for the user (such as the user who uses the background data transmission strategy to transmit background data).
- the operator strategy can include one or more of the following: the user's usage level, the user's QoS Demand, bandwidth authorized by the user, etc.
- Figure 1 is a schematic diagram of the background data transmission strategy formulated in 3GPP. Since the policy control network element needs to negotiate with the application server during the formulation of the background data transmission strategy, in the embodiment of this application, the background data transmission strategy is to negotiate the background data transmission strategy , The same below.
- the method may include: S101: The application server sends a background data transfer request (background data transfer request) to the network open network element, and the background data transfer request may carry an identifier (ID) of the application server, And the decision information used to formulate the background data transmission strategy, and the background data transmission request is used to request to formulate the background data transmission strategy.
- the network opening network element receives the background data transmission request.
- S102 The network opening network element checks and authorizes the background data transmission request, and sends the background data transmission request to the policy control network element after the check and authorization succeeds.
- the policy control network element receives the background data transmission request.
- S103 The policy control network element sends an acquisition request to the network storage network element according to the background data transmission request, and the acquisition request may be used to request acquisition of all existing background data transmission policies.
- the network storage network element receives the acquisition request.
- S104 The network storage network element returns all existing/saved background data transmission policies to the policy control network element.
- the strategy control network element receives all the background data transmission strategies saved by the network storage network element.
- S105 The strategy control network element formulates one or more candidate background data transmission strategies based on the decision information provided by the application server, all existing background data transmission strategies, other network information (terminal access types, etc.), operator strategies, etc.
- S106 The policy control network element returns a background data transfer response (background data transfer response) to the network open network element, and the background data transmission response carries the reference identifier (reference Id) allocated by the policy control network element for the background data transmission strategy and one or more A candidate background data transmission strategy.
- S107 The network opening network element receives and returns the background data transmission response to the application server.
- S108 The application server receives the confirmation message, selects a background data transmission strategy from one or more candidate background data transmission strategies, and sends a background data transmission request to the network open network element again, and the background data transmission request carries a reference identifier and selection The strategy ID of the background data transmission strategy.
- S111 The network opening network element returns a background data transmission response to the application server.
- S112 The policy control network element sends a saving request for saving the new background data transmission strategy to the network storage network element, and the saving request carries the reference identifier and the selected background data transmission strategy.
- S113 The network storage network element receives and correspondingly saves the new background data transmission strategy and the reference identifier of the new background data transmission strategy, and returns a confirmation message to the policy control network element.
- S110 to S113 in Figure 1 is not limited. S110 and S111 can be executed before S112 as shown in Figure 1, or S112 and S113 can be executed first, and then S110 and S111 are executed. .
- the application server or terminal can transmit the background data according to the background data transmission strategy. Later, when the background data is transmitted according to the background data transmission strategy, if the network performance index is relatively low or the background data transmission strategy needs to be adjusted according to the user's application requirements, then Refer to the process shown in S103 to S113 shown in FIG. 1 to renegotiate/formulate a new background data transmission strategy.
- the policy control network element needs to consider all existing background data transmission strategies to determine a new background data transmission strategy. Since there will be multiple policy control network elements in the network, there may be multiple policy control network elements that simultaneously formulate background data transmission strategies for multiple application servers. In this case, each strategy control network element does not consider the transmission strategy being developed by other strategy control network elements when formulating the background data transmission strategy. Therefore, the established transmission strategy may not be optimal, and the established background data may appear. The problem of transmission strategy conflicts. In addition, when the network side device executes the strategy according to the background data transmission strategy, it does not consider whether the background data transmission strategy is updated. If it is modified by other network side devices, the execution of the background data transmission strategy fails.
- the embodiments of the present application provide a method for formulating a background data transmission strategy: when the policy control network element decides to formulate/adjust the background data transmission strategy, the policy control network element is requesting the existing network storage network element All output strategies carry decision information used to formulate/adjust the background data transmission strategy, and the network storage network element saves the decision information used to formulate/adjust the background data transmission strategy. Subsequent, when other policy control network elements send an acquisition request to obtain the existing background data transmission strategy to the network storage network element, the network storage network element provides all the existing background data transmission strategies and saved use cases to other policy control network elements.
- the method for formulating a background data transmission strategy provided by an embodiment of the present application can be used in the network shown in FIG. 2a. As shown in FIG. 2a, it is a communication system 10 provided by an embodiment of the present application. Yuan, the first network element.
- the first policy control network element can be used to formulate background data transmission policies, quality of service policies, slice selection policies and other policies and charging control rules (policy and charging control rules, PCC), and the policies to be formulated Provided to network elements such as mobility management network elements and session management network elements.
- policy and charging control rules PCC
- the first network element which may be called a network storage network element, is used to store user data, such as user subscription information, authentication or authorization data, and so on.
- the network storage network element may be a UDM network element, an NRF network element, or a UDR network element.
- the first policy control network element is used to send a first message to the first network element, and the first message is used to request a background data transmission policy saved by the first network element.
- the first network element is configured to receive the first message and return all the saved background data transmission policies to the first policy control network element.
- the first policy control network element is also used to obtain from the first network element the background data transmission strategy saved by the first network element and the second decision information used to formulate the second background data transmission strategy, according to the data used to formulate the first background data
- the first decision information, the second decision information of the transmission strategy, and the background data transmission strategy saved by the first network element are used to formulate the first background data transmission strategy.
- the first policy control network element is used for when it is determined that the second decision information influences the formulation of the first background data transmission strategy, the first policy control network element is based on the first decision information and the second decision information. And the background data transmission strategy saved by the first network element formulates the first background data transmission strategy, and the execution of the first background data transmission strategy and the second background data transmission strategy do not affect each other. Or, when it is determined that the second decision information affects the formulation of the first background data transmission strategy, the first strategy controls the network element according to the first decision information and the background data saved by the first network element after acquiring the second background data transmission strategy. The transmission strategy and the second background data transmission strategy formulate the first background data transmission strategy.
- the influence of the second decision information on the formulation of the first background data transmission strategy may include one or more of the following situations: the first time window overlaps the second time window, and the first network area information indicates The network area of overlaps with the network area indicated by the second network area information.
- the first time window and the second time window may refer to the time period for transmitting the background data specified by the terminal user or preset by the system.
- the overlap of the first time window and the second time window may mean that the first time window and the second time window overlap partially or completely.
- the first time window can be a time period: 6:00 am to 9:00 am
- the second time window can be a time period: 6:00 am to 9:00 am or a time period: 5:30 am to 8:00 am 30.
- the first network area information may be used to indicate the applicable range of the first background data transmission strategy
- the second network area information may be used to indicate the applicable range of the second background data transmission strategy.
- the overlap between the network area indicated by the first network area information and the network area indicated by the second network area information may refer to that the network area indicated by the first network area information and the network area indicated by the second network area information overlap partially or completely.
- the first network area may be cell 1
- the second network area may be cell 1 or a part of cell 1.
- the communication system may further include a second policy control network element and a first application server.
- the second policy control network element and the first policy control network element may be the same or different.
- the second policy control network element is the same as the first policy control network element, there may be one in the communication system shown in FIG. 2a. Policy control network element.
- the first application server can be deployed in an operator's network that provides users with data transmission services or a network deployed by a third-party provider. For example, it can be deployed in providing users with Internet Protocol (IP) multimedia services (IP multi- media service, IMS) operator network, etc.
- IP Internet Protocol
- the first application server may be an AS (application service) or an application function (application function, AF), and the first application server may provide a background data transmission service to the user.
- the first application server is configured to send a second message to the first policy control network element, where the second message includes the first decision information.
- the first policy control network element may be used to receive the second message, and send the first decision information to the first network element according to the second message.
- the first network element is also used to receive and save the first decision information.
- the function of the second policy control network element is similar to that of the first policy control network element, and the second policy control network element is a network element that formulates a second background data transmission strategy based on the second decision information, such as: second policy control
- the network element is used to obtain the background data transmission strategy saved by the first network element from the first network element, and formulate according to the second decision information used to formulate the second background data transmission strategy and the background data transmission strategy saved by the first network element The second background data transmission strategy.
- the second policy control network element is also used to send second decision information to the first network element.
- the first network element is also used to receive and save the second decision information.
- the first policy control network element and the second policy control network element can obtain the first decision information and the second decision information from the same application server, such as the first policy control network element and the second policy control network element.
- the network element may obtain the first decision information and the second decision information from the first application server shown in FIG. 2a; or, the first policy control network element and the second policy control network element may obtain the first decision information from different application servers, Second decision information.
- the communication system shown in FIG. 2a may further include a second application server.
- the second application server is configured to send the second decision information to the second policy control network element.
- the second policy control network element is used to obtain the second decision information from the second application server.
- the communication system shown in FIG. 2a or FIG. 2b may also include network open network elements.
- Network open network elements can be used to open core network events and capabilities, to translate between external and internal parameters of the core network, to receive and store identification information provided by external network elements of the core network, and to perform core network element selection.
- the external network elements of the core network may include application servers and the like.
- sending the second message by the first application server to the first policy control network element may include:
- the first application server is used to send a second message to the network opening function.
- the network opening network element is used to receive the second message, and after authenticating and authorizing the second message, send the second message to the first policy control network element.
- the first policy control network element receives the second message from the network opening network element.
- Figure 2a or Figure 2b is only an exemplary architecture diagram.
- the system may also include other functional network elements, such as: operation and management (operation and management, O&M) network elements, etc., which are not limited in the embodiment of this application.
- O&M operation and management
- the name of each device in Figure 2a or Figure 2b is not limited.
- each device can also be named with other names, such as replacing it with the name of a network element with the same or similar functions. No restrictions.
- the communication system shown in Figure 2a may be a 3rd generation partnership project (3rd generation partnership project, 3GPP) communication system, such as the 4th generation (4G) communication system, long term evolution (LTE) system It may also be a fifth generation (5th generation, 5G) communication system, a new radio (NR) system, a next-generation communication system, etc., or a non-3GPP communication system, without limitation.
- 3rd generation partnership project 3rd generation partnership project, 3GPP
- 4G 4th generation
- LTE long term evolution
- 5th generation, 5G fifth generation
- NR new radio
- next-generation communication system etc.
- non-3GPP communication system without limitation.
- the policy control network element can be a policy control function (PCF) in the 5G communication system, and the network is open
- the network element or entity corresponding to the functional network element may be the network exposure function (NEF) in the 5G communication system
- the network element or entity corresponding to the first network element may be the NRF network element or UDR network in the 5G communication system Yuan or UDM network element.
- the policy control network element may be the policy and charging rules function in the 4G communication system.
- PCRF the network element or entity corresponding to the network open function network element may be the service capability exposure function (SCEF) in the 4G communication system
- SCEF service capability exposure function
- SPR subscription profile repository
- the 4G communication system may also include a policy and charging enforcement function (PCEF).
- PCEF policy and charging enforcement function
- the policy control network element in the embodiment of the present application may also be referred to as a communication device, which may be a general-purpose device or a special-purpose device, which is not specifically limited in the embodiment of the present application.
- the related functions of the policy control network element in the embodiments of the present application may be implemented by one device, or jointly implemented by multiple devices, or implemented by one or more functional modules in one device.
- the embodiment does not specifically limit this. It is understandable that the above functions can be network elements in hardware devices, software functions running on dedicated hardware, or a combination of hardware and software, or instantiated on a platform (for example, a cloud platform) Virtualization function.
- each device (such as a policy control network element, etc.) shown in FIG. 2a may adopt the composition structure shown in FIG. 4 or include the components shown in FIG. 4.
- 4 is a schematic diagram of the composition of a communication device 400 provided by an embodiment of the application.
- the communication device 400 may include a processor 401 and a memory 404. Further, the communication device 400 may further include a communication line 402 and a communication interface 403. Among them, the processor 401, the memory 404, and the communication interface 403 may be connected through a communication line 402.
- the processor 401 may be a central processing unit (CPU), a general-purpose processor, a network processor (NP), a digital signal processing (DSP), a microprocessor, or a microcontroller , Programmable logic device (PLD) or any combination of them.
- the processor 401 may also be other devices with processing functions, such as circuits, devices, or software modules, without limitation.
- the communication line 402 is used to transmit information between the components included in the communication device 400.
- the communication interface 403 is used to communicate with other devices or other communication networks.
- the other communication network may be Ethernet, radio access network (RAN), wireless local area networks (WLAN), etc.
- the communication interface 403 may be a module, a circuit, a transceiver or any device capable of realizing communication.
- the memory 404 is used to store instructions. Among them, the instruction may be a computer program.
- the memory 404 may be a read-only memory (ROM) or other types of static storage devices that can store static information and/or instructions, or it may be a random access memory (RAM) or Other types of dynamic storage devices that store information and/or instructions can also be electrically erasable programmable read-only memory (EEPROM), compact disc read-only memory, CD- ROM) or other optical disc storage, optical disc storage (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs), magnetic disk storage media, and other magnetic storage devices are not restricted.
- ROM read-only memory
- RAM random access memory
- EEPROM electrically erasable programmable read-only memory
- CD- ROM compact disc read-only memory
- optical disc storage including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs
- magnetic disk storage media and other magnetic storage devices are not restricted.
- the memory 404 may exist independently of the processor 401, or may be integrated with the processor 401.
- the memory 404 may be used to store instructions or program codes or some data.
- the memory 404 may be located in the communication device 400 or outside the communication device 400 without limitation.
- the processor 401 is configured to execute instructions stored in the memory 404 to implement the method for formulating a background data transmission strategy provided in the following embodiments of the present application. For example, when the communication device 400 is a session management network element or a chip or a system on a chip in the session management network element, the processor 401 executes the instructions stored in the memory 404 to implement the execution of the session management network element in the following embodiments of the present application A step of. For another example, when the communication device 400 is a mobility management network element or a chip or a system on a chip in the mobility management network element, the processor 401 may execute instructions stored in the memory 404 to implement mobility management in the following embodiments of the present application The steps performed by the network element.
- the processor 401 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 4.
- the communication device 400 includes multiple processors.
- the processor 401 in FIG. 4 it may also include a processor 407.
- the communication apparatus 400 further includes an output device 405 and an input device 406.
- the input device 406 is a keyboard, a mouse, a microphone, or a joystick
- the output device 405 is a display, a speaker, or the like.
- the communication device 400 may be a desktop computer, a portable computer, a network server, a mobile phone, a tablet computer, a wireless terminal, an embedded device, a chip system, or a device with a similar structure in FIG. 4.
- the composition structure shown in FIG. 4 does not constitute a limitation to the communication device.
- the communication device may include more or less components than those shown in the figure, or combine certain components. , Or different component arrangements.
- the chip system may be composed of chips, or may include chips and other discrete devices.
- the determination in the embodiments of this application can also be understood as creating (create) or generating (generate), the "including” in the embodiments of this application can also be understood as “carrying”, and the “making” in the embodiments of this application can also be understood For “decision-making” or “determination”, etc., it will be explained here in a unified manner, and the embodiment of the present application does not specifically limit this.
- FIG. 5 is a flowchart of a method for formulating a background data transmission strategy provided by an embodiment of the application. As shown in FIG. 5, the method may include:
- the first policy control network element sends a first message to the first network element.
- the first network element receives the first message.
- the first policy control network element may be any policy control network element in the communication system shown in FIG. 2a.
- the first network element may be a UDR network element, a UDM network element, an NRF network element, or other network elements capable of storing background data transmission strategies.
- the first network element may correspondingly save the background data transmission strategy and the reference identifier of the background data transmission strategy in a list or in the form of an array in the first network element. Take the background data transmission strategy and the reference identifier of the background data transmission strategy correspondingly saved in the list as an example. In the initial state, the list is empty, and the first network element receives the background data transmission strategy and background data transmission sent by the strategy control network element. After the reference identification of the strategy, the background data transmission strategy and the reference identification of the background data transmission strategy are correspondingly saved in the list.
- the related description of the background data transmission strategy can refer to the above, and it will not be repeated.
- the first network element may also store decision information corresponding to the background data transmission strategy being formulated, and the decision information may be stored in the first network element corresponding to the reference identifier corresponding to the background data transmission strategy being formulated .
- the corresponding relationship between the decision information corresponding to the background data transmission strategy under development and the reference identifier may be included in the same list as the corresponding relationship between the background data transmission strategy that has been formulated and the reference identifier of the background data transmission strategy. middle.
- Table 1 below shows the background data transmission strategy already stored in the first network element and the decision information corresponding to the background data transmission strategy being developed.
- the first network element stores the background data transmission strategy 1 As well as background data transmission strategy 2, it also saves the decision information 3 corresponding to the background data transmission strategy with reference ID3, and the background data transmission strategy with reference ID3 has not been formulated or is being developed, that is, the reference ID is reference ID3
- the background data transmission strategy is under negotiation. If the background data transmission strategy 3 corresponding to the reference ID3 already exists before, the decision information 1 also indicates that the background data transmission strategy 3 is not a valid background data transmission strategy.
- the first message can be used to request all background data transmission strategies saved by the first network element, or can be replaced with the first message can be used to request all existing/existing/prepared background data transmission strategies.
- the first message may be a data management (DM) service_query request (DM_query request) provided by the interface between the first network element and the first policy control network element.
- the first message may include a first reference identifier and first decision information, the first reference identifier may be used to identify the first background data transmission strategy, and the first reference identifier information is allocated by the first policy control network element.
- the first decision information may be information that the first application server provides to the first policy control network element and can be used to formulate/decide/adjust the first background data transmission strategy.
- the first decision information may include the number of first terminals, the first time window, the first network area information, the first traffic when each terminal transmits background data, an indication that the first background data transmission strategy is being negotiated, or the formulation of the first background data
- One or more types of information such as the reason for the transmission strategy.
- the reason for formulating the first background data transmission strategy may not be included; if the first background data transmission strategy is adjusted, the first background data transmission strategy may be formulated s reason.
- the reasons for formulating the first background data transmission strategy can be network performance degradation, network performance recovery, or changes in the operator's strategy.
- the present application is not limited to including the first reference identifier and the first decision information in the first message and sending it to the first network element.
- the first policy control network element may also send the first reference identifier and the first decision information through other messages. Send to the first network element, so that the first network element saves the first reference identification information and the first decision information.
- the first policy control network element may send a third message to the first network element, and the third message includes the first reference identifier and the first decision information.
- the first background data transmission strategy can be indicated in the following manner (that is, being negotiated): the first policy control network element can carry the first decision information through a special information element to indicate the background data transmission corresponding to the first reference identifier
- the strategy is being developed (that is, under negotiation) (that is, it is not a valid background data transmission strategy, the same below), or a special identifier is included in the first decision information to indicate that the background data transmission strategy corresponding to the first reference identifier is being developed ( That is, it is being negotiated), or the reason for formulating the first background data transmission strategy is used to indicate that the background data transmission strategy corresponding to the first reference identifier is being formulated (that is, it is being negotiated).
- the first number of terminals may refer to the estimated number of terminals that use the first background data transmission strategy to transmit background data.
- the first flow rate when the terminal transmits background data may refer to the maximum transmission rate required when the terminal transmits background data.
- the related description of the first time window and the first network area information can be referred to the above, and will not be repeated.
- the first policy control network element receives the second message sent by the first application server, the first policy control network element is triggered to send the first message to the first network element.
- the second message may be used to request the formulation of the first background data transmission strategy, and the second message may include the first decision information, and may also include the identification of the first application server and other information, etc., which is not limited.
- the identifier of the first application server may be used to identify the first application server, and the identifier of the first application server may be the internet protocol (IP) address of the first application server or the first media access control (media access control). , MAC) address, etc.
- IP internet protocol
- media access control media access control
- MAC media access control
- the user can trigger the application layer of the terminal to send a transmission request to the first application server.
- the transmission request can carry the time period, transmission rate, etc., for the transmission of the background data desired by the user.
- the first application server determines the first decision information according to the transmission request, and sends a second message to the first policy control network element. For example, suppose the current time is 2:00 pm, and the user wants to download a 200MB movie during working hours (before 6:00 pm). The user can trigger the terminal’s application layer to send this request to the application server.
- the application server generates decision information according to the demand, and sends a second message carrying the decision information to the first policy control network element, which triggers the first policy control network element to formulate a corresponding background data transmission strategy so that the user can stay at home after get off work.
- This video The application server generates decision information according to the demand, and sends a second message carrying the decision information to the first policy control network element, which triggers the first policy control network element to formulate a corresponding background data transmission strategy so that the user can stay at home after get off work. Enjoy this video.
- the first application server when the first application server is an application server deployed by a third party, the first application server may send a second message to the first policy control network element through the network open network element, for example, the first application server sends the second message to the network open network element.
- the second message after the network opening network element authenticates and authorizes the second message, it sends the second message to the first policy control network element.
- the first application server when the first application server is an application server deployed by an operator, the first application server may directly send the second message to the first policy control network element.
- the first policy control network element before executing S501, has formulated a background data transmission strategy based on the first decision information, such as the third background data transmission strategy, when the first policy control network element determines the third background data
- the first strategy control network element is triggered to send the first message to the first network element.
- the first strategy control network element before executing S501, has formulated a background data transmission strategy, such as a third background data transmission strategy, according to the first decision information, and the network performance when the background data is transmitted according to the third background data transmission strategy The index is poor, such as lower than the preset threshold.
- the first policy control network element determines that the network performance index within the time window of the third background data transmission policy returns to the preset threshold
- the first policy control network element is triggered Send the first message to the first network element.
- the first strategy control network element to formulate the first background data transmission strategy can be replaced by the description that the first strategy controls the network element to adjust the third background data transmission strategy to obtain the first background data transmission strategy
- the third background data transmission strategy can be It is called the background data transmission strategy before adjustment
- the first background data transmission strategy may be the adjusted background data transmission strategy.
- special information elements are used to carry the first decision information, or the first decision information includes an indication that the background data transmission strategy is being formulated, or the reason for formulating the background data transmission strategy.
- the first decision information is also used to indicate that the third background data transmission strategy is not a valid background data transmission strategy.
- the preset threshold can be set as required, and the preset threshold can be set by the operator. For example, the operator sets the preset threshold according to the user's level, the user's QoS requirements, the authorized bandwidth, and so on.
- the first policy control network element can determine by itself whether the network performance index is lower than or restored to the preset threshold, or it can learn from other network elements whether the network performance index is lower than or restored to the preset threshold, such as the first policy control network
- the meta sends a subscription request to the network data analytics function (NWDAF).
- the subscription request is used to obtain network performance index events.
- the network performance index event is that the network performance index during the time window of the third background data transmission strategy is lower than or An event that recovers to a preset threshold; the first policy controls the network element from the network performance indicator event notified by NWDAF.
- Network performance indicators can include transmission rate, transmission bandwidth, and so on.
- the third message includes the first reference identifier and the first decision information method
- the first policy control network element first sends the first network element to the first network element.
- Message requesting the background data transmission strategy saved by the first network element.
- the first network element sends the saved background data transmission strategy and corresponding decision information to the first strategy control network element, which includes the third background data transmission strategy and the third background data transmission strategy used to make decisions (also used to make the first decision).
- the first decision information of the background data transmission strategy (the first decision information at this time does not include an indication that the background data transmission strategy is being negotiated or the reason for formulating the background data transmission strategy).
- the first policy control network element After the first policy control network element determines to re-formulate the first background data transmission strategy, the first policy control network element sends the updated first decision information to the first network element through a third message.
- the first policy control network element may carry the first decision information through special information elements to indicate that the background data transmission strategy corresponding to the first reference identifier is being formulated (that is, being negotiated) (that is, it indicates, or includes special information in the first decision information). To indicate that the background data transmission strategy corresponding to the first reference identifier is being developed (that is, under negotiation), or the reason for formulating the first background data transmission strategy is used to indicate that the background data transmission strategy corresponding to the first reference identifier is being developed (that is, Negotiating).
- the first network element sends all the background data transmission strategies and the second decision information saved by the first network element to the first policy control network element.
- the first policy control network element obtains from the first network element all the background data transmission policies and the second decision information stored in the first network element.
- the second decision information may be the decision information stored by the first network element and used to formulate the second background data transmission strategy.
- the second background data transmission strategy corresponding to the second decision information has not been formulated or is being formulated (that is, under negotiation).
- the second decision information may be provided by the second application server to the second policy control network element.
- the second policy control network element requests all existing background data transmission strategies from the first network element
- the second decision information and the second The second reference identifier allocated by the policy control network element for the second background data transmission strategy is sent to the first network element, and the first network element receives and correspondingly saves the second decision information and the second reference identifier, or the second policy control network element passes The other messages send the second reference identifier and the second decision information to the first network element.
- the second policy control network element and the first policy control network element may be the same or different, and the second application server and the first application server may be the same or different without limitation.
- the second decision information may include the number of second terminals, the second time window, the second network area information, the second traffic when each terminal transmits background data, the indication that the second background data transmission strategy is being negotiated, or the second setting One or more types of information such as the reason for the background data transmission strategy.
- the first network element can carry the second decision information through special information elements to indicate that the second background data transmission strategy is being formulated (that is, under negotiation), or include a special identifier in the second decision information to indicate the second background data transmission Strategy, or use the reason for formulating the second background data transmission strategy in the second decision information to indicate that the second background data transmission strategy is being formulated (that is, being negotiated).
- the first network element After the first network element receives the first message, it can query Table 1 and send the background data transmission strategy 1, the background data transmission strategy to the first strategy control network element. 2 and decision information 1.
- the first network element may send to the first policy control network element the data management service provided by the interface between the first network element and the first policy control network element_query response (DM_query response), and the DM_query response may Including all background data transmission strategies and second decision information saved by the first network element.
- DM_query response the data management service provided by the interface between the first network element and the first policy control network element_query response
- the first network element may store the corresponding relationship between the first decision information and the first reference identifier, for example, store the corresponding relationship between the first decision information and the first reference identifier in the foregoing Table 1.
- the first strategy control network element formulates a first background data transmission strategy according to the first decision information, all the background data transmission strategies saved by the first network element, and the second decision information.
- the first policy control network element may determine whether the second decision information affects the formulation of the first background data transmission strategy, and if the second decision information does not affect the formulation of the first background data transmission strategy, the first policy control network element
- the first background data transmission strategy can be formulated with reference to the method shown in Figure 1; if the second decision information influences the formulation of the first background data transmission strategy, the first strategy control network element can be formulated in the following way 1 or way 2 or way 3.
- the first background data transmission strategy is referred to the above, and will not be repeated.
- Method 1 The first strategy control network element formulates the first background data transmission strategy, the first background data transmission strategy and the second background data according to the first decision information, the second decision information and all the background data transmission strategies saved by the first network element The execution of the transmission strategy does not affect each other.
- the first strategy control network element can continue to formulate the first background data transmission strategy with reference to the method shown in FIG.
- the execution of the first background data transmission strategy and the second background data transmission strategy do not affect each other, such as requiring the execution of the first background data transmission strategy and the second background data transmission strategy to meet
- the time window of the first background data transmission strategy and the time window of the first background data transmission strategy do not overlap, when the first background data transmission strategy and the second background data transmission strategy are executed simultaneously in the same network area
- the maximum transmission rate will not exceed the preset threshold of network performance indicators set by the operator.
- the first strategy control network element delays the formulation of the first background data transmission strategy.
- the first strategy control network element can obtain the second background data transmission strategy, that is, after the second background data transmission strategy is formulated, the network is After there are no other background data transmission strategies being formulated, the first strategy controls the network element to formulate the first background data transmission strategy based on the first decision information, all the background data transmission strategies saved by the first network element, and the second background data transmission strategy.
- the first policy control network element acquiring the second background data transmission policy may include: the second policy control network element is different from the first policy control network element, and the first policy control network element obtains the first policy control network element from the first network element. 2. Background data transmission strategy.
- the second strategy control network element can receive the second decision information from the second application server and send the second decision information to the first network element. At the same time, the second strategy control network element receives the second decision information from the first network element.
- the element After the element obtains all the background data transmission strategies saved by the first network element, and formulates candidate background data transmission strategies based on all the background data transmission strategies, the second decision information and other information saved by the first network element, it interacts with the second application server Finally, the second background data transmission strategy is selected from the formulated candidate background data transmission strategies and sent to the first network element, which triggers the first network element to send it to the first policy control network element.
- the second policy control network element is the same as the first policy control network element, and after receiving the second decision information from the second application server, the second policy control network element obtains the first network element from the first network element.
- All background data transmission strategies saved by a network element based on all the background data transmission strategies saved by the first network element, the second decision information and other information to formulate candidate background data transmission strategies, and through interaction with the second application server, finally from The second background data transmission strategy is selected from the formulated candidate background data transmission strategies.
- the first strategy controls the network element to delay formulating the first background data transmission strategy.
- the second strategy controls the network element to fail to negotiate the second background data transmission strategy with the second application server.
- the second policy control network element requests the first network element to delete the second decision information
- the first network element requests the first policy control network element to delete the second decision information.
- the first network element can send the second decision information to the first policy control network element.
- the deletion instruction corresponding to the decision information After the first strategy control network element obtains the deletion instruction corresponding to the second decision information, it formulates the first background data transmission strategy according to the first decision information and all the background data transmission strategies saved by the first network element.
- deletion instruction corresponding to the second decision information can be replaced with the deletion instruction corresponding to the second reference identifier, and the deletion corresponding to the second decision information can be used to instruct to delete the second decision information and/or to delete the second decision information corresponding to the saved second decision information.
- the second background data transmission strategy can be replaced with the deletion instruction corresponding to the second reference identifier, and the deletion corresponding to the second decision information can be used to instruct to delete the second decision information and/or to delete the second decision information corresponding to the saved second decision information.
- the method further includes: A policy control network element subscribes to the first network element for the first event.
- the first event is an event notification that the background data transmission strategy/decision information saved by the first network element is changed, so that the first network element occurs in the saved background data transmission strategy.
- notify the first strategy control network element of the changed background data transmission strategy, or notify the first strategy control network element of all background data transmission strategies after the change in the first network element, or change the decision information The situation is notified to the first policy control network element.
- the background data transmission strategy change may include the addition or deletion or update of the background data transmission strategy.
- the change of the decision information may include deleting the decision information, or updating the content included in the decision information, or adding new decision information, and so on.
- the first policy control network element can refer to the method shown in Figure 1 to formulate the first background data transmission strategy, for example, the first policy control network element can be based on the first decision information and all the background data saved by the first network element Transmission strategy (including the second background data transmission strategy), current network status, operator strategy, etc. Formulate one or more candidate background data transmission strategies, and formulate candidate background data transmission strategies including the first background data transmission strategy, so that The first application server selects the first background data transmission strategy from the candidate background data transmission strategies.
- the first policy control network element can refer to the method shown in Figure 1 to formulate the first background data transmission strategy.
- the first policy control network element can be based on the first decision information and all the background data saved by the first network element Transmission strategy, current network status, operator strategy, etc.
- Formulate one or more candidate background data transmission strategies formulate candidate background data transmission strategies including the first background data transmission strategy, so that the first application server can transmit from the candidate background data
- the first background data transmission strategy is selected from the strategies.
- the first decision information may be obtained by the first network element in the first policy control network element, or may be stored locally by the first policy control network element.
- method shown in FIG. 5 may further include:
- the first policy control network element sends the first background data transmission policy and the first reference identifier to the first network element.
- the first policy control network element may send to the first network element the data management service_update request (DM_update request) provided by the interface between the first network element and the first policy control network element, and the DM_update request carries There is a first background data transmission strategy and a first reference identifier.
- DM_update request data management service_update request
- the first network element receives the first background data transmission strategy and the first reference identifier, correspondingly saves the first background data transmission strategy and the first reference identifier, and the first strategy controls the network element to send a confirmation message.
- the confirmation message may be a data management service_update response (DM_update response) provided by the interface between the first network element and the first policy control network element.
- DM_update response data management service_update response
- the third application server requests the third strategy control network element to formulate the background data transmission strategy according to the third decision information, and the third strategy control network
- the element requests the existing background data transmission strategy from the first network element, then the first network element can send all the existing background data transmission strategies and the first decision information to the third strategy control network element, so that the third strategy control network element Yuan formulates a background data transmission strategy based on the third decision information, the existing background data transmission strategy, and the first decision information, so as to avoid conflicts when multiple background data transmission strategies are formulated at the same time.
- the first policy control network element, the second policy control network element, and the third policy control network element may be the same or different, and are not limited.
- the strategy control network element formulates the background data transmission strategy, it not only refers to the existing background data transmission strategy, but also refers to other strategy control network elements to formulate the decision information needed for the background data transmission strategy, avoiding the development of the background data transmission strategy.
- the background data transmission strategy conflicts with other background data transmission strategies to ensure the availability of the background data transmission strategy.
- the policy control network element is PCF (for example, the first policy control network element is PCF2 and the second policy control network element is PCF1)
- the application server is AF (for example, the first application server is AF2).
- the second application server is AF1)
- the first network element is a UDR network element
- the first background data transmission strategy is a background data transmission strategy 2
- the second background data transmission strategy is a background data transmission strategy 1
- the first decision information is a decision Information 2.
- the second decision information is decision information 1.
- the method for formulating a background data transmission strategy provided in the embodiment of the present application is described.
- FIG. 6 is a flowchart of a method for formulating a background data transmission strategy provided by an embodiment of the application. As shown in FIG. 6, the method may include:
- S601 AF1 sends message 1 to NEF.
- AF1 can be any AF that provides background data in the system shown in FIG. 3a.
- message 1 can be used to request the formulation of background data transmission strategy 1
- message 1 can be the background data transmission strategy negotiation service provided by the Nnef interface_Create request (Nnef_BDTPNegotiantion_Create request)
- message 1 can carry the identity of AF1
- decision information 1 decision Information 1 can be used to develop background data transmission strategy 1.
- the decision information 1 may include one or more types of information such as the number of first terminals, the first time window, the first network area information, the first traffic when each terminal transmits background data, or the reason for formulating the background data transmission strategy 1. It should be noted that if AF1 initially formulates background data transmission strategy 1, it may not carry the reason for formulating background data transmission strategy 1.
- NEF receives message 1, and performs verification and authorization on message 1. NEF successfully authorizes message 1, and NEF sends message 1 to PCF1.
- NEF can check whether the AF1 identified by the ID has a contract with the network according to the ID of the AF1 carried in the message 1, such as whether there is a contract between the third-party provider and the operator, and if there is a contract, the authorization is successful Otherwise, the authorization fails and the process ends.
- PCF1 can be a PCF that can provide strategy formulation services for AF1.
- the message 1 sent by AF1 to NEF and the message 1 sent by NEF to PCF1 can carry the same content, but the message types of the two can be different.
- the message 1 sent by NEF to PCF1 can be the background data transmission provided by the Npcf interface.
- Policy control service_create request (Npcf_BDTPolicyControl_Create request)
- the message 1 sent by NEF to PCF1 may include the aforementioned decision information 1 and may also include the ID of AF1.
- the first network area information sent by AF1 to NEF and the first network area information sent by NEF to PCF1 identify the same area, they have different information formats.
- the first network area information sent by AF1 to NEF can be It is network area information that can be recognized by a third party, such as the geographic location in the 3GPP network, and so on.
- the first network area information sent by the NEF to the PCF1 may be network area information that can be identified by the core network element, such as a cell identity.
- PCF1 receives message 1, and sends message 2 to the UDR network element.
- message 2 can be the data management service provided by the Nudr interface_query request (Nudr_DM_query request), message 2 is used to request all the background data transmission strategies saved by the UDR network element, and message 2 can carry PCF1 for background data transmission strategy 1 allocation Reference ID: reference Id1 and the decision information 1 received above.
- This application is not limited to carrying reference Id1 and decision information 1 in message 2 and sending it to UDR.
- PCF1 can also send reference Id1 and decision information 1 to UDR through other messages.
- the decision information 1 may also include an indication that the background data transmission strategy 1 is being (that is, being negotiated).
- PCF1 can carry decision information 1 through special cells to indicate that the background data transmission strategy corresponding to reference Id1 is being negotiated, or include a special identifier in decision information 1 to indicate that the background data transmission strategy corresponding to reference Id1 is being negotiated, or It uses the reason for formulating the background data transmission strategy 1 in the decision information 1 to indicate that the background data transmission strategy corresponding to reference Id1 is being negotiated.
- the UDR network element receives the message 2, and returns all the background data transmission strategies saved by the UDR network element to the PCF1.
- the UDR network element correspondingly saves decision information 1 and reference Id1.
- the UDR network element if the UDR network element stores decision information required by other PCFs that are formulating background data transmission strategies at this time, the UDR network element also returns the decision information stored in the UDR network element.
- the PCF1 receives all the background data transmission strategies saved by the UDR network element, and formulates one or more candidate background data transmission strategies according to all the background data transmission strategies saved by the UDR network element, the current network status, and operator strategy.
- candidate background data transmission strategies are some background transmission data transmission strategies that may be selected by AF1 as background data transmission strategy 1.
- a candidate background data transmission strategy may include one or more types of information such as a strategy identifier, a recommended transmission time window, a maximum aggregate bit rate, and a billing group identifier.
- the process of PCF1 formulating one or more candidate background data transmission strategies based on all background data transmission strategies saved by UDR network elements, current network status, operator strategies, etc. can refer to the prior art, and will not be repeated.
- PCF1 formulates one or more candidate background data transmission strategies
- it executes S106 ⁇ S113 shown in Figure 1.
- PCF1 executes S106 ⁇ S113
- there will be other PCFs that also formulate background data transmission strategies such as PCF2.
- Background data transmission strategy, etc. that is, there are two or more PCFs at the same time to formulate background data transmission strategies.
- the process is as follows:
- message 3 can be Nnef_BDTPNegotiantion_Create request
- message 3 can include the ID of AF2 and decision information 2.
- the ID of AF2 can be used to identify AF2
- decision information 2 is as described in decision information 1 above
- decision information 2 can be used to make background data transmission Strategy 2.
- the decision information 2 may include the number of second terminals, the second time window, the second network area information, the second traffic when each terminal transmits background data, or the reason for formulating the background data transmission strategy 2.
- kind or multiple kinds of information It should be noted that if AF2 initially formulates background data transmission strategy 2, it may not carry the reason for formulating background data transmission strategy 2.
- NEF receives message 3, and checks and authorizes message 3. NEF successfully authorizes message 3, and NEF sends message 3 to PCF2.
- S607 can refer to the description of S602, which will not be repeated.
- PCF2 receives message 3 and sends message 4 to the UDR network element.
- message 4 can be Nudr_DM_query request, message 4 can be similar to message 2 above, message 4 can be used to request all existing/saved background data transmission strategies of UDR network elements, and message 4 can include PCF2 as a background data transmission strategy 2 Assigned reference Id2 and decision information 2.
- PCF2 can also send reference Id2 and decision information 2 to UDR through other messages.
- the decision information 2 may also include: an indication that the background data transmission strategy 2 is being negotiated.
- PCF2 can carry decision information 2 through special cells to indicate that the background data transmission strategy corresponding to reference Id2 is being negotiated, or include a special identifier in decision information 2 to indicate that the background data transmission strategy corresponding to reference Id2 is being negotiated, or It uses the reason for formulating the background data transmission strategy 2 in the decision information 2 to indicate that the background data transmission strategy corresponding to reference Id2 is being negotiated.
- the UDR network element receives the message 4, and returns all the existing background data transmission strategies and the decision information 1 received in S604 to the PCF2.
- the UDR network element correspondingly saves reference Id2 and decision information 2.
- UDR can carry decision information 1 through special cells to indicate that the background data transmission strategy corresponding to reference Id1 is being negotiated, or include a special identifier in decision information 1 to indicate that the background data transmission strategy corresponding to reference Id1 is being negotiated, or The reason value of the background data transmission strategy 1 in the decision information 1 is used to indicate that the background data transmission strategy corresponding to reference Id1 is being negotiated.
- the PCF2 determines that the decision information 1 influences the formulation of the background data transmission strategy 2.
- the decision information 1 influences the formulation of the background data transmission strategy 2 may include one of the overlap of the first time window and the second time window, and the overlap of the network area indicated by the first network area information and the network area indicated by the second network area information. Item or multiple items.
- PCF2 does not delay decision-making, but refers to S105-S113 shown in Figure 1, formulates one or more candidate background data transmission strategies, and instructs one or more candidate background data transmission strategies to AF2, and in AF2 from one or After the background data transmission strategy 2 is selected from the multiple candidate background data transmission strategies, the background data transmission strategy 2 is stored in the UDR network element. Specifically, the process can be referred to as shown in FIG. 1 and will not be repeated. At this point, PCF2 can formulate a background data transmission strategy in parallel with PCF1, and after S616 is executed, the process ends.
- PCF2 delays the decision, and formulates background data transmission strategy 2 after the following S618, that is, PCF1 and PCF2 formulate the background data transmission strategy in sequence, and the process ends after PCF2 finishes formulating the background data transmission strategy 2.
- the PCF1 formulates one or more candidate background data transmission strategies according to the decision information 1, all existing background data transmission strategies, current network status, and operator strategies, and sends a confirmation message 1 to NEF.
- the confirmation message 1 may be Npcf_BDTPNegotiantion_Create response, and the confirmation message 1 may carry one or more candidate background data transmission strategies formulated by reference Id1 and PCF1.
- NEF receives confirmation message 1, and returns notification message 1 to AF1.
- the notification message 1 may carry reference Id1 and one or more candidate background data transmission strategies.
- AF1 receives notification message 1. If AF1 decides to select one of the one or more candidate background data transmission strategies as background data transmission strategy 1, AF1 will carry reference Id1 in update request 1 sent to NEF And the strategy identifier of the selected background data transmission strategy 1; if AF1 rejects all candidate background data transmission strategies, AF1 will carry a rejection indication in the update request 1 sent to the NEF.
- the update request 1 may be Nnef_BDTPNegotiantion_Update request.
- NEF receives update request 1, and sends update request 1 to PCF1.
- update request 1 sent by AF1 to NEF and the update request 1 sent by NEF to PCF1 can carry the same content, but the message types can be different, and the update request 1 sent by NEF to PCF1 can be Npcf_BDTPolicyControl_Update request.
- PCF1 receives update request 1, and sends update request 2 to the UDR network element.
- the update request 2 may be Nudr_DM_Update Request.
- PCF1 may send update request 2 to the UDR according to the content in update request 1.
- the update request 1 carries the reference Id1 and the selected background data transmission strategy 1 policy identifier
- the update request 2 carries the reference Id1 and the selected background data transmission strategy 1
- the update request 1 carries a rejection indication
- the update The request may carry a reference Id1 and a deletion instruction, and the deletion instruction may be used to instruct to delete the decision information and/or background data transmission strategy corresponding to the reference Id1.
- S616 The UDR network element receives the update request 2, and returns a response to the update request 2 to the PCF1.
- the response of the update request 2 may be Nudr_DM_Update_response.
- the UDR network element correspondingly saves the reference Id1 and the new background data transmission strategy 1; or, the update request 2 carries the reference Id1 and
- the deletion instruction the decision information 1 corresponding to reference Id1 is deleted (that is, the saved background data transmission strategy 1 is deleted).
- S617 Based on the fact that PCF2 has previously subscribed to the UDR network element for the event notification of the background data transmission policy change, the UDR network element sends the new background data transmission policy 1 to PCF2 or deletes the instruction of decision information 1 corresponding to reference Id1 (ie deletes the background data) Transmission strategy 1 instructions).
- the UDR network element may send a Nudr_DM_Notificaion Request to the PCF2, and the Nudr_DM_NotificaionReqeust carries a new background data transmission strategy 1 or an instruction to delete the decision information 1 corresponding to the reference Id1 (that is, an instruction to delete the background data transmission strategy 1).
- the PCF2 receives the new background data transmission strategy 1 or the instruction to delete the decision information 1 (that is, the instruction to delete the background data transmission strategy 1), and returns a response message to the UDR network element.
- PCF2 formulates one or more candidate background data transmission strategies for AF2 based on decision information 2, all existing background data transmission strategies (including background data transmission strategy 1), current network status and operator strategies; or PCF2 makes decisions based on the decision Information 2. All existing background data transmission strategies (excluding background data transmission strategy 1), current network status, and operator strategy to formulate one or more candidate background data transmission strategies for AF2.
- the confirmation message 2 may be Npcf_BDTPNegotiantion_Create response, and the confirmation message 2 may carry one or more candidate background data transmission strategies formulated by reference Id2 and PCF2.
- NEF receives confirmation message 2 and returns notification message 2 to AF2.
- the notification message 2 may carry reference Id2 and one or more candidate background data transmission strategies.
- AF2 receives notification message 2. If AF2 decides to select one background data transmission strategy from one or more candidate background data transmission strategies as background data transmission strategy 2, AF2 sends the update request 3 to NEF with reference Id2 and The strategy identifier of the selected background data transmission strategy 2; if AF2 rejects all candidate background data transmission strategies, AF2 carries a rejection indication in the update request 3 sent to the NEF.
- the update request 3 may be Nnef_BDTPNegotiantion_Update request.
- NEF receives update request 3, and sends update request 3 to PCF2.
- update request 3 sent by AF2 to NEF and the update request 3 sent by NEF to PCF2 can carry the same content, but the message types can be different, and the update request 3 sent by NEF to PCF2 can be Npcf_BDTPolicyControl_Update request.
- PCF2 receives update request 3, and sends update request 4 to the UDR network element.
- the update request 4 may be Nudr_DM_Update Request. If update request 3 carries reference Id2 and selected background data transmission strategy 2, then update request 4 carries reference Id2 and selected background data transmission strategy 2; if update request 3 carries a rejection indication, update request 4 carries reference Id2 and delete Indication, the deletion instruction may be used to instruct to delete decision information 2 and/or background data transmission strategy 2 corresponding to reference Id2.
- the UDR network element receives the update request 4, and returns a response to the update request 4 to the PCF2.
- the response of the update request 4 may be Nudr_DM_Update_response.
- the UDR network element correspondingly saves the reference Id2 and the background data transmission strategy 2.
- the UDR deletes the decision information 2 (that is, deletes the saved background data transmission strategy 2).
- FIG. 7 is a flowchart of a method for formulating a background data transmission strategy provided by an embodiment of the application. As shown in FIG. 7, the method may include:
- the PCF1 determines that the network performance index is lower than or restored to a preset threshold.
- the preset threshold can be set according to needs and is not limited. For example, after the transmission window is allocated, if the network changes, the network load during this period will become relatively congested, and the fee rate will correspondingly become higher, resulting in a high transmission fee rate for users, which cannot meet the needs of users for network transmission at the lowest cost. The requirement that the network performance index is lower than the preset threshold.
- PCF1 can determine by itself whether the network performance index is lower than or restored to the preset threshold; or, PCF1 can learn from other network elements whether the network performance index is lower than or restored to the preset threshold, for example, PCF1 sends a subscription request to NWDAF
- the subscription request is used to obtain network performance index events.
- the network performance index events are the established background data transmission strategy (such as the background data transmission strategy 3 formulated according to the decision information 1).
- the network performance index during the time window is lower than or restored to Events with preset thresholds; PCF1 receives network performance indicator events notified by NWDAF.
- PCF1 has formulated the background data transmission strategy 3 corresponding to Reference Id1, and saves the background data transmission strategy 3 and decision information 1 in the UDR.
- message 2 can be the data management service provided by the Nudr interface_query request (Nudr_DM_query request), message 2 is used to request all the background data transmission strategies saved by the UDR network element, and message 2 can carry PCF1 for background data transmission strategy 1 allocation Reference ID: reference Id1 and the decision information 1 received above.
- PCF1 can also send reference Id1 and decision information 1 to UDR through other messages.
- PCF1 first sends message 2 to the UDR, requesting the background data transmission strategy saved by the UDR.
- UDR sends the saved background data transmission strategy and corresponding decision information to PCF1, including background data transmission strategy 3 and decision information 1 (this is also used for decision background data transmission strategy 1) for decision background data transmission strategy 3
- the decision information 1 at the time does not include the indication that the background data transmission strategy 1 is being negotiated or the reason for formulating the background data transmission strategy 1).
- PCF1 determines to re-formulate background data transmission strategy 1
- PCF1 sends the updated decision information 1 to UDR through other messages.
- the decision information 1 sent by PCF1 to UDR includes the number of first terminals, the first time window, the first network area information, the first traffic when each terminal transmits background data, or the reason for formulating the background data transmission strategy 1.
- the information may be stored locally in PCF1 or obtained from UDR, it may also include an indication that the background data transmission strategy is being developed (ie, negotiated).
- PCF1 can carry decision information 1 through special cells to indicate that the background data transmission strategy corresponding to reference Id1 is being negotiated, or include a special identifier in decision information 1 to indicate that the background data transmission strategy corresponding to reference Id1 is being negotiated, or It uses the reason for formulating the background data transmission strategy in the decision information 1 to indicate that the background data transmission strategy corresponding to reference Id1 is being negotiated.
- the UDR network element receives the message 2, and returns all the background data transmission strategies saved by the UDR network element to the PCF1.
- the UDR network element correspondingly saves decision information 1 and reference Id1.
- the UDR network element if the UDR network element stores decision information required by other PCFs that are formulating background data transmission strategies at this time, the UDR network element also returns the decision information stored in the UDR network element.
- the PCF1 receives all the background data transmission strategies saved by the UDR network element, and formulates one or more candidate background data transmission strategies according to all the background data transmission strategies saved by the UDR network element, the current network status, and the operator strategy.
- candidate background data transmission strategies are some background transmission data transmission strategies that may be selected by AF1 as background data transmission strategy 1.
- a candidate background data transmission strategy may include one or more types of information such as a strategy identifier, a recommended transmission time window, a maximum aggregate bit rate, and a charging group identifier.
- the process of PCF1 formulating one or more candidate background data transmission strategies based on all background data transmission strategies saved by UDR network elements, current network status, operator strategies, etc. can refer to the prior art, and will not be repeated.
- PCF1 formulates one or more candidate background data transmission strategies
- it executes S106 ⁇ S113 shown in Figure 1.
- PCF1 executes S106 ⁇ S113
- there will be other PCFs that also formulate background data transmission strategies such as PCF2.
- Background data transmission strategy, etc. that is, there are two or more PCFs at the same time to formulate background data transmission strategies.
- the process is as follows:
- PCF2 determines that the network performance index is lower than or restored to a preset threshold.
- PCF2 has formulated the background data transmission strategy 4 corresponding to Reference Id2, and saves the background data transmission strategy 4 and decision information 2 in the UDR.
- S705 can refer to the description of S701, which will not be repeated.
- S705 can also be replaced with a process in which AF2 requests PCF2 to formulate a background data transmission strategy, for example, it can be replaced with the above-mentioned S606 to S607.
- PCF2 sends message 4 to the UDR network element.
- the UDR network element receives the message 4, and returns all the existing background data transmission strategies and the decision information 1 received in S703 to the PCF2.
- UDR carries decision information 1 through special cells to indicate that the background data transmission strategy corresponding to reference Id1 is being negotiated, or includes a special identifier in decision information 1 to indicate that the background data transmission strategy corresponding to reference Id1 is being negotiated, or The reason for formulating the background data transmission strategy 1 in the decision information 1 indicates that the background data transmission strategy corresponding to reference Id1 is being negotiated.
- PCF2 determines that decision information 1 influences the formulation of background data transmission strategy 2.
- PCF2 does not delay the formulation of background data transmission strategy 2, but formulates background data transmission strategy 2 based on decision information 2, decision information 1, and all existing background data transmission strategies, except that background data transmission strategy 1 and background data
- the execution of transmission strategy 2 does not affect each other.
- the time windows of background data transmission strategy 1 and background data transmission strategy 2 are set to not overlap and/or background data transmission strategy 1 and background data transmission strategy 2 are in the network intersection area (such as the same area). )
- the maximum transmission rate will not exceed the preset threshold of the network performance index set by the operator, etc.
- PCF2 delays the decision. For example, after PCF2 obtains background data transmission strategy 1 in subsequent S715, it formulates background data transmission strategy 2 based on decision information 2, all background data transmission strategies saved by UDR network elements and background data transmission strategy 1. As described below, after PCF2 receives the background data transmission strategy 1 from the UDR network element, it can formulate a background data transmission strategy 2 based on the decision information 2, all the background data transmission strategies saved by the UDR network element and the background data transmission strategy 1.
- the PCF2 delays the decision, and after obtaining an indication that the decision information 1 sent by the UDR is deleted in S715, the PCF2 formulates the background data transmission strategy 2 according to the decision information 2 and all the background data transmission strategies stored in the UDR.
- PCF1 failed to negotiate background data transmission strategy 1 with the third-party application server, and PCF1 sends an instruction to delete decision information 1 (that is, an instruction to delete background data transmission strategy 1) to UDR, instructing UDR To delete decision information 1, UDR instructs PCF2 to delete decision information 1.
- the PCF2 receives the UDR's instruction, it formulates a background data transmission strategy 2 based on the decision information 2 and all the background data transmission strategies stored in the UDR.
- the PCF1 formulates one or more candidate background data transmission strategies according to the decision information 1, all existing background data transmission strategies, current network status, and operator strategies, and sends a confirmation message 1 to NEF.
- the decision information 1 is obtained by PCF1 from the UDR, or it can be saved locally by PCF1 when AF1 requests a background data transmission strategy from PCF1.
- NEF receives confirmation message 1, and returns notification message 1 to AF1.
- AF1 receives notification message 1. If AF1 decides to select one of the one or more candidate background data transmission strategies as background data transmission strategy 1, AF1 sends the update request 1 to NEF with reference Id1 and The strategy identifier of the selected background data transmission strategy 1; if AF1 rejects all candidate background data transmission strategies, AF1 carries a rejection indication in the update request 1 sent to the NEF.
- NEF receives update request 1, and sends update request 1 to PCF1.
- PCF1 receives update request 1, and sends update request 2 to the UDR network element.
- the update request 2 may be Nudr_DM_Update Request.
- PCF1 may send update request 2 to the UDR according to the content in update request 1.
- the update request 1 carries the reference Id1 and the selected background data transmission strategy 1 policy identifier
- the update request 2 carries the reference Id1 and the selected background data transmission strategy 1
- the update request 1 carries a rejection indication
- the update The request may carry a reference Id1 and a deletion instruction, and the deletion instruction may be used to instruct to delete the decision information and/or background data transmission strategy corresponding to the reference Id1.
- the UDR network element receives the update request 2, and returns a response to the update request 2 to the PCF1.
- the UDR network element updates the background data transmission strategy 3 corresponding to the reference Id1 to the background data transmission strategy 1.
- the UDR deletes the indication that the background data transmission strategy is making or the reason for the background data transmission strategy from the decision information 1; or, when the update request 2 carries the reference Id1 and the deletion indication, the decision information corresponding to the reference Id1 is deleted 1 and/or and background data transmission strategy 3.
- the PCF2 receives the background data transmission strategy 1 or reference Id1 and the deletion instruction, and returns a response message to the UDR network element.
- PCF2 formulates one or more candidate background data transmission strategies for AF2 based on decision information 2, all existing background data transmission strategies (including background data transmission strategy 1), current network status and operator strategies; or according to decision information 2. All existing background data transmission strategies (excluding background data transmission strategy 3), current network status, and operator strategy formulate one or more candidate background data transmission strategies for AF2.
- NEF receives confirmation message 2 and returns notification message 2 to AF2.
- the notification message may carry Reference Id2 and one or more candidate background data transmission strategies.
- S720 AF2 receives notification message 2, selects one background data transmission strategy from one or more candidate background data transmission strategies as background data transmission strategy 2, and sends an update request 3 to NEF.
- NEF receives update request 3, and sends update request 3 to PCF2.
- PCF2 receives update request 3, and sends update request 4 to the UDR network element.
- the update request 4 may be Nudr_DM_Update Request. If update request 3 carries reference Id2 and selected background data transmission strategy 2, then update request 4 carries reference Id2 and selected background data transmission strategy 2; if update request 3 carries a rejection indication, update request 4 carries reference Id2 and delete Indication, the deletion instruction may be used to instruct to delete decision information 2 and/or background data transmission strategy 2 corresponding to reference Id2.
- the UDR network element receives the update request 4, and returns a response to the update request 4 to the PCF2.
- the UDR network element updates the background data transmission strategy 4 corresponding to the reference Id2 to the background data transmission strategy 2.
- UDR deletes the indication that the background data transmission strategy is being formulated or the reason for formulating the background data transmission strategy from the decision information 2; or, if the update request 2 carries reference Id2 and the deletion instruction, deletes the decision information corresponding to reference Id2 2 and/or saved background data transmission strategy 4.
- multiple PCFs can re-formulate the background data transmission strategy when the network performance index is low or return to normal values, and when formulating the background data transmission strategy, not only refer to the existing background data transmission strategy, It also refers to the decision-making information required by other PCFs to formulate background data transmission strategies, avoids conflicts with background data transmission strategies formulated by itself and background data transmission strategies formulated by other PCFs, and ensures the availability of background data transmission strategies.
- the method shown in Figure 6 or Figure 7 can be applied to the 5G communication system shown in Figure 3a.
- the method shown in Figure 6 or Figure 7 can also be applied to the 4G communication system shown in Figure 3b.
- the PCF in the method shown in FIG. 6 or FIG. 7 is replaced with PCRF, the UDR network element is replaced with SPR, and the NEF is replaced with SCEF, the method shown in FIG. 6 or FIG. 7 can be applied to the 4G communication system shown in FIG. 3b.
- each node for example, the first policy control network element, in order to implement the above-mentioned functions, includes hardware structures and/or software modules corresponding to each function.
- the method of the embodiments of the present application can be implemented in the form of hardware, software, or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered as going beyond the scope of this application.
- the embodiment of the present application can divide the first policy control network element into functional modules according to the above method examples.
- each functional module can be divided corresponding to each function, or two or more functions can be integrated into one processing module.
- the above-mentioned integrated modules can be implemented in the form of hardware or software function modules. It should be noted that the division of modules in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
- FIG. 8 shows a structural diagram of a communication device 80.
- the communication device 80 may be a first policy control network element, a chip in the first policy control network element, a system on a chip, or other methods that can implement the first policy control in the above method.
- the communication device 80 may be used to execute the function of the first policy control network element involved in the foregoing method embodiment.
- the communication device 80 shown in FIG. 8 includes: a sending unit 801, a receiving unit 802, and a processing unit 803;
- the sending unit 801 is configured to send a first message to a first network element, where the first message is used to request a background data transmission strategy saved by the first network element.
- the sending unit 801 is used to support the communication device 80 to execute S501, S608, and S706.
- the receiving unit 802 is configured to obtain from the first network element the background data transmission strategy and the second decision information stored in the first network element, and the second decision information is used to formulate the second background data transmission strategy.
- the receiving unit 802 is used to support the communication device 80 to perform S502, S609, and S707.
- the processing unit 803 is configured to formulate a first background data transmission strategy based on the first decision information, the second decision information, and the background data transmission strategy saved by the first network element, and the first decision information is used to formulate the first background data transmission strategy information.
- the processing unit 803 is used to support the communication device to execute S503, S619, and S717.
- the processing unit 803 is specifically configured to not delay formulating the first background data transmission strategy when the second decision information affects the decision/making of the first background data transmission strategy, but based on the first decision information
- the second decision information and the background data transmission strategy saved by the first network element formulate the first background data transmission strategy, but the execution of the first background data transmission strategy and the second background data transmission strategy do not affect each other.
- the processing unit 803 is specifically configured to delay the formulation of the first background data transmission strategy when the second decision information affects the decision/formulation of the first background data transmission strategy, such as when the second background data transmission strategy is acquired.
- the first background data transmission strategy is formulated according to the first decision information, the second background data transmission strategy, and the background data transmission strategy saved by the first network element.
- the receiving unit 802 is further configured to receive the first decision information from the first application server, for example, the receiving unit 802 receives the second message from the first application server , The second message includes the first decision information, and the second message is used to request the formulation of the first background data transmission strategy.
- the sending unit 801 is specifically configured to send the first message to the first network element according to the second message.
- the second message is a trigger condition for the sending unit 801 to send the first message.
- the sending unit 801 is specifically configured to send a first message to the first network element when the network performance index is lower than or recovers to a preset threshold.
- the network performance index may refer to the network according to the third background data.
- the transmission strategy is a performance index when the background data is transmitted.
- the third background data transmission strategy may be a background data transmission strategy formulated according to the first decision information before the first background data transmission strategy is formulated.
- the first message may include the first reference identifier and the first decision information, so that the first network element correspondingly saves the first reference identifier and the first decision information, and when other policy control network elements formulate the background data transmission strategy,
- the first decision information is provided to other policy control network elements to avoid conflicts between the background data transmission strategy formulated by other policy control network elements and the background data transmission strategy corresponding to the first decision information.
- the communication device 80 is configured to perform the function of the first strategy controlling the network element in the method of formulating a background data transmission strategy shown in the methods shown in FIGS. 5-7, and therefore can achieve the same effect as the aforementioned method of formulating a background data transmission strategy.
- the communication device 80 can also be presented in the form of dividing various functional modules in an integrated manner.
- the "functional module” here can refer to an application specific integrated circuit (ASIC), a circuit, a processor and memory that executes one or more software or firmware programs, an integrated logic circuit, and/or other functions that can provide the above-mentioned functions.
- ASIC application specific integrated circuit
- the communication device 80 may take the form of the communication device 400 shown in FIG. 4.
- the processor 401 in the communication device 400 shown in FIG. 4 may invoke the computer-executable instructions stored in the memory 404 to make the communication device 400 execute the method of formulating a background data transmission strategy in the foregoing method embodiment.
- the function/implementation process of the sending unit 801 and the receiving unit 802 in FIG. 8 can be implemented by the processor 401 in the communication device 400 shown in FIG. 4 calling the computer execution instructions stored in the memory 404.
- the functions/implementation process of the sending unit 801 and the receiving unit 802 in FIG. 8 can be implemented through the communication interface 403 in the communication device 400 shown in FIG. 4.
- the function/implementation process of the processing unit 803 in FIG. 8 may be implemented by the processor 401 in the communication device 400 shown in FIG. 4.
- the foregoing embodiment describes the process in which the PCF triggers the PCF to re-formulate (ie renegotiate) the background data transmission strategy when the network performance index is lower than or recovers to the preset threshold, or the application server triggers the PCF to formulate the background data transmission strategy in the process , How to avoid the conflicts of background data transmission strategies between different PCFs.
- the process of PCF formulating the background data transmission strategy in addition to considering the conflict of background data transmission strategies formulated by different PCFs, it is also necessary to consider whether the background data transmission strategy that the PCF is formulating (that is, under negotiation) will affect other UEs
- the formulation of strategies such as the formulation of UE strategies and UE session management strategies that affect the UE.
- this application also provides the session management solution shown in FIG. 9.
- the session management method provided by the embodiment of this application can be used in the network shown in FIG. 9. As shown in FIG. 9, it is a communication system 10 provided by this embodiment of the application. One network element.
- the second policy control network element can be used to formulate background data transmission policies, quality of service policies, slice selection policies and other policies and charging control rules (policy and charging control rules, PCC), and the policies to be formulated Provided to network elements such as mobility management network elements and session management network elements.
- policy and charging control rules PCC
- the first network element which may be called a network storage network element, is used to store user data, such as user subscription information, authentication or authorization data, and so on.
- the network storage network element may be a UDM network element, an NRF network element, or a UDR network element.
- the second policy control network element is configured to receive a policy association establishment request corresponding to the session establishment request of the user equipment UE, and send to the first network element the first background data transmission for requesting application to the session The fourth message of the strategy.
- the first network element is configured to receive the fourth message and send the first decision information to the second policy control network element.
- the second policy control network element is further configured to obtain first decision information corresponding to the first background data transmission strategy from the first network element, and manage the session according to the first decision information.
- the management of the session by the second policy control network element according to the first decision information includes:
- the second policy control network element is specifically configured to reject the establishment request of the policy association according to the first decision information, or accept the establishment request of the policy association according to the first decision information.
- the second policy control network element accepts the establishment request of the policy association according to the first decision information
- the second policy control network element is further configured to receive the first background corresponding to the first decision information sent by the first network element
- the session management strategy for the session for policy charging control is formulated according to the first background data transmission strategy, and the session management strategy for the session is sent to the session management network element.
- the second policy control network element is also used to terminate the policy association according to the first background data transmission policy after receiving the first background data transmission policy sent by the first network element.
- the second policy control network element is also used to terminate the policy association after receiving the deletion instruction corresponding to the first decision information.
- the second policy control network element is configured to receive a policy association establishment request corresponding to the registration request of the user equipment, and send a fourth message for requesting the first background data transmission policy applied to the UE to the first network element.
- the first network element is configured to receive the fourth message and send the first decision information to the second policy control network element.
- the second strategy control network element is also used to obtain first decision information corresponding to the first background data transmission strategy from the first network element, and formulate the UE strategy of the UE according to the first decision information.
- the second policy control network element formulating the UE policy of the UE according to the first decision information may include:
- the second strategy control network element is specifically used to delay formulating the UE strategy of the UE, and after obtaining the first background data transmission strategy corresponding to the first decision information, formulate the UE strategy of the UE according to the first context data transmission strategy.
- the second policy control network element is also used for the second policy control network element to send a policy association establishment response, and the policy association establishment response does not carry the UE policy of the UE.
- FIG. 9 is only an exemplary architecture diagram.
- the system may also include other functional network elements, such as the first policy control network element.
- the name of each device in FIG. 9 is not limited.
- each device can also be named with other names, such as replacing it with a network element name with the same or similar functions, without limitation.
- the first policy control network element is used to send the first decision information to the first network element.
- the communication system shown in FIG. 9 may be a third generation partnership project (3rd generation partnership project, 3GPP) communication system, and FIG. 9 may be the 4th generation (4G) communication system shown in FIG. 3b.
- the evolution (long term evolution, LTE) system can also be the fifth generation (5G) communication system shown in Figure 3a or the new radio (NR) system, the next generation communication system, etc., or it can be a non-
- the 3GPP communication system is not restricted.
- the second policy control network element in the embodiment of the present application may also be referred to as a communication device, which may be a general-purpose device or a dedicated device, which is not specifically limited in the embodiment of the present application.
- the related functions of the second policy control network element in the embodiment of the present application may be implemented by one device, or jointly implemented by multiple devices, or implemented by one or more functional modules in one device.
- the embodiments of the present application do not specifically limit this. It is understandable that the above functions can be network elements in hardware devices, software functions running on dedicated hardware, or a combination of hardware and software, or instantiated on a platform (for example, a cloud platform) Virtualization function.
- each device (such as the second policy control network element, etc.) shown in FIG. 9 may adopt the composition structure shown in FIG. 4 or include the components shown in FIG. 4.
- the determination in the embodiments of this application can also be understood as creating (create) or generating (generate), the "including” in the embodiments of this application can also be understood as “carrying”, and the “making” in the embodiments of this application can also be understood For “decision-making” or “determination”, etc., the unified description is provided here, and the embodiments of the present application do not specifically limit this.
- a session management method provided by an embodiment of this application may include:
- the second policy control network element receives a request for establishing a policy association.
- the second policy control network element may be any policy control network element in the communication system shown in FIG. 2a.
- the establishment request of the policy association may correspond to the establishment request of the user equipment (UE) session.
- the request for establishing a policy association may be replaced with a request for establishing a session management policy association, which is used to request the establishment of a session management policy of the UE's session.
- the session management policy of the UE’s session is used to perform policy and charging control on the session.
- the session management policy can at least include policy charging control rules, which can be used to specify the PDU session established by the UE for the transmission of background data.
- Related performance parameters such as specifying the QoS (quanlity of service, QoS) parameters, maximum rate, etc. of the PDU session.
- the UE’s session establishment request is used to request the establishment of the UE’s session.
- the UE’s session establishment request may be the UE’s protocol data unit (PDU) session establishment request
- the UE’s The session may be a PDU session of the UE.
- PDU protocol data unit
- the second policy control network element may receive a request for establishing a policy association from a session management network element (such as SMF).
- a session management network element such as SMF
- the second policy control network element sends a fourth message to the first network element.
- the first network element receives the fourth message.
- the first network element may be a UDR network element, a UDM network element, an NRF network element, or other network elements capable of storing background data transmission strategies.
- the relevant description of the first network element refer to the description in S501, which will not be repeated.
- the fourth message may be used to request the background data transmission strategy corresponding to the first reference identifier applied to the UE and stored by the first network element.
- the background data transmission strategy corresponding to the first reference identifier may be the background data transmission strategy that needs to be obtained to formulate the first strategy, that is, the background data transmission strategy corresponding to the first reference identifier is associated with formulating the first strategy, and when it is possible to formulate the first strategy It is necessary to refer to the background data transmission strategy corresponding to the first reference identifier.
- the first policy control network element negotiates with the first application server with reference to the foregoing embodiment, formulates a third background data transmission strategy corresponding to the first reference identifier according to the first decision information, and saves it in the first network element.
- the first policy control network element decides to reformulate the background data transmission strategy corresponding to the first reference identifier (that is, the first background data transmission strategy) due to the reasons described in the foregoing embodiment.
- the first background data transmission strategy is a background data transmission strategy that has not been completed or is being developed (ie, negotiated), and the third background data transmission strategy is an invalid background data transmission strategy.
- the fourth message may include a first reference identifier
- the first reference identifier may be used to identify the first background data transmission strategy and the third background data transmission strategy
- the third background data transmission strategy is the old background data transmission strategy.
- the first background data transmission strategy may be a newly formulated background data transmission strategy.
- the first reference identifier may also be used to identify the first decision information corresponding to the first background data transmission strategy.
- the first network element sends the first decision information to the second policy control network element according to the fourth message.
- the second policy control network element obtains the first decision information from the first network element.
- the first decision information may include the number of first terminals, the first time window, the first network area information, the first traffic when each terminal transmits background data, the indication that the first background data transmission strategy is being negotiated, or the first One or more types of information such as the reason for the background data transmission strategy.
- the first network element may carry the first decision information through special information elements to indicate that the background data transmission strategy is being formulated (ie, negotiation), or include a special identifier in the first decision information to indicate that the background data transmission strategy is being formulated (ie, negotiate) ), or use the reason for formulating the background data transmission strategy in the first decision information to indicate that the background data transmission strategy is being developed (that is, negotiated).
- the process for the first network element to send the first decision information saved by the first network element to the second policy control network element may refer to the description in S502, and details are not repeated.
- the second policy control network element manages the session of the UE according to the first decision information.
- the second policy control network element can determine whether the first decision information affects the formulation of the UE’s session management strategy. If the first decision information does not affect the formulation of the UE’s session management strategy, the second policy control network element can refer to The existing method manages the session of the UE; if the first decision information affects the formulation of the session management strategy of the UE, the second policy control network element can use the following method 1 or method 2 to manage the session of the UE. Where the first decision information affects the formulation of the UE's session management strategy may include one or more of the following situations: for example, it is determined not to consider the first background data transmission strategy according to the network strategy configured by the operator.
- Manner 1 The second policy control network element rejects the establishment request of the policy association according to the first decision information, and stops formulating the session management policy of the UE.
- Manner 2 The second policy control network element accepts the establishment request of the policy association according to the first decision information.
- the second strategy control network element delays formulating the first strategy until the second strategy control network element obtains the first background data transmission strategy corresponding to the first decision information, and then according to the first background data transmission strategy Formulate the session management strategy of the UE's session, send the session management strategy of the session to the session management network element, and trigger the session management network element to establish the UE's session. or,
- the second strategy control network element when the first background data transmission strategy is formulated, after the second strategy control network element obtains the first background data transmission strategy, if the first background data transmission strategy conflicts with the session of the UE, it will be based on the first background data transmission strategy.
- a background data transmission strategy termination strategy association when the first background data transmission strategy is formulated, after the second strategy control network element obtains the first background data transmission strategy, if the first background data transmission strategy conflicts with the session of the UE, it will be based on the first background data transmission strategy.
- a background data transmission strategy termination strategy association or,
- the first application server rejects the background data transmission strategy generated by the first policy control network element, and sends a rejection instruction to the first policy control network element, and the first policy
- the control network element sends the first reference identifier and the deletion instruction to the first network element
- the first network element sends the deletion first reference identifier and the deletion instruction to the second policy control network element
- the second policy control network element receives the deletion instruction , Terminate policy association.
- the termination policy association of the second policy control network element may refer to the second policy control network element sending a termination request message to the session management network element, and the termination request message is used to indicate the termination policy association.
- the method further includes: the second policy control network element subscribes to the first network element
- the first event is an event notification that the background data transmission strategy/decision information saved by the first network element is changed, so that when the saved background data transmission strategy is changed, the first network element will notify the changed background data transmission strategy To the second policy control network element, or notify the second policy control network element of all background data transmission policies after the change in the first network element, or notify the second policy control network element of the change of the decision information.
- the background data transmission strategy change may include the addition or deletion or update of the background data transmission strategy.
- the change of the decision information may include deleting the decision information, or updating the content included in the decision information, or adding new decision information, and so on.
- the policy control network element when the policy control network element formulates the session management strategy for the UE’s session, it can obtain the decision information needed to formulate other UE strategies from the first network element, and manage the session with reference to the obtained decision information , To avoid the problem of conflict between the background data transmission strategy and the session management strategy of the UE’s session corresponding to the decision information formulated, and to ensure the availability of the background data transmission strategy and other UE strategies.
- the second strategy control network element can also formulate other UE strategies other than the background data transmission strategy, such as the UE strategy, etc., according to the decision information, so as to avoid the UE’s other than background data transmission. Strategies other than the strategy conflict with other strategies, causing the background data transmission to fail.
- the method for the second strategy control network element to formulate the UE strategy of the UE based on the decision information can be referred to as shown in FIG. 10, which may include the following (1) to (4):
- the second policy control network element receives the establishment request of the policy association corresponding to the registration request of the user equipment.
- the policy association establishment request corresponding to the registration request of the user equipment may be a UE policy association establishment request, which is used to request the establishment of a UE policy.
- the UE policy can be used to instruct the UE to establish a PDU session for transmitting background data.
- the registration request can request registration to the network.
- the second policy control network element may receive a request for establishing a policy association corresponding to the registration request of the user equipment from the session management network element.
- the second policy control network element sends a fourth message for requesting the first background data transmission policy applied to the UE to the first network element. This step is the same as S1002 and will not be repeated.
- the second strategy control network element obtains the first decision information corresponding to the first background data transmission strategy from the first network element. This step is the same as S1003 and will not be repeated.
- the second strategy control network element formulates the UE strategy of the UE according to the first decision information.
- the second policy control network element may delay formulating the UE policy of the UE, and after obtaining the first background data transmission policy corresponding to the first decision information, formulate the UE policy of the UE according to the first background data transmission policy.
- the second policy control network element sends a policy association establishment response, and the policy association establishment response does not carry the UE policy of the UE.
- the second policy control network element sends a policy association without UE policy to the session management network element.
- the establishment response is not carried.
- the strategy control network element when the strategy control network element formulates the UE strategy of the UE, it can obtain the decision information needed to formulate other UE strategies from the first network element, and make reference to the obtained decision information to formulate the UE strategy, avoiding the corresponding decision information.
- the background data transmission strategy conflicts with the UE strategy to ensure the availability of the background data transmission strategy and the UE strategy.
- the policy control network element is PCF (for example, the first policy control network element is PCF2 and the second policy control network element is PCF1)
- the application server is AF (for example, the first application server is AF2).
- the second application server is AF1)
- the first network element is a UDR network element
- the first background data transmission strategy is a background data transmission strategy 1
- the first decision information is decision information 1
- PCF1 updates or renegotiates a background data transmission strategy 1
- PCF2 formulates UE strategy and UE session management strategy as an example, and introduces the method shown in FIG. 10.
- the 5G communication system shown in Figure 3a may also include: access and mobility management function (AMF), session management function (session management function, SMF) And other network elements are not restricted.
- AMF access and mobility management function
- SMF session management function
- FIG. 11 is a flowchart of a method for formulating a UE strategy and a session management strategy based on a background data transmission strategy provided by an embodiment of the application. As shown in FIG. 11, the method may include:
- PCF1 determines that the network performance index is lower than or restored to a preset threshold.
- the preset threshold can be set according to needs and is not limited. For example, after the transmission window is allocated, if the network changes, the network load during this period will become relatively congested, and the fee rate will correspondingly become higher, resulting in a high transmission fee rate for users, which cannot meet the needs of users for network transmission at the lowest cost. The requirement that the network performance index is lower than the preset threshold.
- PCF1 can determine by itself whether the network performance index is lower than or restored to the preset threshold; or, PCF1 can learn from other network elements whether the network performance index is lower than or restored to the preset threshold, for example, PCF1 sends a subscription request to NWDAF
- the subscription request is used to obtain network performance index events.
- the network performance index events are the established background data transmission strategy (such as the background data transmission strategy 3 formulated according to the decision information 1).
- the network performance index during the time window is lower than or restored to Events with preset thresholds; PCF1 receives network performance indicator events notified by NWDAF.
- PCF1 formulates background data transmission strategy 3 according to decision information 1, and saves decision information 1 and background data transmission strategy 3 corresponding to reference Id1 in UDR.
- message 1 can be the data management service provided by the Nudr interface_query request (Nudr_DM_query request), message 1 is used to request all background data transmission strategies saved by the UDR network element, and message 1 can carry PCF1 for background data transmission strategy 3 allocation Reference ID: reference Id1 and decision information 1.
- This application is not limited to carrying reference Id1 and decision information 1 in message 1 and sending it to the UDR network element.
- PCF1 can also send reference Id1 and decision information 1 to the UDR network element through other messages.
- PCF1 can carry decision information 1 in a special cell to indicate that the background data transmission strategy corresponding to reference Id1 is being formulated, or include a special identifier in decision information 1 to indicate that the background data transmission strategy corresponding to reference Id1 is being formulated , Or use the reason for formulating the background data transmission strategy in the decision information 1 to indicate that the background data transmission strategy corresponding to reference Id1 is being formulated.
- the above information is also used to indicate that the background data transmission strategy 3 is not an effective background data transmission strategy.
- S1103 The UDR network element receives message 1, and returns to PCF1 all the background data transmission strategies saved by the UDR network element.
- the UDR network element correspondingly saves decision information 1 and reference Id1.
- the UDR network element if the UDR network element stores decision information required by other PCFs that are formulating background data transmission strategies at this time, the UDR network element also returns the decision information stored in the UDR network element.
- the PCF1 receives all the background data transmission strategies saved by the UDR network element, and formulates one or more candidate background data transmission strategies according to all the background data transmission strategies saved by the UDR network element, the current network status, and the operator strategy.
- candidate background data transmission strategies are some background transmission data transmission strategies that may be selected by AF1 as background data transmission strategy 1.
- a candidate background data transmission strategy may include one or more types of information such as a strategy identifier, a recommended transmission time window, a maximum aggregate bit rate, and a charging group identifier.
- the process of PCF1 formulating one or more candidate background data transmission strategies based on all background data transmission strategies saved by UDR network elements, current network status, operator strategies, etc. can refer to the prior art, and will not be repeated.
- PCF1 formulates one or more candidate background data transmission strategies
- it executes S116-S113 shown in Figure 1.
- Session management strategy there will be other PCFs that need to formulate UE strategies or based on the background data transmission strategies. Session management strategy. Specifically, the process is as follows:
- S1105 The UE initiates a registration request to the AMF, and the AMF receives the registration request of the UE.
- the registration request of the UE is used to request registration to the network.
- AMF sends a UE policy association establishment request to PCF2, and PCF2 determines based on UE's subscription information, network policy, or obtained application data, etc., that it needs to obtain a reference Id1 corresponding background data transmission policy to formulate a UE policy.
- the UE policy association between AMF and PCF2 is used for PCF2 to provide the AMF with the UE policy sent to the UE.
- message 2 can be used to request the background data transmission strategy corresponding to reference Id1, and message 2 can include reference Id1.
- UDR network elements can carry special information elements in decision information 1 to indicate that the background data transmission strategy corresponding to reference Id1 is being negotiated, or include a special identifier in decision information 1 to indicate that the background data transmission strategy corresponding to reference Id1 is being negotiated , Or use the reason for formulating the background data transmission strategy 1 in the decision information 1 to indicate that the background data transmission strategy corresponding to reference Id1 is being negotiated.
- UDR also returns background data transmission strategy 3 to PCF2.
- Decision information 1 indicates that the background data transmission strategy 3 has expired.
- the PCF2 determines that the decision information 1 influences the formulation of the UE strategy.
- PCF2 Since decision information 1 indicates that the background data transmission strategy corresponding to reference Id1 is being developed or decision information 1 indicates that the background data transmission strategy 3 has expired, PCF2 does not make decisions based on decision information 1 or background data transmission strategy 3/make background data transmission strategy 3 UE strategy, or delay according to the background data transmission strategy 1 decision/formulation of the UE strategy corresponding to the background data transmission strategy 1.
- the UE policy association establishment response does not carry the UE policy that needs to be formulated according to the background data transmission policy 1 or the background data transmission policy 3.
- S1111 After the UE is successfully registered, the UE sends a PDU session establishment request to the AMF, and the AMF further sends a PDU session establishment request to the SMF. SMF received a PDU session establishment request from AMF.
- S1112 The SMF sends a session management policy association establishment request to the PCF2, and the PCF2 determines that it needs to obtain the background data transmission policy corresponding to the reference Id1 in order to formulate the session management policy according to the contract or network policy.
- the session management policy association established between SMF and PCF2 is used for PCF2 to provide SMF with relevant policies for managing PDU sessions, such as PDU session-related policy information (including session maximum gathering bit rate, policy control request triggers, etc.), policy charging rules Wait. In this way, the PCF can manage the PDU session.
- PDU session-related policy information including session maximum gathering bit rate, policy control request triggers, etc.
- PCF2 sends a message 3 to the UDR network element to request a background data transmission strategy.
- message 3 includes reference Id1.
- the UDR network element carries a special information element through the decision information 1 to indicate that the background data transmission strategy corresponding to the reference Id1 is being negotiated, or includes a special identifier in the decision information 1 to indicate that the background data transmission strategy corresponding to the reference Id1 is being negotiated.
- UDR returns background data transmission strategy 3 to PCF2.
- the PCF2 determines that the decision information 1 influences the formulation of the UE session management strategy.
- PCF2 Since decision information 1 indicates that the background data transmission strategy corresponding to reference Id1 is being developed or decision information 1 indicates that the background data transmission strategy 3 has expired, PCF2 does not decide the UE’s session management strategy based on decision information 1; or PCF2 decides to accept session management policy association establishment Request, delay according to decision information 1 or background data transmission strategy 3 to decide the session management strategy of the UE corresponding to the background data transmission strategy; or PCF2 decides to reject the session management strategy association establishment request.
- S1116 PCF2 returns a session management policy association response message to SMF.
- PCF2 decides the UE session management strategy corresponding to the delayed decision background data transmission strategy according to decision information 1
- PCF2 returns an acceptance indication or a successful response indication to SMF; if PCF2 decides to reject the session management policy association establishment request, the session management policy association response message It carries a rejection indication and a reason value.
- the rejection indication can be used to indicate the rejection of the session management policy association establishment request.
- the reason value can be that the background data transmission policy is being renegotiation or the background data transmission policy is invalid.
- the SMF sends the rejection indication and the reason value to the AMF, and the AMF further sends the rejection indication and the reason value to the UE. SMF further returns a corresponding response message to AMF.
- PCF1 formulates one or more candidate background data transmission strategies based on decision information 1, all existing background data transmission strategies, current network status, and operator strategies, and sends confirmation message 1 to NEF.
- NEF receives confirmation message 1, and returns notification message 1 to AF1.
- AF1 receives notification message 1. If AF1 decides to select one of the candidate background data transmission strategies as the background data transmission strategy 1, it will send the update request 1 to NEF with reference Id1 and selection The strategy identifier of the background data transmission strategy 1 of the background data transmission strategy; if AF1 rejects all candidate background data transmission strategies, AF1 will carry a rejection indication in the update request 1 sent to the NEF.
- S1120 NEF receives update request 1, and sends update request 1 to PCF1.
- S1121 PCF1 receives update request 1, and sends update request 2 to the UDR network element.
- the update request 2 may be Nudr_DM_Update Request.
- PCF1 may send update request 2 to the UDR according to the content in update request 1.
- the update request 1 carries the reference Id1 and the selected background data transmission strategy 1 policy identifier
- the update request 2 carries the reference Id1 and the selected background data transmission strategy 1
- the update request 1 carries a rejection indication
- the update The request may carry a reference Id1 and a deletion instruction, and the deletion instruction may be used to instruct to delete the decision information and/or background data transmission strategy corresponding to the reference Id1.
- S1122 The UDR network element receives update request 2, and returns a response to update request 2 to PCF1.
- the UDR network element updates the background data transmission strategy corresponding to the reference Id1 to the background data transmission strategy 1; or, the reference is carried in the update request 2
- the UDR network element In the case of Id1 and deletion instructions, delete the decision information 1 corresponding to reference Id1 and/or delete the saved background data transmission strategy 3).
- PCF2 receives background data transmission strategy 1, or PCF2 receives reference Id1 and a deletion instruction, and returns a response message to the UDR network element.
- PCF2 receives background data transmission strategy 1, PCF2 formulates a corresponding UE strategy according to background data transmission strategy 1, PCF2 sends a UE strategy provision message to AMF, and the UE strategy provision message includes the formulated UE strategy.
- the AMF further sends the UE policy to the UE.
- the PCF2 If the PCF2 receives the reference Id1 and the deletion instruction, the PCF2 deletes the decision information 1 and/or the background data transmission strategy 3 corresponding to the reference Id1, and terminates the session management policy association establishment request.
- step S1126 If in step S1116, PCF2 returns an acceptance instruction or a successful response instruction to the SMF, and if a new background data transmission strategy 1 is received, then PCF2 formulates a corresponding UE session management strategy according to the new background data transmission strategy 1, or according to the new background data transmission strategy 1.
- the background data transmission strategy 1 rejects the establishment of a PDU session.
- PCF2 sends the UE session management strategy to SMF.
- the PCF2 sends a rejection indication and a reason value to the SMF.
- the reason value may be that the verification condition is not met or the policy authorization fails. Further SMF sends the decision information to AMF.
- step S1116 the PCF2 returns an acceptance instruction or a successful response instruction to the SMF, and if it receives the reference Id1 and the deletion instruction, the PCF2 sends a rejection instruction and a reason value to the SMF.
- the reason value can be that the verification condition is not met or the policy authorization fails.
- the PCF can refer to the background data transmission strategy established by other PCFs or the decision information required by other PCFs to formulate the background data transmission strategy when formulating the UE strategy or UE session management strategy, so as to avoid conflicts with its own UE.
- the strategy or UE session management strategy conflicts with the background data transmission strategy formulated by other PCFs to ensure the availability of the UE strategy or UE session management strategy formulated by itself.
- FIG. 12 shows a structural diagram of a communication device 120.
- the communication device 120 may be a second strategy control network element, a chip in the second strategy control network element, a system on a chip, or other methods that can implement the second strategy control in the above method.
- the communication device 120 may be used to perform the function of the second policy control network element involved in the foregoing method embodiment.
- the communication device 120 shown in FIG. 12 includes: a sending unit 1201, a receiving unit 1202, and a processing unit 1203;
- the receiving unit 1202 is configured to receive a request for establishing a policy association, where the request for establishing a policy association corresponds to a request for establishing a session of the user equipment UE.
- the receiving unit 1202 supports the communication device 120 to perform S1001.
- the sending unit 1201 is configured to send a fourth message to the first network element, and the fourth message may be used to request the first background data transmission policy applied to the session.
- the sending unit 1201 is used to support the communication device 120 to perform S1002, S1107, and S1113.
- the receiving unit 1202 is configured to obtain first decision information stored by the first network element from the first network element, where the first decision information corresponds to the first background data transmission strategy.
- the receiving unit 1202 is used to support the communication device 120 to perform S1003.
- the processing unit 1203 is configured to manage the session according to the first decision information.
- the processing unit 1203 is used to support the communication device to perform S1004, S1109, S1115, and S1126.
- the processing unit 1203 is specifically configured to accept the establishment request of the policy association according to the first decision information when the second decision information affects the decision/formulation of the first background data transmission strategy, Further, after receiving the first background data transmission policy corresponding to the first decision information sent by the first network element, the second policy control network element formulates a session management policy for the session according to the first background data transmission policy, and sends it to the session management network element The session management policy of the session; or, after the second policy control network element receives the first background data transmission policy sent by the first network element, it terminates the policy association according to the first background data transmission policy; or, the second policy control network element is receiving After the deletion instruction corresponding to the first decision information, the policy association is terminated. or,
- the processing unit 1203 is specifically configured to reject the establishment request of the policy association according to the first decision information when the second decision information affects the decision/formulation of the first background data transmission strategy.
- the receiving unit 1202 is configured to receive a request for establishing a policy association, where the request for establishing a policy association corresponds to a registration request of the user equipment.
- the sending unit 1201 is configured to send a fourth message to the first network element, where the fourth message is used to request the first background data transmission strategy applied to the UE.
- the receiving unit 1202 is further configured to obtain first decision information from the first network element, where the first decision information corresponds to the first background data transmission strategy.
- the processing unit 1203 is configured to formulate a UE policy of the UE according to the first decision information.
- the processing unit 1203 is specifically configured to delay formulating the UE strategy of the UE, and after obtaining the first background data transmission strategy corresponding to the first decision information, formulate the UE strategy of the UE according to the first background data transmission strategy .
- the sending unit 1201 is also used for the second policy control network element to send a policy association establishment response, and the policy association establishment response does not carry the UE policy of the UE.
- the communication device 120 is configured to perform the function of the second strategy control network element in the method of formulating a background data transmission strategy shown in the methods shown in FIGS. 10-11, and therefore can achieve the same effect as the method of formulating a background data transmission strategy described above.
- the communication device 120 may also be presented in the form of dividing various functional modules in an integrated manner.
- the "functional module” here can refer to application specific integrated circuits (ASICs), circuits, processors and memories that execute one or more software or firmware programs, integrated logic circuits, and/or other functions that can provide the above-mentioned functions.
- ASICs application specific integrated circuits
- Device In a simple embodiment, those skilled in the art can imagine that the communication device 120 may take the form of the communication device 400 shown in FIG. 4.
- the processor 401 in the communication device 400 shown in FIG. 4 may invoke the computer-executable instructions stored in the memory 404 to make the communication device 400 execute the method of formulating a background data transmission strategy in the foregoing method embodiment.
- the function/implementation process of the sending unit 1201 and the receiving unit 1202 in FIG. 12 may be implemented by the processor 401 in the communication device 400 shown in FIG. 4 calling the computer execution instructions stored in the memory 404.
- the functions/implementation process of the sending unit 1201 and the receiving unit 1202 in FIG. 12 may be implemented through the communication interface 403 in the communication device 400 shown in FIG. 4.
- the function/implementation process of the processing unit 1203 in FIG. 12 may be implemented by the processor 401 in the communication device 400 shown in FIG. 4.
- the embodiment of the present application also provides a computer-readable storage medium. All or part of the processes in the foregoing method embodiments may be completed by a computer program instructing relevant hardware.
- the program may be stored in the foregoing computer-readable storage medium. When the program is executed, it may include processes as in the foregoing method embodiments. .
- the computer-readable storage medium may be the terminal device of any of the foregoing embodiments, such as an internal storage unit including a data sending end and/or a data receiving end, such as a hard disk or memory of the terminal device.
- the computer-readable storage medium may also be an external storage device of the terminal device, such as a plug-in hard disk, a smart media card (SMC), or a secure digital (SD) card equipped on the terminal device.
- SMC smart media card
- SD secure digital
- the aforementioned computer-readable storage medium may also include both an internal storage unit of the aforementioned terminal device and an external storage device.
- the aforementioned computer-readable storage medium is used to store the aforementioned computer program and other programs and data required by the aforementioned terminal device.
- the aforementioned computer-readable storage medium can also be used to temporarily store data that has been output or will be output.
- the embodiment of the present application also provides a computer instruction. All or part of the procedures in the foregoing method embodiments may be completed by computer instructions to instruct related hardware (such as computers, processors, network devices, and terminals).
- the program can be stored in the aforementioned computer-readable storage medium.
- connection means that B is associated with A.
- B can be determined from A.
- determining B based on A does not mean that B is determined only based on A, and B can also be determined based on A and/or other information.
- connection appearing in the embodiments of the present application refers to various connection modes such as direct connection or indirect connection to implement communication between devices, which is not limited in the embodiments of the present application.
- transmit/transmission in the embodiments of the present application refers to two-way transmission, including sending and/or receiving actions.
- the “transmission” in the embodiments of the present application includes the sending of data, the receiving of data, or the sending of data and the receiving of data.
- the data transmission here includes uplink and/or downlink data transmission.
- Data may include channels and/or signals.
- Uplink data transmission means uplink channel and/or uplink signal transmission
- downlink data transmission means downlink channel and/or downlink signal transmission.
- the "network” and “system” appearing in the embodiments of the present application express the same concept, and the communication system is the communication network.
- A/B can mean A or B; the "and/or” in this application is only It is a kind of association relationship that describes the associated objects, which means that there can be three kinds of relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, and B exists alone. Among them, A, B It can be singular or plural.
- plural means two or more than two. "The following at least one item (a)” or similar expressions refers to any combination of these items, including any combination of a single item (a) or a plurality of items (a).
- a, b, or c can mean: a, b, c, ab, ac, bc, or abc, where a, b, and c can be single or multiple .
- words such as “first” and “second” are used to distinguish the same items or similar items with substantially the same function and effect. Those skilled in the art can understand that the words “first”, “second” and the like do not limit the quantity and order of execution, and the words “first” and “second” do not limit the difference.
- words such as “exemplary” or “for example” are used as examples, illustrations, or illustrations. Any embodiment or design solution described as “exemplary” or “for example” in the embodiments of the present application should not be construed as being more preferable or advantageous than other embodiments or design solutions. To be precise, words such as “exemplary” or “for example” are used to present related concepts in a specific manner to facilitate understanding.
- the disclosed device and method can be implemented in other ways.
- the device embodiments described above are merely illustrative.
- the division of the modules or units is only a logical function division.
- there may be other division methods for example, multiple units or components may be It can be combined or integrated into another device, or some features can be omitted or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate parts may or may not be physically separate, and the parts displayed as units may be one physical unit or multiple physical units, that is, they may be located in one place, or they may be distributed to multiple different places. . Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
- the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a readable storage medium.
- the technical solutions of the embodiments of the present application are essentially or the part that contributes to the prior art, or all or part of the technical solutions can be embodied in the form of a software product, and the software product is stored in a storage medium. It includes several instructions to enable a device, such as a single-chip microcomputer, a chip, etc., or a processor to execute all or part of the steps of the methods described in the various embodiments of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, ROM, RAM, magnetic disk or optical disk and other media that can store program codes.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请实施例公开了制定背景数据传输策略的方法、装置及系统,所述方法包括:第一策略控制网元向第一网元发送用于请求第一网元保存的背景数据传输策略的第一消息,从第一网元获取第一网元保存的背景数据传输策略以及用于制定第二背景数据传输策略的第二决策信息,第一策略控制网元根据用于制定第一背景数据传输策略的第一决策信息、第二决策信息以及第一网元保存的背景数据传输策略制定第一背景数据传输策略。本申请方案可用于通信技术领域、人工智能、车联网、智能家居联网等领域。
Description
本申请要求于2020年6月03日提交国家知识产权局、申请号为202010496925.5、申请名称为“制定背景数据传输策略的方法、装置及系统”的中国专利申请的优先权,以及要求于2020年9月24日提交国家知识产权局、申请号为202011017967.2、申请名称为“制定背景数据传输策略的方法、装置及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请实施例涉及通信技术领域,尤其涉及制定背景数据传输策略的方法、装置及系统。
在第三代移动通信标准化组织(3rd generation partnership project,3GPP)通信系统中,网络侧设备对用户的业务访问提供了策略控制、应用检测和业务感知、计费控制、用量控制、流量导向等功能,对第三方应用提供了服务质量(quality of service,QoS)保障、赞助数据业务以及背景数据传输策略协商等功能。
在网络侧设备对第三方应用提供背景数据传输策略协商功能的过程中,网络侧设备获取已存在的所有背景数据传输策略,根据获取到所有的背景数据传输策略以及其他信息确定候选背景数据传输策略,第三方应用服务器从候选背景数据传输策略中选择出一个背景数据传输策略作为自己的背景数据传输策略,进行背景数据传输。这种背景数据传输策略协商方式中,没有考虑其他网络侧设备正在为其他第三方应用服务器制定的背景数据传输策略,导致制定的背景数据传输策略可能不是最优的,影响背景数据的正常传输。此外,网络侧设备在按照背景数据传输策略执行策略的时候,也没有考虑这个背景数据传输策略有可能正在被其他网络侧设备修改,导致执行背景数据传输策略错误。
发明内容
本申请实施例提供一种制定背景数据传输策略的方法、装置及系统,解决多个策略控制网元在进行背景数据传输策略制定时冲突的问题。
为达到上述目的,本申请实施例采用如下技术方案:
第一方面,本申请实施例提供一种制定背景数据传输策略的方法,该方法可以包括:第一策略控制网元向第一网元发送用于请求第一网元保存的背景数据传输策略的第一消息,从第一网元获取第一网元保存的背景数据传输策略以及用于制定第二背景数据传输策略第二决策信息,根据用于制定第一背景数据传输策略的第一决策信息、第二决策信息以及第一网元保存的背景数据传输策略制定第一背景数据传输策略。
基于第一方面所述的,策略控制网元在制定背景数据传输策略时,参考已存在的背景数据传输策略以及其他策略控制网元正在制定背景数据传输策略所对应的决策信息,避免制定的背景数据传输策略与其他策略控制网元制定背景数据传输策略冲突,保证背景数据传输策略的可用性。
一种可能的设计中,第一决策信息包括下述一种或者多种:第一终端数量、第一时间窗口、第一网络区域信息、每个终端传输背景数据时的第一流量、或制定第一背景数据传输策略的原因;第二决策信息包括下述一种或者多种:第二终端数量、第二时间窗口、第二网络区域信息、每个终端传输背景数据时的第二流量、或制定第二背景数据传输策略的原因。基于该可能的设计,可以为策略控制网元提供一项或者多项决策信息,提高策略控制网元根据这些策略信息制定背景数据传输策略的准确性。
一种可能的设计中,第二决策信息包括下述一种或者多种:第二终端数量、第二时间窗口、第二网络区域信息、每个终端传输背景数据时的第二流量、或第二背景数据传输策略正在协商的指示、或者制定第二背景数据传输策略的原因。基于该可能的设计,可以为策略控制网元提供一项或者多项决策信息,提高策略控制网元根据这些策略信息制定背景数据传输策略的准确性。
一种可能的设计中,第一策略控制网元根据第一决策信息、第二决策信息以及第一网元保存的背景数据传输策略,制定第一背景数据传输策略包括:当确定第二决策信息影响第一背景数据传输策略的制定时,第一策略控制网元根据第一决策信息、第二决策信息以及第一网元保存的背景数据传输策略制定第一背景数据传输策略,第一背景数据传输策略和第二背景数据传输策略的执行互不影响。基于该可能的设计,当第二决策信息影响第一背景数据传输策略的制定时,第一策略控制网元不延迟制定第一背景数据传输策略,而是继续根据获取到的所有背景数据传输策略以及第一决策信息制定第一背景数据传输策略,即与第二背景数据传输策略并行制定,提高背景数据传输的制定速度,同时,为了避免第一背景数据传输策略和第二背景数据传输策略冲突,要求第一背景数据传输策略和第二背景数据传输策略的执行互不影响,避免网络拥塞,保证背景数据的正常传输。
一种可能的设计中,第一策略控制网元根据第一决策信息、第二决策信息以及第一网元保存的背景数据传输策略,制定第一背景数据传输策略包括:当确定第二决策信息影响第一背景数据传输策略的制定时,第一策略控制网元获取到第二背景数据传输策略后,根据第一决策信息、第一网元保存的背景数据传输策略和第二背景数据传输策略制定第一背景数据传输策略。基于该可能的设计,当第二决策信息影响第一背景数据传输策略的制定时,第一策略控制网元延迟制定第一背景数据传输策略,先制定完第二背景数据传输策略,再结合已制定的所有背景数据传输策略制定第一背景数据传输策略,避免第一背景数据传输策略和第二背景数据传输策略冲突,保证背景数据的正常传输。
一种可能的设计中,所述第一策略控制网元根据第一决策信息、所述第二决策信息以及所述第一网元保存的背景数据传输策略,制定所述第一背景数据传输策略包括:第一策略控制网元延迟第一背景数据传输策略的制定,并且在获取到第二背景数据传输策略后,根据第一决策信息、第一网元保存的背景数据传输策略制定第一背景数据传输策略。
基于该可能的设计,第一策略控制网元延迟制定第一背景数据传输策略,待第二背景数据传输策略制定完成后,再结合已制定的所有背景数据传输策略(包括第二背景数据传输策略)制定第一背景数据传输策略,避免第一背景数据传输策略和第二背 景数据传输策略冲突,保证背景数据的正常传输。
一种可能的设计中,第一策略控制网元根据第一决策信息、第二决策信息以及第一网元保存的背景数据传输策略,制定第一背景数据传输策略包括:第一策略控制网元延迟第一背景数据传输策略的制定,并且在获取到第二决策信息对应的删除指示后,根据第一决策信息、第一网元保存的背景数据传输策略制定第一背景数据传输策略。
基于该可能的设计,第一策略控制网元参考第二决策信息制定第一背景数据传输策略的过程中,如果收到第二决策信息对应的删除指示,则删除第二决策信息或者第二决策信息对应的背景数据传输策略,不再参考第二决策信息或者第二决策信息对应的背景数据传输策略来制定第一背景数据传输策略,提高第一背景数据传输策略制定的准确性以及及时删除不可用/无效的背景数据传输策略,提高资源利用率。
一种可能的设计中,第二决策信息影响第一背景数据传输策略的制定包括下述一种或者多种情况:第一时间窗口与第二时间窗口重叠、第一网络区域信息所指示的网络区域与第二网络区域信息所指示的网络区域重叠。基于该可能的设计,可以根据背景数据对应的传输时间窗口是否重叠和/或背景数据传输策略可适用的网络区域是否重叠判断第一决策信息是否影响第一背景数据传输策略的制定,避免同一时间窗口和/或者同一网络区域上制定多个背景数据传输策略,并采用多个背景数据传输策略传输大量的背景数据,保证背景数据的正常传输。
一种可能的设计中,第一消息包括第一参考标识以及第一决策信息,第一参考标识用于标识第一背景数据传输策略。基于该可能的设计,第一策略控制网元可以将第一决策信息发送给第一网元,以便第一网元保存第一决策信息,并在根据第一决策信息制定第一背景数据传输策略期间,有其他策略控制网元制定背景数据传输策略时,将第一决策信息发送给其他策略控制网元,以便其他策略控制网元参考第一决策信息制定自身的背景数据传输策略,避免不同背景数据传输策略之间发生冲突,影响背景数据传输策略的可用性,造成网络拥塞。
一种可能的设计中,第一策略控制网元向第一网元发送第一消息之前,所述方法还包括:第一策略控制网元接收来自第一应用服务器的包括第一决策信息的第二消息,第二消息用于请求第一策略控制网元制定第一背景数据传输策略。基于该可能的设计,第一策略控制网元从第一应用服务器获取第一决策信息,即由应用服务器将用户对背景数据的传输需求等发送给策略控制网元,无需用户通过多个网元发送给策略控制网元,降低信令开销。
一种可能的设计中,所述方法还包括:当网络性能指标低于或者恢复到预设阈值时,第一策略控制网元向第一网元发送第一消息,网络性能指标事件为第三背景数据传输策略时间窗口期间内的网络性能指标低于或者恢复到预设阈值的事件,第三背景数据传输策略给根据第一决策信息制定的背景数据传输策略。基于该可能的设计,可以在使用背景数据传输策略传输背景数据时的网络性能指标低于或者恢复到预设阈值时,即网络状态发生变化时,及时向第一网元发送第一消息,获取已制定的背景数据传输策略,根据已制定的背景数据传输策略自适应地调整当前正在使用的背景数据传输策略,以使得当前使用的背景数据传输策略满足网络传输需求,提高背景数据传输策略使用性。
一种可能的设计中,所述方法还包括:第一策略控制网元向NWDAF发送用于获取网络性能指标事件的订阅请求,接收NWDAF通知的网络性能指标事件。基于该可能的设计,第一策略控制网元可以通过NWDAF获知网络性能指标低于或者恢复到预设阈值,即由NWDAF分析网络性能指标是否低于或者恢复到预设阈值,并通知给第一策略控制网元,降低第一策略控制网元判断网络性能指标是否低于或者恢复到预设阈值的功率消耗。
一种可能的设计中,第一网元包括统一数据管理(unified data management,UDM)网元或者网络存储功能(network repository function,NRF)网元或者统一数据仓库(unified data repository,UDR)网元。基于该可能的设计,可以由UDM网元或NRF网元或者UDR网元等多种不同网元保存背景数据传输策略等信息,提高系统设计灵活性。
一种可能的设计中,所述方法还包括:第一策略控制网元向第一网元发送包括第一参考标识以及第一决策信息的第三消息,第一参考标识用于标识第一背景数据传输策略。
基于该可能的设计,第一策略控制网元可以将第一参考标识以及第一决策信息携带在第三消息中发送给第一网元,以便第一网元保存第一决策信息,并在根据第一决策信息制定第一背景数据传输策略期间,有其他策略控制网元制定背景数据传输策略时,将第一决策信息发送给其他策略控制网元,以便其他策略控制网元参考第一决策信息制定自身的背景数据传输策略,避免不同背景数据传输策略之间发生冲突,影响背景数据传输策略的可用性,造成网络拥塞。
第二方面,本申请实施例还提供一种制定背景数据传输策略的方法,所述方法包括:第一网元接收来自第二策略控制网元的第二决策信息,第二决策信息对应第二背景数据传输策略;第一网元接收来自第一策略控制网元的第一消息,第一消息用于请求第一网元保存的背景数据传输策略;第一网元向第一策略控制网元发送第一网元保存的背景数据传输策略以及第二决策信息;第二决策信息以及第一网元保存的背景数据传输策略用于制定第一背景数据传输策略。
基于第二方面所述的,第一网元将已保存的背景数据传输策略以及正在协商的背景数据传输策略对应的决策信息发送给待制定背景数据传输策略的第一策略控制网元,以便第一策略控制网元在制定背景数据传输策略时,参考已存在的背景数据传输策略以及其他策略控制网元正在制定背景数据传输策略所对应的决策信息,避免制定的背景数据传输策略与其他策略控制网元制定背景数据传输策略冲突,保证背景数据传输策略的可用性。
一种可能的设计中,所述方法还包括:第一网元接收来自第二策略控制网元的第二背景数据传输策略;第一网元向第一策略控制网元发送第二背景数据传输策略,第二背景数据传输策略用于制定第一背景数据传输策略。
基于该可能的设计,可以将协商成功的背景数据传输策略发送给第一策略控制网元,以便第一策略控制网元根据协商成功的背景数据传输策略制定自己的背景数据传输策略,避免不同背景数据传输策略冲突的问题。
一种可能的设计中,所述方法还包括:第一网元接收来自第二策略控制网元的删 除第二决策信息对应的删除指示;第一网元根据删除指示删除第二决策信息;第一网元向第一策略控制网元发送第二决策信息对应的删除指示,删除指示用于指示第一策略控制网元删除第二决策信息。
基于该可能的设计,可以在第二决策信息或者第二决策信息对应的背景数据传输策略失效/不可用的情况下,删除第二决策信息或者第二决策信息对应的背景数据传输策略,以便第一策略控制网元根据第一网元发送的删除指示,删除获取到的第二决策信息和/或第二决策信息对应的背景数据传输策略,再制定自身的背景数据传输策略时不再参考第二决策信息和/或第二决策信息对应的背景数据传输策略,提高背景数据传输策略制定的准确性,以及提高资源利用率。
其中,第二方面或者第二方面的可能的设计中所述的第二决策信息的相关描述可参照第一方面或第一方面的可能的设计中所述,不予赘述。
第三方面,本申请实施例还提供一种会话管理的方法,所述方法包括:第二策略控制网元接收对应于用户设备UE的会话的建立请求的策略关联的建立请求,向第一网元发送用于请求应用于会话的第一背景数据传输策略的第四消息,从第一网元获取对应于第一背景数据传输策略的第一决策信息,根据第一决策信息对会话进行管理。
基于第三方面所述方法,策略控制网元在制定UE的会话的会话管理策略时,可以从第一网元获取制定UE的会话管理策略所需要的决策信息,参考获取到的决策信息来对会话进行管理,避免制定的决策信息对应背景数据传输策略与UE的会话冲突的问题,保证背景数据传输策略以及UE的会话的可用性。
一种可能的设计中,第二策略控制网元根据第一决策信息对会话进行管理包括:第二策略控制网元根据第一决策信息拒绝策略关联的建立请求。
基于该可能的设计,当第一决策信息影响第一策略的制定时,拒绝策略关联的建立请求,停止制定会话的会话管理策略、建立PDU会话,以避免会话的会话管理策略与第一决策信息对应的背景数据传输策略冲突,保证背景数据的正常传输。
一种可能的设计中,第二策略控制网元根据第一决策信息对会话进行管理包括:第二策略控制网元根据第一决策信息接受策略关联的建立请求。
基于该可能的设计,接受策略关联的建立请求,在第一决策信息对应的背景数据传输策略基础上制定会话的会话管理策略,保证背景数据的正常传输。
一种可能的设计中,所述方法还包括:第二策略控制网元接收第一网元发送的第一决策信息对应的第一背景数据传输策略后,根据第一背景数据传输策略制定用于对会话进行策略计费控制的会话的会话管理策略,向会话管理网元发送会话的会话管理策略。
基于该可能的设计,第二策略控制网元延迟制定第一策略,待第一背景数据传输策略制定完成后,再结合已制定的所有背景数据传输策略(包括第一背景数据传输策略)制定会话管理策略,建立会话,避免第一背景数据传输策略与会话管理策略冲突,保证背景数据的正常传输。
一种可能的设计中,所述方法还包括:第二策略控制网元接收第一网元发送的第一背景数据传输策略后,根据第一背景数据传输策略终结策略关联。
基于该可能的设计,第二策略控制网元制定第一背景数据传输策略之后,如果第 一背景数据传输策略与会话管理策略冲突,则根据第一背景数据传输策略终结策略关联,避免第一背景数据传输策略与会话管理策略冲突,保证背景数据的正常传输。
一种可能的设计中,所述方法还包括:第二策略控制网元在接收到第一决策信息对应的删除指示后,终结策略关联。
基于该可能的设计,第二策略控制网元接收到第一决策信息对应的删除指示,确定第一背景数据传输策略不可用/无效,不存在与会话管理策略关联的第一背景数据传输策略,则终结策略关联,避免制定的终端的会话无效导致背景数据传输失败。
其中,第三方面或者第三方面的可能的设计中所述的第一决策信息的相关描述可参照第一方面或第一方面的可能的设计中所述,不予赘述。
一种可能的设计中,第四消息包括第一参考标识,第一参考标识的相关描述可参照第一方面或第一方面的可能的设计中所述,不予赘述。
第四方面,本申请实施例还提供一种UE策略管理方法,所述方法包括:第二策略控制网元接收对应于用户设备的注册请求的策略关联的建立请求,向第一网元发送第四消息,第四消息用于请求应用于UE的第一背景数据传输策略,从第一网元获取第一决策信息,第一决策信息对应于第一背景数据传输策略,根据第一决策信息制定UE的UE策略。
基于第四方面所述方法,策略控制网元在制定UE的UE策略时,可以从第一网元获取制定UE的UE策略所需要的决策信息,参考获取到的决策信息来对会话进行管理,避免制定的决策信息对应背景数据传输策略与UE冲突的问题,保证背景数据传输策略以及UE的UE策略可用性。
一种可能的设计中,所述第二策略控制网元根据所述第一决策信息制定所述UE的UE策略,包括:第二策略控制网元延迟制定UE的UE策略,在获取到第一决策信息对应的第一背景数据传输策略后,根据第一背景数据传输策略制定UE的UE策略。
基于该可能的设计,当第一决策信息影响UE的UE策略的制定时,延迟制定UE的UE策略,在获取到第一决策信息对应的第一背景数据传输策略后,在第一决策信息对应的背景数据传输策略基础上制定UE策略,保证背景数据的正常传输。
一种可能的设计中,所述方法还包括:第二策略控制网元发送策略关联的建立应答,策略关联的建立应答中不携带UE的UE策略。
其中,第四方面或者第四方面的可能的设计中所述的第一决策信息的相关描述可参照第一方面或第一方面的可能的设计中所述,不予赘述。
一种可能的设计中,第四消息包括第一参考标识,第一参考标识的相关描述可参照第一方面或第一方面的可能的设计中所述,不予赘述。
第五方面,本申请提供一种通信装置,该通信装置可以为第一策略控制网元或者第一策略控制网元中的芯片或者片上系统,还可以为第一策略控制网元中用于实现本申请实施例所述的制定背景数据传输策略的方法的模块或者单元,或者为其他能够实现第一策略控制网元执行的方法的模块或者单元。该通信装置可以实现上述第一方面或者各可能的设计中第一策略控制网元所执行的功能。一种设计中,该通信装置可以包括执行第一方面中所描述的方法/操作/步骤/动作所一一对应的模块单元、或手段(means),该模块、单元、或means可以通过硬件实现,软件实现,或者通过硬件执 行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块或单元。如该通信装置可以包括:发送单元、接收单元、处理单元;
发送单元,用于向第一网元发送第一消息,第一消息用于请求第一网元保存的背景数据传输策略。
接收单元,用于从第一网元获取第一网元保存的背景数据传输策略以及第二决策信息,第二决策信息用于制定第二背景数据传输策略。
处理单元,用于根据第一决策信息、第二决策信息以及第一网元保存的背景数据传输策略,制定第一背景数据传输策略,第一决策信息用于制定第一背景数据传输策略的信息。
其中,第一决策信息、第二决策信息的相关定义以及处理单元制定第一背景数据传输策略的方式可参照第一方面或者第一方面的可能的设计中所述,不予赘述。
其中,该通信装置的具体实现方式可以参考第一方面或第一方面的任一可能的设计提供的数据传输方法中终端的行为功能,在此不再重复赘述。因此,该提供的通信装置可以达到与第一方面或者第一方面的任一可能的设计相同的有益效果。
又一种可能的设计中,第五方面所述的通信装置可以为第一网元或者第一网元中的芯片或者片上系统,还可以为第一网元中用于实现本申请实施例所述的制定背景数据传输策略的方法的模块或者单元,或者为其他能够实现第一网元执行的方法的模块或者单元。该通信装置可以实现上述第二方面或者第二方面的可能的设计中第一网元所执行的功能。例如,该通信装置可以包括执行第二方面中所描述的方法/操作/步骤/动作所一一对应的模块单元、或手段(means),该模块、单元、或means可以通过硬件实现,软件实现,或者通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块或单元。
比如,该通信装置可以用于接收来自第二策略控制网元的第二决策信息,第二决策信息对应第二背景数据传输策略,接收第一策略控制网元的第一消息,第一消息用于请求第一网元保存的背景数据传输策略,向第一策略控制网元发送第一网元保存的背景数据传输策略以及第二决策信息;第二决策信息以及第一网元保存的背景数据传输策略用于制定第一背景数据传输策略。
又一种可能的设计中,第五方面所述的通信装置可以为第二策略控制网元或者第二策略控制网元中的芯片或者片上系统,还可以为第二策略控制网元中用于实现本申请实施例所述的会话管理的方法的模块或者单元,或者为其他能够实现第二策略控制网元执行的方法的模块或者单元。该通信装置可以实现上述第三方面或者第三方面的各可能的设计中第二策略控制网元所执行的功能。一种设计中,该通信装置可以包括执行第三方面中所描述的方法/操作/步骤/动作所一一对应的模块单元、或手段(means),该模块、单元、或means可以通过硬件实现,软件实现,或者通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块或单元。
比如,该通信装置用于接收对应于用户设备UE的会话的建立请求的策略关联的建立请求,向第一网元发送用于请求应用于会话的第一背景数据传输策略的第四消息,从第一网元获取对应于第一背景数据传输策略的第一决策信息,根据第一决策信息对会话进行管理。
又比如,该通信装置用于接收对应于用户设备的注册请求的策略关联的建立请求,向第一网元发送用于请求应用于UE的第一背景数据传输策略的第四消息,从第一网元获取第一决策信息,第一决策信息对应于第一背景数据传输策略,根据第一决策信息制定UE的UE策略。
第六方面,提供了一种通信装置,该通信装置可以为第一策略控制网元或者第一策略控制网元中的芯片或者片上系统,或者为其他能够实现第一策略控制网元侧方法的模块或者单元。该通信装置可以实现上述第一方面或者各可能的设计中第一策略控制网元所执行的功能,所述功能可以通过硬件实现。一种可能的设计中,该通信装置可以包括:处理器和通信接口,处理器用于通过通信接口向第一网元发送用于请求第一网元保存的背景数据传输策略的第一消息,从第一网元获取第一网元保存的背景数据传输策略以及用于制定第二背景数据传输策略的第二决策信息,根据用于制定第一背景数据传输策略的第一决策信息、第二决策信息以及第一网元保存的背景数据传输策略,制定第一背景数据传输策略。
又一种可能的设计中,第六方面所述的通信装置可以为第一网元或者第一网元中的芯片或者片上系统,还可以为第一网元中用于实现本申请实施例所述的制定背景数据传输策略的方法的模块或者单元,或者为其他能够实现第一网元执行的方法的模块或者单元,如该通信装置可以包括:处理器和通信接口。该通信装置包括的处理器以及通信接口用于支持该通信装置实现上述第二方面或者第二方面的各可能的设计中第一网元所执行的功能。
又一种可能的设计中,第六方面所述的通信装置可以为第二策略控制网元或者第二策略控制网元中的芯片或者片上系统,还可以为第二策略控制网元中用于实现本申请实施例所述的会话管理的方法的模块或者单元,或者为其他能够实现第二策略控制网元执行的方法的模块或者单元,如该通信装置可以包括:处理器和通信接口。该通信装置包括的处理器以及通信接口用于支持该通信装置实现上述第三方面或者第三方面的各可能的设计中第二策略控制网元所执行的功能,或者,实现上述第四方面或者第四方面的各可能的设计中第二策略控制网元所执行的功能。
在又一种可能的设计中,第六方面通信装置还可以包括存储器,存储器用于保存计算机指令和/或数据。当该通信装置运行时,该处理器执行该存储器保存的该计算机指令,以使该通信装置执行上述第一方面或者第一方面的任一种可能的设计所述的制定背景数据传输策略的方法;或者,执行上述第二方面或第二方面的任一种可能的设计所述的制定背景数据传输策略的方法;或者,执行上述第三方面或第三方面的任一可能的设计所述的会话管理的方法;或者,执行上述第四方面或第四方面的任一可能的设计所述的UE策略管理方法。在本申请实施例中,通信接口可以是收发器、接口电路、总线接口、管脚或其它能够实现收发功能的装置。
第七方面,提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机可以执行上述第一方面或者上述方面的任一可能的设计所述的制定背景数据传输策略的方法;或者,执行上述第二方面或第二方面的任一种可能的设计所述的制定背景数据传输策略的方法;或者,执行上述第三方面或第三方面的任一可能的设计所述的会话管理的方法;或者,执行上述第四方面或 第四方面的任一可能的设计所述的UE策略管理方法。
第八方面,提供了一种包含指令的计算机程序产品,该计算机程序产品可以包括程序指令,当该计算机程序产品在计算机上运行时,使得计算机可以执行上述第一方面或者上述方面的任一可能的设计所述的制定背景数据传输策略的方法;或者,执行上述第二方面或第二方面的任一种可能的设计所述的制定背景数据传输策略的方法;或者,执行上述第三方面或第三方面的任一可能的设计所述的会话管理的方法;或者,执行上述第四方面或第四方面的任一可能的设计所述的UE策略管理方法。
第九方面,提供了一种芯片系统,该芯片系统包括处理器以及通信接口,该芯片系统可以用于实现上述第一方面或第一方面的任一可能的设计中第一策略控制网元所执行的功能。例如处理器用于通过通信接口向第一网元发送用于请求第一网元保存的背景数据传输策略的第一消息,从第一网元获取第一网元保存的背景数据传输策略以及用于制定第二背景数据传输策略的第二决策信息,根据用于制定第一背景数据传输策略的第一决策信息、第二决策信息以及第一网元保存的背景数据传输策略,制定第一背景数据传输策略。
又一种可能的设计中,该芯片系统可以实现上述第二方面或者第二方面的各可能的设计中第一网元所执行的功能,或者,实现上述第三方面或者第三方面的各可能的设计中第二策略控制网元所执行的功能,或者,实现上述第四方面或者第四方面的各可能的设计中第二策略控制网元所执行的功能。
在一种可能的设计中,所述芯片系统还包括存储器,所述存储器,用于保存程序指令和/或数据,当该芯片系统运行时,该处理器执行该存储器保存的该程序指令,以使该芯片系统执行上述第一方面或者第一方面的任一种可能的设计所述的制定背景数据传输策略的方法。该芯片系统可以由芯片构成,也可以包含芯片和其他分立器件,不予限制。
第十方面,本申请实施例还提供一种通信系统,所述通信系统包括如第五方面或第六方面所述的通信装置以及第一网元。
图1为现有制定背景数据传输策略的方法流程图;
图2a为本申请实施例提供的一种通信系统的架构示意图;
图2b为本申请实施例提供的又一种通信系统的架构示意图;
图3a为本申请实施例提供的一种5G通信系统的架构示意图;
图3b为本申请实施例提供的一种4G通信系统的架构示意图;
图4为本申请实施例提供的一种通信装置400的组成示意图;
图5为本申请实施例提供的一种制定背景数据传输策略的方法的流程图;
图6为本申请实施例提供的一种制定背景数据传输策略的方法的流程图;
图7为本申请实施例提供的一种制定背景数据传输策略的方法的流程图;
图8为本申请实施例提供的一种通信装置80的组成示意图;
图9为本申请实施例提供的又一种通信系统的架构示意图;
图10为本申请实施例提供的一种会话管理的方法的流程图;
图11为本申请实施例提供的一种会话管理的方法的流程图;
图12为本申请实施例提供的一种通信装置120的组成示意图。
介绍本申请实施例之前,对本申请实施例涉及的技术术语进行描述:
背景数据:是一类非实时传输的数据,这类数据通常在移动装置的背景端执行。如有时使用者需要上传或下载大量的数据到他/她的移动装置:智能型手机(smart phone)和平板计算机(tablet computer),例如上传一批照片到他/她的部落格(blog)或从他/她的朋友的部落格下载一个影片。由于前述上传或下载照片或影片的数据传输,是需要花时间以及使用系统资源来做处理的,因此上述数据传输通常在移动装置的背景端执行,这些上传或下载的照片或影片可以称为背景数据。
背景数据传输(background data transfer,BDT),是3GPP针对物联网中一个应用与海量终端设备的通信问题提出的一种传输方式,通过设置网络非繁忙时间窗口为应用与终端设备提供费率更低、速度更快的通信,同时也减轻网络在高峰时段的传输压力。BDT是AESE数据传输的核心模式,且在当前的3GPP研究中十分热门。背景数据传输指的是3GPP系统中的各个节点(如终端、服务器、应用服务器等)向AESE请求数据传输,由AESE对各个数据传输请求进行控制,确定在何时、以何种速率等来对各个数据传输请求进行响应,从而保证负载均衡。
背景数据传输策略,可以用于传输背景数据的一种策略,背景数据传输策略由策略控制网元制定。背景数据传输策略与背景数据对应,背景数据传输策略由策略标识/参考标识唯一标识。背景数据传输策略可以包括下述一项或者多项:时间窗口、时间窗口内的费率、最大聚合比特率、计费组标识、背景数据传输策略对应的参考标识(reference identifier,reference ID),背景数据传输策略为背景数据提供传输依据,保证背景数据的传输需求等。背景数据传输策略与决策信息绑定,策略控制网元可以根据决策信息以及其他信息,如已存在的所有背景数据传输策略、其他网络信息(终端的接入类型等)、运营商策略等制定背景数据传输策略。
其中,决策信息可以包括终端数量、时间窗口、网络区域信息、每个终端传输背景数据时的流量、或制定背景数据传输策略的原因等一种或多种信息。终端数量可以指预计的使用背景数据传输策略传输背景数据的终端的数量。时间窗口可以指终端使用者指定或系统预设的传输背景数据的时间段。终端传输背景数据时的流量可以指终端传输背景数据时所要求的最大传输速率。网络区域信息可以用于指示背景数据传输策略可应用的范围,网络区域信息可以为物理区域信息或地理位置,如3GPP网络中的地理位置。若决策信息中不携带网络区域信息,则表示与该决策信息对应的背景数据传输策略可应用的范围是整个公共陆地移动网络(public land mobile network,PLMN)。
其中,网络信息可以指当前的网络状态,可以用于指示终端通过哪种接入网接入、使用的无线接入技术类型、当前网络的最大传输速率等等。
其中,运营商策略可以指运营商为用户(如使用背景数据传输策略传输背景数据的用户)预先制定的策略,运营商策略可以包括下述一项或多项:用户的使用级别、用户的QoS需求、该用户授权的带宽等等。
图1为3GPP中制定背景数据传输策略的示意图,由于背景数据传输策略的制定 中,策略控制网元需要和应用服务器协商,所以本申请实施例中,制定背景数据传输策略就是协商背景数据传输策略,下同。如图1所示,该方法可以包括:S101:应用服务器向网络开放网元发送背景数据传输请求(background data transfer request),该背景数据传输请求中可以携带应用服务器的标识(identifier,ID)、以及用于制定背景数据传输策略的决策信息,该背景数据传输请求用于请求制定背景数据传输策略。相应的,网络开放网元接收背景数据传输请求。S102:网络开放网元对该背景数据传输请求进行校验和授权,并在校验和授权成功后向策略控制网元发送该背景数据传输请求。相应的,策略控制网元接收该背景数据传输请求。S103:策略控制网元根据该背景数据传输请求向网络存储网元发送获取请求,该获取请求可以用于请求获取已存在的所有背景数据传输策略。相应的,网络存储网元接收获取请求。S104:网络存储网元向策略控制网元返回已存在的/保存的所有背景数据传输策略。相应的,策略控制网元接收网络存储网元保存的所有背景数据传输策略。S105:策略控制网元根据应用服务器提供的决策信息、已存在的所有背景数据传输策略以及其他网络信息(终端的接入类型等)、运营商策略等制定一个或多个候选背景数据传输策略。S106:策略控制网元向网络开放网元返回背景数据传输响应(background data transfer response),背景数据传输响应中携带策略控制网元为背景数据传输策略分配的参考标识(reference Id)和一个或多个候选背景数据传输策略。S107:网络开放网元接收并向应用服务器返回该背景数据传输响应。S108:应用服务器接收该确认消息,从一个或者多个候选背景数据传输策略中选择一个背景数据传输策略,向网络开放网元再次发送背景数据传输请求,该背景数据传输请求中携带参考标识和选择的背景数据传输策略的策略标识。S109:网络开放网元接收背景数据传输请求,向策略控制网元发送该背景数据传输请求。S110:策略控制网元向网络开放网元返回背景数据传输响应。S111:网络开放网元向应用服务器返回背景数据传输响应。S112:策略控制网元向网络存储网元发送保存新的背景数据传输策略的保存请求,保存请求中携带参考标识以及选择的背景数据传输策略。S113:网络存储网元接收并对应保存新的背景数据传输策略以及该新的背景数据传输策略的参考标识,向策略控制网元返回确认消息。
需要说明的是,图1中S110~S113的执行顺序不受限制,S110和S111可以如图1所示,在S112之前执行,也可以先执行S112和S113,再执行S110和S111,不予限制。
进一步的,应用服务器或者终端可以根据背景数据传输策略传输背景数据,后续,当根据背景数据传输策略传输背景数据时,若网络性能指标比较低或者根据用户的应用需求需要调整背景数据传输策略,则可参照图1所示S103~S113所示过程,重新协商/制定新的背景数据传输策略。
图1所示流程中,策略控制网元需要根据当前已存在的所有背景数据传输策略进行综合考虑来确定新的背景数据传输策略。由于网络中会存在多个策略控制网元,因此有可能存在多个策略控制网元同时为多个应用服务器制定背景数据传输策略。在这种情况下,每个策略控制网元在制定背景数据传输策略时,都没有考虑其他策略控制网元正在制定的传输策略,因此制定的传输策略有可能不是最优,出现制定的背景数据传输策略冲突的问题。此外,网络侧设备在按照背景数据传输策略执行策略的时候, 没有考虑该背景数据传输策略是否被更新,如被其他网络侧设备修改,导致执行背景数据传输策略失败。
为解决上述技术问题,本申请实施例提供一种制定背景数据传输策略的方法:当策略控制网元决定制定/调整背景数据传输策略时,策略控制网元在向网络存储网元请求已存在的所有输出策略时,携带用于制定/调整背景数据传输策略的决策信息,网络存储网元保存用于制定/调整背景数据传输策略的决策信息。后续,其他策略控制网元向网络存储网元发送获取已存在的背景数据传输策略的获取请求时,网络存储网元向其他策略控制网元提供已存在的所有背景数据传输策略和保存的用于制定/调整背景数据传输策略的决策信息,以便其他策略控制网元根据已存在的所有背景数据传输策略和保存的正在用于制定/调整背景数据传输策略的决策信息进行背景数据传输策略的制定,或者是推迟制定,直到接收到准备制定/调整的背景数据传输策略最终制定完成后再进行自身的制定。
需要说明的是,本申请实施例描述的背景数据以及背景数据传输策略是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于制定其他类型的数据对应的传输策略时的冲突问题,同样适用。
下面结合说明书附图,对本申请实施例提供的制定背景数据传输策略的方法进行描述。
本申请实施例提供的制定背景数据传输策略的方法可用于图2a所示网络,如图2a所示,为本申请实施例提供的一种通信系统10,该通信系统10包括第一策略控制网元、第一网元。
第一策略控制网元,可以用于制定背景数据传输策略、服务质量(quality of service)策略、切片选择策略等策略与计费控制规则(policy and charging control rule,PCC),并将制定的策略提供给移动性管理网元、会话管理网元等网元。
第一网元,可以称为网络存储网元,用于存储用户数据,如:用户的签约信息、鉴权或授权数据等。具体的,网络存储网元可以为UDM网元或者NRF网元或者UDR网元等。
具体的,第一策略控制网元,用于向第一网元发送第一消息,第一消息用于请求第一网元保存的背景数据传输策略。第一网元,用于接收第一消息,向第一策略控制网元返回保存的所有背景数据传输策略。
第一策略控制网元,还用于从第一网元获取第一网元保存的背景数据传输策略以及用于制定第二背景数据传输策略的第二决策信息,根据用于制定第一背景数据传输策略的第一决策信息、第二决策信息以及第一网元保存的背景数据传输策略,制定第一背景数据传输策略。
一种可能的实现方式中,第一策略控制网元,用于当确定第二决策信息影响第一背景数据传输策略的制定时,第一策略控制网元根据第一决策信息、第二决策信息以及第一网元保存的背景数据传输策略制定第一背景数据传输策略,第一背景数据传输策略和第二背景数据传输策略的执行互不影响。或者,当确定第二决策信息影响第一 背景数据传输策略的制定时,第一策略控制网元在获取到第二背景数据传输策略后,根据第一决策信息、第一网元保存的背景数据传输策略和第二背景数据传输策略制定第一背景数据传输策略。
其中,本申请实施例中,第二决策信息影响第一背景数据传输策略的制定可以包括下述一种或者多种情况:第一时间窗口与第二时间窗口重叠、第一网络区域信息所指示的网络区域与第二网络区域信息所指示的网络区域重叠。
其中,第一时间窗口、第二时间窗可以指终端使用者指定或系统预设的传输背景数据的时间段。第一时间窗口与第二时间窗口重叠可以在指第一时间窗口与第二时间窗口部分重叠或者全部重叠。如第一时间窗口可以为时间段:上午6:00~上午9:00,第二时间窗口可以为时间段:上午6:00~上午9:00或者时间段:上午5:30~上午8:30。
第一网络区域信息可以用于指示第一背景数据传输策略可应用的范围,第二网络区域信息可以用于指示第二背景数据传输策略可应用的范围。第一网络区域信息所指示的网络区域与第二网络区域信息所指示的网络区域重叠可以指第一网络区域信息所指示的网络区域与第二网络区域信息所指示的网络区域部分重叠或者全部重叠。如第一网络区域可以为小区1,第二网络区域可以为小区1或者小区1中的部分区域。
进一步的,如图2a所示,该通信系统还可以包括第二策略控制网元、第一应用服务器。需要说明的是,第二策略控制网元与第一策略控制网元可以相同或不同,当第二策略控制网元与第一策略控制网元相同时,图2a所示通信系统中可以存在一个策略控制网元。
第一应用服务器,可以部署在为用户提供数据传输服务的运营商网络或者第三方供应商部署的网络中,如:可以部署在向用户提供因特网协议(internet protocol,IP)多媒体业务(IP multi-media service,IMS)的运营商网络等。第一应用服务器可以为AS(application service)或者应用功能(application function,AF),第一应用服务器可以向用户提供背景数据传输服务。
具体的,第一应用服务器,用于向第一策略控制网元发送第二消息,第二消息包括第一决策信息。第一策略控制网元,可以用于接收第二消息,根据第二消息向第一网元发送第一决策信息。第一网元,还用于接收并保存第一决策信息。
其中,第二策略控制网元的功能与第一策略控制网元的功能类似,第二策略控制网元为根据第二决策信息制定第二背景数据传输策略的网元,如:第二策略控制网元,用于从第一网元获取第一网元保存的背景数据传输策略,根据用于制定第二背景数据传输策略的第二决策信息以及第一网元保存的背景数据传输策略,制定第二背景数据传输策略。
进一步的,第二策略控制网元,还用于向第一网元发送第二决策信息。第一网元,还用于接收并保存第二决策信息。
需要说明的是,本申请中,第一策略控制网元、第二策略控制网元可以从同一应用服务器获取第一决策信息、第二决策信息,如第一策略控制网元、第二策略控制网元可以从图2a所示的第一应用服务器获取第一决策信息、第二决策信息;或者,第一策略控制网元、第二策略控制网元可以从不同应用服务器获取第一决策信息、第二决策信息。
当第一策略控制网元、第二策略控制网元从不同获取第一决策信息、第二决策信息时,如图2b所示,图2a所示通信系统还可以包括第二应用服务器。
第二应用服务器,用于向第二策略控制网元发送第二决策信息。
第二策略控制网元,用于从第二应用服务器获取第二决策信息。
进一步,图2a或图2b所示通信系统还可以包括网络开放网元。
网络开放网元,可以用于开放核心网的事件和能力、核心网外部参数和内部参数的互译、接收核心网外部网元提供的标识信息并存储、进行核心网网元选择等功能。其中,核心网外部网元可以包括应用服务器等。
例如,上述第一应用服务器向第一策略控制网元发送第二消息可以包括:
第一应用服务器,用于向网络开放功能发送第二消息。网络开放网元,用于接收第二消息,对第二消息进行鉴权和授权后,将第二消息发送给第一策略控制网元。第一策略控制网元从网络开放网元接收第二消息。
需要说明的是,图2a或图2b仅为示例性架构图,除图2a或图2b中所示功能单元外,该系统还可以包括其他功能网元,如:操作和管理(operation and management,O&M)网元等,本申请实施例对此不进行限定。此外,图2a或图2b中各个设备的名称不受限制,除图2a或图2b所示名称之外,各个设备还可以命名为其他名称,如替换成具备相同或相似功能的网元名称,不予限制。
其中,图2a所示通信系统可以为第三代合作伙伴计划(3rd generation partnership project,3GPP)通信系统,如第4代(4th generation,4G)通信系统、长期演进(long term evolution,LTE)系统,又可以为第五代(5th generation,5G)通信系统或者新空口(new radio,NR)系统、下一代通信系统等,也可以为非3GPP通信系统,不予限制。
以图2a所示的通信系统为图3a所示的5G通信系统为例,如图3a所示,策略控制网元可以为5G通信系统中的策略控制功能(policy control function,PCF),网络开放功能网元对应的网元或者实体可以为5G通信系统中的网络开放功能(network exposure function,NEF),第一网元对应的网元或者实体可以为5G通信系统中的NRF网元或者UDR网元或者UDM网元。
以图2a所示的通信系统为图3b所示的4G通信系统为例,如图3b所示,策略控制网元可以为4G通信系统中的策略与计费规则功能(policy and charging rules function,PCRF),网络开放功能网元对应的网元或者实体可以为4G通信系统中的业务能力开放功能(service capability exposure function,SCEF),第一网元对应的网元或者实体可以为4G通信系统中的签约数据库存储(subscription profile repository,SPR)。进一步的,如图3b所示,该4G通信系统还可以包括策略与计费执行功能(policy and charging enforcement function,PCEF)。
可选的,本申请实施例中的策略控制网元也可以称之为通信装置,其可以是一个通用设备或者是一个专用设备,本申请实施例对此不作具体限定。
可选的,本申请实施例中的策略控制网元的相关功能可以由一个设备实现,也可以由多个设备共同实现,还可以是由一个设备内的一个或多个功能模块实现,本申请实施例对此不作具体限定。可以理解的是,上述功能既可以是硬件设备中的网络元件, 也可以是在专用硬件上运行的软件功能,或者是硬件与软件的结合,或者是平台(例如,云平台)上实例化的虚拟化功能。
在具体实现时,图2a所示各设备(如策略控制网元等)均可以采用图4所示的组成结构,或者包括图4所示的部件。图4为本申请实施例提供的一种通信装置400的组成示意图,该通信装置400可以包括处理器401和存储器404。进一步的,该通信装置400还可以包括通信线路402以及通信接口403。其中,处理器401,存储器404以及通信接口403之间可以通过通信线路402连接。
处理器401,可以是中央处理器(central processing unit,CPU)、通用处理器、网络处理器(network processor,NP)、数字信号处理器(digital signal processing,DSP)、微处理器、微控制器、可编程逻辑器件(programmable logic device,PLD)或它们的任意组合。处理器401还可以是其它具有处理功能的装置,如电路、器件或软件模块,不予限制。
通信线路402,用于在通信装置400所包括的各部件之间传送信息。
通信接口403,用于与其他设备或其它通信网络进行通信。该其它通信网络可以为以太网,无线接入网(radio access network,RAN),无线局域网(wireless local area networks,WLAN)等。通信接口403可以是模块、电路、收发器或者任何能够实现通信的装置。
存储器404,用于存储指令。其中,指令可以是计算机程序。
其中,存储器404可以是只读存储器(read-only memory,ROM)或可存储静态信息和/或指令的其他类型的静态存储设备,也可以是随机存取存储器(random access memory,RAM)或可存储信息和/或指令的其他类型的动态存储设备,还可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟)、磁盘存储介质、其他磁存储设备,不予限制。
需要说明的是,存储器404可以独立于处理器401存在,也可以和处理器401集成在一起。存储器404可以用于存储指令或者程序代码或者一些数据等。存储器404可以位于通信装置400内,也可以位于通信装置400外,不予限制。
处理器401,用于执行存储器404中存储的指令,以实现本申请下述实施例提供的制定背景数据传输策略的方法。例如,当通信装置400为会话管理网元或者会话管理网元中的芯片或者片上系统时,处理器401执行存储器404中存储的指令,以实现本申请下述实施例中会话管理网元所执行的步骤。又例如,当通信装置400为移动性管理网元或者移动性管理网元中的芯片或者片上系统时,处理器401可以执行存储器404中存储的指令,以实现本申请下述实施例中移动性管理网元所执行的步骤。
在一种示例中,处理器401可以包括一个或多个CPU,例如图4中的CPU0和CPU1。
作为一种可选的实现方式,通信装置400包括多个处理器,例如,除图4中的处理器401之外,还可以包括处理器407。
作为一种可选的实现方式,通信装置400还包括输出设备405和输入设备406。示例性地,输入设备406是键盘、鼠标、麦克风或操作杆等设备,输出设备405是显 示屏、扬声器(speaker)等设备。
需要说明的是,通信装置400可以是台式机、便携式电脑、网络服务器、移动手机、平板电脑、无线终端、嵌入式设备、芯片系统或有图4中类似结构的设备。此外,图4中示出的组成结构并不构成对该通信装置的限定,除图4所示部件之外,该通信装置可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
本申请实施例中,芯片系统可以由芯片构成,也可以包括芯片和其他分立器件。
此外,本申请的各实施例之间涉及的动作,术语等均可以相互参考,不予限制。本申请的实施例中各个设备之间交互的消息名称或消息中的参数名称等只是一个示例,具体实现中也可以采用其他的名称,不予限制。
下面结合图2a所示通信系统,对本申请实施例提供的制定背景数据传输策略的方法进行描述。下述实施例中的各网元可以具备图4所示部件,不予赘述。需要说明的是,本申请的实施例中各个设备之间交互的消息名称或消息中的参数名称等只是一个示例,具体实现中也可以采用其他的名称。例如本申请实施例所述的制定可以替换为决策、协商等术语。本申请实施例中的确定也可以理解为创建(create)或者生成(generate),本申请实施例中的“包括”也可以理解为“携带”,本申请实施例中的“制定”也可以理解为“决策”或“确定”等,在此统一说明,本申请实施例对此不作具体限定。
图5为本申请实施例提供的一种制定背景数据传输策略的方法流程图,如图5所示,该方法可以包括:
S501:第一策略控制网元向第一网元发送第一消息。相应的,第一网元接收第一消息。
其中,第一策略控制网元可以为图2a所示通信系统中任一策略控制网元。
其中,第一网元可以为UDR网元或UDM网元或NRF网元或其他能够保存背景数据传输策略的网元等。第一网元可以将背景数据传输策略以及背景数据传输策略的参考标识对应保存在一个列表中或者以数组形式保存在第一网元中。以背景数据传输策略以及背景数据传输策略的参考标识对应保存在列表中为例,初始状态下,该列表为空,第一网元接收到策略控制网元发送的背景数据传输策略以及背景数据传输策略的参考标识后,将背景数据传输策略以及背景数据传输策略的参考标识对应保存在该列表中。背景数据传输策略的相关描述可参照上述,不予赘述。
进一步的,第一网元中还可以保存有正在制定的背景数据传输策略所对应的决策信息,该决策信息可以与正在制定的背景数据传输策略所对应的参考标识对应保存在第一网元中。示例性的,正在制定的背景数据传输策略所对应的决策信息与参考标识之间的对应关系可以与已制定的背景数据传输策略以及背景数据传输策略的参考标识之间的对应关系包括在同一列表中。例如,下表一示出了第一网元中已存的背景数据传输策略以及正在制定的背景数据传输策略对应的决策信息,如表一所示,第一网元保存有背景数据传输策略1以及背景数据传输策略2,还保存有参考标识为reference ID3的背景数据传输策略对应的决策信息3,参考标识为reference ID3的背景数据传输策略未完成制定或者正在制定,也就是参考标识为reference ID3的背景数据传输策略正在协商中。若之前已经存在reference ID3对应的背景数据传输策略3,则决策信息1还表示背景数据传输策略3不是有效的背景数据传输策略。
表一
参考标识 | 背景数据传输策略 |
reference ID1 | 背景数据传输策略1 |
reference ID2 | 背景数据传输策略2 |
reference ID3 | 决策信息1 |
其中,第一消息可以用于请求第一网元保存的所有背景数据传输策略,或者可以替换为第一消息可以用于请求现存/已存的/已制定的所有背景数据传输策略。第一消息可以为第一网元与第一策略控制网元之间的接口提供的数据管理(data management,DM)服务_查询请求(DM_query request)。第一消息可以包括第一参考标识以及第一决策信息,第一参考标识可以用于标识第一背景数据传输策略,第一参考标识信息由第一策略控制网元分配。第一决策信息可以为第一应用服务器提供给第一策略控制网元的、能够用来制定/决策/调整第一背景数据传输策略的信息。第一决策信息可以包括第一终端数量、第一时间窗口、第一网络区域信息、每个终端传输背景数据时的第一流量、第一背景数据传输策略正在协商的指示或制定第一背景数据传输策略的原因等一种或多种信息。
需要说明的是,若初始/首次制定第一背景数据传输策略,则可以不携带制定第一背景数据传输策略的原因;若调整第一背景数据传输策略,则可以携带制定第一背景数据传输策略的原因。其中制定第一背景数据传输策略的原因可以为网络性能下降,网络性能恢复、或是运营商的策略发生变化等。
其中,本申请不限于将第一参考标识以及第一决策信息包括在第一消息中发送给第一网元,第一策略控制网元也可以通过其他消息将第一参考标识以及第一决策信息发送给第一网元,从而使得第一网元保存第一参考标识信息和第一决策信息。例如,第一策略控制网元可以向第一网元发送第三消息,第三消息包括第一参考标识以及第一决策信息。其中,可以通过下述方式指示第一背景数据传输策略正在制定(即正在协商):第一策略控制网元可以通过特殊信元来携带第一决策信息来表示第一参考标识对应的背景数据传输策略正在制定(即正在协商)(即表示不是有效的背景数据传输策略,下同),或是在第一决策信息中包括特殊的标识来表示第一参考标识对应的背景数据传输策略正在制定(即正在协商),或是用制定第一背景数据传输策略的原因来表示第一参考标识对应的背景数据传输策略正在制定(即正在协商)。
其中,第一终端数量可以指预计的使用第一背景数据传输策略传输背景数据的终端的数量。终端传输背景数据时的第一流量可以指终端传输背景数据时所要求的最大传输速率。第一时间窗口、以及第一网络区域信息的相关描述可参照上述,不予赘述。
一种示例中,当第一策略控制网元接收到第一应用服务器发送的第二消息后,触发第一策略控制网元向第一网元发送第一消息。
其中,第二消息可以用于请求制定第一背景数据传输策略,第二消息可以包括第一决策信息,还可以包括第一应用服务器的标识以及其他信息等,不予限制。
其中,第一应用服务器的标识可以用于标识第一应用服务器,第一应用服务器的标识可以为第一应用服务器的因特网协议(internet protocol,IP)地址或者第一媒体接入控制(media access control,MAC)地址等。
具体的,当用户有传输背景数据的需求时,该用户可以触发终端的应用层向第一应用服务器发送传输请求,该传输请求可以携带用户所希望的传输背景数据的时间段、传输速率等等,第一应用服务器接收到传输请求后,根据传输请求确定第一决策信息,向第一策略控制网元发送第二消息。例如,假设目前时间是下午2:00,用户在上班时间(下午6:00之前)想要下载一部大小为200MB的影片,该用户可以触发终端的应用层将这一需求发送给应用服务器,应用服务器根据该需求生成决策信息,向第一策略控制网元发送携带决策信息的第二消息,触发第一策略控制网元制定相应的背景数据传输策略,以便用户下班回家后便可以在家里欣赏这段影片。
其中,当第一应用服务器为第三方部署的应用服务器时,第一应用服务器可以通过网络开放网元向第一策略控制网元发送第二消息,如第一应用服务器向网络开放网元发送第二消息,网络开放网元对第二消息进行鉴权和授权后,向第一策略控制网元发送第二消息。或者,当第一应用服务器为运营商部署的应用服务器时,第一应用服务器可以直接向第一策略控制网元发送第二消息。
又一种示例中,在执行S501之前,第一策略控制网元已根据第一决策信息制定好背景数据传输策略,如第三背景数据传输策略,当第一策略控制网元确定第三背景数据传输策略时间窗口期间内的网络性能指标低于预设阈值时,触发第一策略控制网元向第一网元发送第一消息。或者,在执行S501之前,第一策略控制网元已根据第一决策信息制定好背景数据传输策略,如第三背景数据传输策略,且根据该第三背景数据传输策略传输背景数据时的网络性能指标较差,如低于预设阈值,此时,当第一策略控制网元确定第三背景数据传输策略时间窗口期间内的网络性能指标恢复到预设阈值时,触发第一策略控制网元向第一网元发送第一消息。这种情况下,第一策略控制网元制定第一背景数据传输策略可以替换描述为第一策略控制网元调整第三背景数据传输策略得到第一背景数据传输策略,第三背景数据传输策略可以称为调整前的背景数据传输策略,第一背景数据传输策略可以为调整后的背景数据传输策略。此时,用特殊的信元来携带第一决策信息,或第一决策信息中包括背景数据传输策略正在制定的指示,或是制定背景数据传输策略的原因。第一决策信息还用于指示第三背景数据传输策略不是有效的背景数据传输策略。
其中,预设阈值可以根据需要设置,该预设阈值可以由运营商设置,如运营商根据用户的级别、用户的QoS需求,授权的带宽等等设置预设阈值。
其中,第一策略控制网元可以自己确定网络性能指标是否低于或者恢复到预设阈值,或者,从其他网元获知网络性能指标是否低于或者恢复到预设阈值,如第一策略控制网元向网络数据分析功能(network data analytics function,NWDAF)发送订阅请求,订阅请求用于获取网络性能指标事件,网络性能指标事件为第三背景数据传输策略时间窗口期间内的网络性能指标低于或者恢复到预设阈值的事件;第一策略控制网元来自NWDAF通知的网络性能指标事件。网络性能指标可以包括传输速率、传输带宽等等。
其中,对于第一策略控制网元向第一网元发送第三消息,第三消息包括第一参考标识以及第一决策信息的方法,第一策略控制网元首先向第一网元发送第一消息,请求第一网元保存的背景数据传输策略。第一网元将保存的背景数据传输策略和对应的 决策信息发送给第一策略控制网元,其中包括第三背景数据传输策略和用于决策第三背景数据传输策略(也是用来决策第一背景数据传输策略)的第一决策信息(此时的第一决策信息中不包括背景数据传输策略正在协商的指示或是制定背景数据传输策略的原因)。当第一策略控制网元确定要重新制定第一背景数据传输策略后,第一策略控制网元将更新后的第一决策信息通过第三消息发送给第一网元。第一策略控制网元可以通过特殊信元来携带第一决策信息来表示第一参考标识对应的背景数据传输策略正在制定(即正在协商)(即表示,或是在第一决策信息中包括特殊的标识来表示第一参考标识对应的背景数据传输策略正在制定(即正在协商),或是用制定第一背景数据传输策略的原因来表示第一参考标识对应的背景数据传输策略正在制定(即正在协商)。
S502:第一网元根据第一消息,向第一策略控制网元发送第一网元保存的所有背景数据传输策略以及第二决策信息。相应的,第一策略控制网元从第一网元获取第一网元保存的所有背景数据传输策略以及第二决策信息。
其中,第二决策信息可以为第一网元保存的、用于制定第二背景数据传输策略的决策信息。第二决策信息对应的第二背景数据传输策略未完成制定或者正在制定(即正在协商中)。第二决策信息可以由第二应用服务器提供给第二策略控制网元,第二策略控制网元在向第一网元请求已存在的所有背景数据传输策略时,将第二决策信息以及第二策略控制网元为第二背景数据传输策略分配的第二参考标识发送给第一网元,第一网元接收并对应保存第二决策信息以及第二参考标识,或者第二策略控制网元通过其他消息将第二参考标识和第二决策信息发送给第一网元。第二策略控制网元与第一策略控制网元可以相同或者不同,第二应用服务器与第一应用服务器可以相同或者不同,不予限制。
其中,第二决策信息可以包括第二终端数量、第二时间窗口、第二网络区域信息、每个终端传输背景数据时的第二流量、第二背景数据传输策略正在协商的指示或制定第二背景数据传输策略的原因等一种或多种信息。第一网元可以通过特殊信元来携带第二决策信息来表示第二背景数据传输策略正在制定(即正在协商),或是在第二决策信息中包括特殊的标识来表示第二背景数据传输策略,或是用第二决策信息中的制定第二背景数据传输策略的原因来表示第二背景数据传输策略正在制定(即正在协商)。
以第二决策信息为表一中的决策信息1为例,第一网元接收到第一消息后,可以查询表一,向第一策略控制网元发送背景数据传输策略1、背景数据传输策略2以及决策信息1。
示例性的,第一网元可以向第一策略控制网元发送第一网元与第一策略控制网元之间的接口提供的数据管理服务_查询响应(DM_query response),该DM_query response中可以包括第一网元保存的所有背景数据传输策略以及第二决策信息。
进一步的,第一网元可以保存第一决策信息以及第一参考标识之间的对应关系,如将第一决策信息以及第一参考标识之间的对应关系保存在上述表一中。
S503:第一策略控制网元根据第一决策信息、第一网元保存的所有背景数据传输策略以及第二决策信息,制定第一背景数据传输策略。
示例性的,第一策略控制网元可以判断第二决策信息是否影响第一背景数据传输 策略的制定,若第二决策信息不影响第一背景数据传输策略的制定,则第一策略控制网元可参照图1所示方式制定第一背景数据传输策略;若第二决策信息影响第一背景数据传输策略的制定,则第一策略控制网元可采用下述方式一或者方式二或者方式三制定第一背景数据传输策略。其中,第二决策信息影响第一背景数据传输策略的制定的相关定义可参照上述,不予赘述。
方式一、第一策略控制网元根据第一决策信息、第二决策信息以及第一网元保存的所有背景数据传输策略制定第一背景数据传输策略,第一背景数据传输策略和第二背景数据传输策略的执行互不影响。
其中,则第一策略控制网元可参照图1所示方式继续制定第一背景数据传输策略,即同时或者并行制定第一背景数据传输策略以及第二背景数据传输策略,只不过制定完成之后,根据背景数据传输策略进行数据传输时,要求/保证第一背景数据传输策略和第二背景数据传输策略的执行互不影响,如要求第一背景数据传输策略和第二背景数据传输策略的执行满足下述一项或多项:第一背景数据传输策略的时间窗口和第一背景数据传输策略的时间窗口不重叠、第一背景数据传输策略和第二背景数据传输策略在同一网络区域同时执行时的最大传输速率不会超过运营商设置的网络性能指标的预设阈值。
方式二、第一策略控制网元延迟制定第一背景数据传输策略,如第一策略控制网元可以在获取到第二背景数据传输策略后,即第二背景数据传输策略制定完成后,网络中不存在正在制定的其他背景数据传输策略之后,第一策略控制网元根据第一决策信息、第一网元保存的所有背景数据传输策略和第二背景数据传输策略制定第一背景数据传输策略。
其中,方式二中,第一策略控制网元获取第二背景数据传输策略可以包括:第二策略控制网元与第一策略控制网元不同,第一策略控制网元从第一网元获取第二背景数据传输策略,如第二策略控制网元可以从第二应用服务器接收第二决策信息,并将第二决策信息发送给第一网元,同时,第二策略控制网元从第一网元获取第一网元保存的所有背景数据传输策略,根据第一网元保存的所有背景数据传输策略、第二决策信息以及其他信息制定候选背景数据传输策略之后,通过与第二应用服务器的交互,最终从制定的候选背景数据传输策略中选择出第二背景数据传输策略,并发送给第一网元,触发第一网元发送给第一策略控制网元。或者,又一种可能的设计中,第二策略控制网元与第一策略控制网元相同,第二策略控制网元从第二应用服务器接收第二决策信息后,从第一网元获取第一网元保存的所有背景数据传输策略,根据第一网元保存的所有背景数据传输策略、第二决策信息以及其他信息制定候选背景数据传输策略,并通过与第二应用服务器的交互,最终从制定的候选背景数据传输策略中选择出第二背景数据传输策略。
方式三、第一策略控制网元延迟制定第一背景数据传输策略,如第二策略控制网元与第二应用服务器协商第二背景数据传输策略失败。第二策略控制网元请求第一网元删除第二决策信息,第一网元请求第一策略控制网元删除第二决策信息,如第一网元可以向第一策略控制网元发送第二决策信息对应的删除指示。第一策略控制网元获取到第二决策信息对应的删除指示后,根据第一决策信息、第一网元保存的所有背景 数据传输策略制定第一背景数据传输策略。
其中,第二决策信息对应的删除指示可以替换为第二参考标识对应的删除指示,第二决策信息对应的删除可以用于指示删除第二决策信息和/或以保存的第二决策信息对应的第二背景数据传输策略。
需要说明的是,在第一策略控制网元从第一网元获取第二背景数据传输策略或获取到第二决策信息对应的删除指示的情况下,执行S502之前,所述方法还包括:第一策略控制网元向第一网元订阅第一事件,第一事件为第一网元保存的背景数据传输策略/决策信息改变的事件通知,以便第一网元在保存的背景数据传输策略发生改变时,将改变的背景数据传输策略通知给第一策略控制网元,或者将第一网元中改变之后的所有背景数据传输策略通知给第一策略控制网元,或者,将决策信息的改变情况通知给第一策略控制网元。其中,背景数据传输策略改变可以包括背景数据传输策略增加或删减或更新等。决策信息的改变可以包括删除决策信息、或者更新决策信息包括的内容、或者增加新的决策信息等等。
其中,方式二中,第一策略控制网元可参照图1所示方式制定第一背景数据传输策略,如第一策略控制网元可以根据第一决策信息、第一网元保存的所有背景数据传输策略(包括第二背景数据传输策略)、当前的网络状态、运营商策略等制定一个或多个候选背景数据传输策略,制定包括第一背景数据传输策略在内的候选背景数据传输策略,以便第一应用服务器从候选背景数据传输策略中选择出第一背景数据传输策略。
其中,方式三中,第一策略控制网元可参照图1所示方式制定第一背景数据传输策略,如第一策略控制网元可以根据第一决策信息、第一网元保存的所有背景数据传输策略、当前的网络状态、运营商策略等制定一个或多个候选背景数据传输策略,制定包括第一背景数据传输策略在内的候选背景数据传输策略,以便第一应用服务器从候选背景数据传输策略中选择出第一背景数据传输策略。
其中,第一决策信息可以是第一策略控制网元中第一网元获取的,也可以是第一策略控制网元本地保存的。
进一步的,图5所示方法还可以包括:
S504:第一策略控制网元向第一网元发送第一背景数据传输策略以及第一参考标识。
示例性的,第一策略控制网元可以向第一网元发送第一网元与第一策略控制网元之间的接口提供的数据管理服务_更新请求(DM_update request),该DM_update request中携带有第一背景数据传输策略以及第一参考标识。
S505:第一网元接收第一背景数据传输策略以及第一参考标识,对应保存第一背景数据传输策略以及第一参考标识,并第一策略控制网元发送确认消息。
其中,确认消息可以为第一网元与第一策略控制网元之间的接口提供的数据管理服务_更新响应(DM_update response)。
需要说明的是,若在S504之前,即第一背景数据传输策略未完成制定之前,存在第三应用服务器请求第三策略控制网元根据第三决策信息制定背景数据传输策略,第三策略控制网元向第一网元请求已存在的背景数据传输策略,则第一网元可以将已存 在的所有背景数据传输策略以及第一决策信息发送给第三策略控制网元,以便第三策略控制网元根据第三决策信息、已存在的背景数据传输策略以及第一决策信息制定背景数据传输策略,避免多个背景数据传输策略同时制定时冲突的问题。其中,第一策略控制网元、第二策略控制网元、第三策略控制网元可以相同或不同,不予限制。
基于图5所示方法,策略控制网元在制定背景数据传输策略时,不仅参考已存在的背景数据传输策略,还参考其他策略控制网元制定背景数据传输策略所需的决策信息,避免制定的背景数据传输策略与其他背景数据传输策略冲突,保证背景数据传输策略的可用性。
下面结合图3a所示5G通信系统,以策略控制网元为PCF(如第一策略控制网元为PCF2、第二策略控制网元为PCF1),应用服务器为AF(如第一应用服务器为AF2、第二应用服务器为AF1),第一网元为UDR网元、第一背景数据传输策略为背景数据传输策略2、第二背景数据传输策略为背景数据传输策略1、第一决策信息为决策信息2、第二决策信息为决策信息1为例,对本申请实施例提供的制定背景数据传输策略的方法进行描述。
图6为本申请实施例提供的一种制定背景数据传输策略的方法流程图,如图6所示,该方法可以包括:
S601:AF1向NEF发送消息1。
其中,AF1可以为图3a所示系统中提供背景数据的任一AF。
其中,消息1可以用于请求制定背景数据传输策略1,消息1可以为Nnef接口提供的背景数据传输策略协商服务_建立请求(Nnef_BDTPNegotiantion_Create request),消息1可以携带AF1的标识、决策信息1,决策信息1可以用于制定背景数据传输策略1。决策信息1可以包括第一终端数量、第一时间窗口、第一网络区域信息、每个终端传输背景数据时的第一流量、或制定背景数据传输策略1的原因等一种或多种信息。需要说明的是,若AF1初始制定背景数据传输策略1,则可以不携带制定背景数据传输策略1的原因。
S602:NEF接收消息1,对消息1进行校验和授权。NEF对消息1授权成功,NEF向PCF1发送消息1。
示例性的,NEF可以根据消息1中携带的AF1的ID,查看该ID所标识的AF1是否与网络有签约,如第三方提供商与运营商之间是否有签约,若有签约,则授权成功,反之,则授权失败,流程结束。
其中,PCF1可以为能够为AF1提供策略制定服务的PCF。
示例性的,AF1向NEF发送的消息1与NEF向PCF1发送的消息1可以携带相同内容,但二者的消息类型可以不同,如NEF向PCF1发送的消息1可以为Npcf接口提供的背景数据传输策略控制服务_建立请求(Npcf_BDTPolicyControl_Create request),NEF向PCF1发送的消息1中可以包括上述决策信息1,还可以包括AF1的ID。
需要说明的是,AF1向NEF发送的第一网络区域信息与NEF向PCF1发送的第一网络区域信息虽然标识相同区域,但二者的信息格式不同,AF1向NEF发送的第一网络区域信息可以为第三方可识别的网络区域信息,如3GPP网络中的地理位置等等。NEF向PCF1发送的第一网络区域信息可以为核心网网元可以识别的网络区域信息, 如小区标识等等。
S603:PCF1接收消息1,向UDR网元发送消息2。
其中,消息2可以为Nudr接口提供的数据管理服务_查询请求(Nudr_DM_query request),消息2用于请求UDR网元保存的所有背景数据传输策略,消息2中可以携带PCF1为背景数据传输策略1分配的参考标识:reference Id1以及上述接收到的决策信息1。本申请不限于将reference Id1和决策信息1携带在消息2中发送给UDR,PCF1也可以通过其他消息将reference Id1和决策信息1发送给UDR。
其中,决策信息1中除包括S601中所述的内容之外,还可以包括:背景数据传输策略1正在正在(即正在协商)的指示。如PCF1可以通过特殊信元来携带决策信息1来表示reference Id1对应的背景数据传输策略正在协商,或是在决策信息1中包括特殊的标识来表示reference Id1对应的背景数据传输策略正在协商,或是用决策信息1中的制定背景数据传输策略1的原因来表示reference Id1对应的背景数据传输策略正在协商。
S604:UDR网元接收消息2,向PCF1返回UDR网元保存的所有背景数据传输策略。
进一步的,UDR网元对应保存决策信息1以及reference Id1。
需要说明的是,若此时UDR网元中保存有其他PCF正在制定背景数据传输策略所需要的决策信息,UDR网元还返回UDR网元中保存的决策信息等。
S605:PCF1接收UDR网元保存的所有背景数据传输策略,根据UDR网元保存的所有背景数据传输策略以及当前的网络状态、运营商策略等制定一个或多个候选背景数据传输策略。
其中,候选背景数据传输策略为可能被AF1选中作为背景数据传输策略1的一些背景传输数据传输策略。一个候选背景数据传输策略可以包括策略标识、推荐的传输时间窗口,最大聚合比特率,计费组标识等一种或者多种信息。
示例性的,PCF1根据UDR网元保存的所有背景数据传输策略以及当前的网络状态、运营商策略等制定一个或多个候选背景数据传输策略的过程可参照现有技术,不予赘述。
进一步的,PCF1制定一个或者多个候选背景数据传输策略之后,执行图1所示S106~S113,在PCF1执行S106~S113的过程中,会存在其他PCF也制定背景数据传输策略,如PCF2也制定背景数据传输策略等,即同时存在两个以及两个以上PCF制定背景数据传输策略。具体的,该过程如下步骤所示:
S606:AF2向NEF发送消息3。
其中,消息3可以为Nnef_BDTPNegotiantion_Create request,消息3可以包括AF2的ID以及决策信息2,AF2的ID可以用于标识AF2,决策信息2如上决策信息1所述,决策信息2可以用于制定背景数据传输策略2。示例性的,决策信息2可以包括第二终端数量、第二时间窗口、第二网络区域信息、每个终端传输背景数据时的第二流量、或制定所述背景数据传输策略2的原因等一种或多种信息。需要说明的是,若AF2初始制定背景数据传输策略2,则可以不携带制定背景数据传输策略2的原因。
S607:NEF接收消息3,对消息3进行校验和授权。NEF对消息3授权成功,NEF 向PCF2发送消息3。
其中,S607可参照S602所述,不予赘述。
S608:PCF2接收消息3,向UDR网元发送消息4。
其中,消息4可以为Nudr_DM_query request,消息4可以类似于上述消息2,消息4可以用于请求获取UDR网元已存在的/保存的所有背景数据传输策略,消息4可以包括PCF2为背景数据传输策略2分配的reference Id2以及决策信息2。本申请不限于将reference Id1和决策信息1携带在消息4中发送给UDR,PCF2也可以通过其他消息将reference Id2和决策信息2发送给UDR。
其中,决策信息2中除包括S606中所述的内容之外,还可以包括:背景数据传输策略2正在协商的指示。如PCF2可以通过特殊信元来携带决策信息2来表示reference Id2对应的背景数据传输策略正在协商,或是在决策信息2中包括特殊的标识来表示reference Id2对应的背景数据传输策略正在协商,或是用决策信息2中的制定背景数据传输策略2的原因来表示reference Id2对应的背景数据传输策略正在协商。
S609:UDR网元接收消息4,向PCF2返回已存在的所有背景数据传输策略以及在S604接收到的决策信息1。
进一步的,UDR网元对应保存reference Id2以及决策信息2。
UDR可以通过特殊信元来携带决策信息1来表示reference Id1对应的背景数据传输策略正在协商,或是在决策信息1中包括特殊的标识来表示reference Id1对应的背景数据传输策略正在协商,或是用决策信息1中的制定背景数据传输策略1的原因值来表示reference Id1对应的背景数据传输策略正在协商。
S610:PCF2确定决策信息1影响背景数据传输策略2的制定。
其中,决策信息1影响背景数据传输策略2的制定可以包括第一时间窗口与第二时间窗口重叠、第一网络区域信息所指示的网络区域与第二网络区域信息所指示的网络区域重叠中一项或多项。
进一步的,PCF2不延迟决策,而是参照图1所示S105~S113,制定一个或者多个候选背景数据传输策略,并将一个或者多个候选背景数据传输策略指示给AF2,在AF2从一个或者多个候选背景数据传输策略中选择出背景数据传输策略2之后,将背景数据传输策略2保存在UDR网元中。具体的,该过程可参照图1所示,不予赘述。此时,PCF2可以与PCF1并行制定背景数据传输策略,并在执行完S616之后,流程结束。
只不过,PCF2不延迟决策的情况下,后续在执行背景数据传输策略1和背景数据传输策略2时,需要保证背景数据传输策略1和背景数据传输策略2的执行互不影响,如需要保证下述一项或者多项:背景数据传输策略1和背景数据传输策略2的时间窗口设置为不重叠、背景数据传输策略1和背景数据传输策略2在网络交叉区域(即同一网络区域)同时执行时最大传输速率不会超过运营商设置的网络性能指标的预设阈值等。
或者,PCF2延迟决策,并在下述S618之后再制定背景数据传输策略2,即PCF1、PCF2顺序制定背景数据传输策略,待PCF2制定完背景数据传输策略2之后,流程结束。
S611:PCF1根据决策信息1、已存在的所有背景数据传输策略、当前的网络状态 以及运营商策略制定一个或多个候选背景数据传输策略,并向NEF发送确认消息1。
其中,确认消息1可以为Npcf_BDTPNegotiantion_Create response,该确认消息1中可以携带reference Id1和PCF1制定的一个或多个候选背景数据传输策略。
S612:NEF接收确认消息1,并向AF1返回通知消息1。
其中,该通知消息1中可以携带reference Id1和一个或多个候选背景数据传输策略。
S613:AF1接收通知消息1,若AF1决定从一个或者多个候选背景数据传输策略中选择其中一个背景数据传输策略作为背景数据传输策略1,则AF1在向NEF发送的更新请求1中携带reference Id1和选择的背景数据传输策略1的策略标识;若AF1拒绝所有候选背景数据传输策略,则AF1在向NEF发送的更新请求1中携带拒绝指示。其中,该更新请求1可以为Nnef_BDTPNegotiantion_Update request。
S614:NEF接收更新请求1,向PCF1发送更新请求1。
需要说明的是,AF1向NEF发送的更新请求1与NEF向PCF1发送的更新请求1携带的内容可以相同,但消息类型可以不同,NEF向PCF1发送的更新请求1可以为Npcf_BDTPolicyControl_Update request。
S615:PCF1接收更新请求1,向UDR网元发送更新请求2。
其中,该更新请求2可以为Nudr_DM_Update Request。
示例性的,PCF1可以根据更新请求1中的内容向UDR发送更新请求2。例如,如果更新请求1中携带reference Id1和选择的背景数据传输策略1的策略标识,则更新请求2中携带reference Id1和选择的背景数据传输策略1;如果更新请求1中携带拒绝指示,则更新请求中可以携带reference Id1和删除指示,该删除指示可以用于指示删除reference Id1对应的决策信息和/或背景数据传输策略。
S616:UDR网元接收更新请求2,向PCF1返回更新请求2的响应。
其中,该更新请求2的响应可以为Nudr_DM_Update_response。
进一步的,在更新请求2中携带reference Id1和新的背景数据传输策略1的情况下,UDR网元对应保存reference Id1以及新的背景数据传输策略1;或者,在更新请求2中携带reference Id1和删除指示的情况下,删除reference Id1对应的决策信息1(即删除保存的背景数据传输策略1)。
S617:基于之前PCF2已经向UDR网元订阅了背景数据传输策略改变的事件通知,UDR网元向PCF2发送新的背景数据传输策略1或删除reference Id1对应的决策信息1的指示(即删除背景数据传输策略1的指示)。
示例性的,UDR网元可以向PCF2发送Nudr_DM_Notificaion Request,Nudr_DM_Notificaion Reqeust中携带新的背景数据传输策略1或删除reference Id1对应的决策信息1的指示(即删除背景数据传输策略1的指示)。
S618:PCF2接收新的背景数据传输策略1或删除决策信息1的指示(即删除背景数据传输策略1的指示),向UDR网元返回响应消息。
S619:PCF2根据决策信息2、已存在的所有背景数据传输策略(包括背景数据传输策略1)、当前的网络状态以及运营商策略为AF2制定一个或多个候选背景数据传输策略;或者PCF2根据决策信息2、已存在的所有背景数据传输策略(不包括背景数 据传输策略1)、当前的网络状态以及运营商策略为AF2制定一个或多个候选背景数据传输策略。
S620:PCF2向NEF发送确认消息2。
其中,确认消息2可以为Npcf_BDTPNegotiantion_Create response,该确认消息2中可以携带reference Id2和PCF2制定的一个或多个候选背景数据传输策略。
S621:NEF接收确认消息2,并向AF2返回通知消息2。
其中,该通知消息2中可以携带reference Id2和一个或多个候选背景数据传输策略。
S622:AF2接收通知消息2,若AF2决定从一个或者多个候选背景数据传输策略中选择其中一个背景数据传输策略作为背景数据传输策略2,则AF2在向NEF发送更新请求3中携带reference Id2和选择的背景数据传输策略2的策略标识;若AF2拒绝所有候选背景数据传输策略,则AF2在向NEF发送的更新请求3中携带拒绝指示。
其中,该更新请求3可以为Nnef_BDTPNegotiantion_Update request。
S623:NEF接收更新请求3,向PCF2发送更新请求3。
需要说明的是,AF2向NEF发送的更新请求3与NEF向PCF2发送的更新请求3携带的内容可以相同,但消息类型可以不同,NEF向PCF2发送的更新请求3可以为Npcf_BDTPolicyControl_Update request。
S624:PCF2接收更新请求3,向UDR网元发送更新请求4。
其中,该更新请求4可以为Nudr_DM_Update Request。如果更新请求3携带reference Id2和选择的背景数据传输策略2,则更新请求4中携带reference Id2和选择的背景数据传输策略2;如果更新请求3携带拒绝指示,则更新请求4携带reference Id2和删除指示,该删除指示可以用于指示删除reference Id2对应的决策信息2和/或背景数据传输策略2。
S625:UDR网元接收更新请求4,向PCF2返回更新请求4的响应。
其中,该更新请求4的响应可以为Nudr_DM_Update_response。
进一步的,在更新请求4中携带reference Id2和新的背景数据传输策略2的情况下,UDR网元对应保存reference Id2以及背景数据传输策略2。在更新请求4中携带reference Id1和删除指示的情况下,UDR删除决策信息2(即删除保存的背景数据传输策略2)。
基于图6所示方法,多个PCF在制定背景数据传输策略时,不仅参考已存在的背景数据传输策略,还可以参考其他PCF制定背景数据传输策略所需的决策信息,避免与其他PCF的制定冲突,保证背景数据传输策略的可用性。
图6所示方法以AF请求制定背景数据传输策略为例进行说明,可替换的,当网络性能指标低于或者恢复到预设阈值时,也可以触发PCF执行本申请实施例所述过程,该过程如图7所示。图7为本申请实施例提供的一种制定背景数据传输策略的方法流程图,如图7所示,该方法可以包括:
S701:PCF1确定网络性能指标低于或者恢复到预设阈值。
其中,预设阈值可以根据需要设置,不予限制。例如,传输窗口分配之后,若网络发生变化,该时段的网络负载变得相对拥挤,费率也相应的变得较高,从而导致用 户传输费率高,不能满足用户使用最低的费用进行网络传输的需求,即网络性能指标低于预设阈值。
示例性的,PCF1可以自己确定网络性能指标是否低于或者恢复到预设阈值;或者,PCF1可以从其他网元获知网络性能指标是否低于或者恢复到预设阈值,如PCF1向NWDAF发送订阅请求,订阅请求用于获取网络性能指标事件,网络性能指标事件为已制定的背景数据传输策略(如根据决策信息1制定的背景数据传输策略3)时间窗口期间内的网络性能指标低于或者恢复到预设阈值的事件;PCF1接收NWDAF通知的网络性能指标事件。
此时,PCF1已制定了Reference Id1对应的背景数据传输策略3,并将背景数据传输策略3和决策信息1保存在UDR中。
S702:PCF1向UDR网元发送消息2。
其中,消息2可以为Nudr接口提供的数据管理服务_查询请求(Nudr_DM_query reqeust),消息2用于请求UDR网元保存的所有背景数据传输策略,消息2中可以携带PCF1为背景数据传输策略1分配的参考标识:reference Id1以及上述接收到的决策信息1。
本申请不限于将reference Id1和决策信息1携带在消息2中发送给UDR,PCF1也可以通过其他消息将reference Id1和决策信息1发送给UDR。在这种情况下,PCF1首先向UDR发送消息2,请求UDR保存的背景数据传输策略。UDR将保存的背景数据传输策略和对应的决策信息发送给PCF1,其中包括背景数据传输策略3和用于决策背景数据传输策略3(也用于决策背景数据传输策略1)的决策信息1(此时的决策信息1中不包括背景数据传输策略1正在协商的指示或是制定背景数据传输策略1的原因)。当PCF1确定要重新制定背景数据传输策略1后,PCF1将更新后的决策信息1通过其他消息发送给UDR。
其中,PCF1发送给UDR的决策信息1中除包括第一终端数量、第一时间窗口、第一网络区域信息、每个终端传输背景数据时的第一流量、或制定背景数据传输策略1的原因等一种或多种信息(这些信息可以是PCF1本地保存或是从UDR中获取)之外,还可以包括:背景数据传输策略正在制定(即协商)的指示。如PCF1可以通过特殊信元来携带决策信息1来表示reference Id1对应的背景数据传输策略正在协商,或是在决策信息1中包括特殊的标识来表示reference Id1对应的背景数据传输策略正在协商,或是用决策信息1中的制定背景数据传输策略的原因来表示reference Id1对应的背景数据传输策略正在协商。
S703:UDR网元接收消息2,向PCF1返回UDR网元保存的所有背景数据传输策略。
进一步的,UDR网元对应保存决策信息1以及reference Id1。
需要说明的是,若此时UDR网元中保存有其他PCF正在制定背景数据传输策略所需要的决策信息,UDR网元还返回UDR网元中保存的决策信息等。
S704:PCF1接收UDR网元保存的所有背景数据传输策略,根据UDR网元保存的所有背景数据传输策略以及当前的网络状态、运营商策略等制定一个或多个候选背景数据传输策略。
其中,候选背景数据传输策略为可能被AF1选中作为背景数据传输策略1的一些背景传输数据传输策略。一个候选背景数据传输策略可以包括策略标识、推荐的传输时间窗口、最大聚合比特率、计费组标识等一种或者多种信息。
示例性的,PCF1根据UDR网元保存的所有背景数据传输策略以及当前的网络状态、运营商策略等制定一个或多个候选背景数据传输策略的过程可参照现有技术,不予赘述。
进一步的,PCF1制定一个或者多个候选背景数据传输策略之后,执行图1所示S106~S113,在PCF1执行S106~S113的过程中,会存在其他PCF也制定背景数据传输策略,如PCF2也制定背景数据传输策略等,即同时存在两个以及两个以上PCF制定背景数据传输策略。具体的,该过程如下步骤所示:
S705:PCF2确定网络性能指标低于或者恢复到预设阈值。
此时,PCF2已制定了Reference Id2对应的背景数据传输策略4,并将背景数据传输策略4和决策信息2保存在UDR中。
其中,S705可参照S701所述,不予赘述。
需要说明的是,S705还可以替换为AF2请求PCF2制定背景数据传输策略的过程,如可以替换为上述S606~S607。
S706:PCF2向UDR网元发送消息4。
S707:UDR网元接收消息4,向PCF2返回已存在的所有背景数据传输策略以及在S703接收到的决策信息1。
UDR通过特殊信元来携带决策信息1来表示reference Id1对应的背景数据传输策略正在协商,或是在决策信息1中包括特殊的标识来表示reference Id1对应的背景数据传输策略正在协商,或是用决策信息1中的制定背景数据传输策略1的原因来表示reference Id1对应的背景数据传输策略正在协商。
S708:PCF2确定决策信息1影响背景数据传输策略2的制定。
进一步的,PCF2不延迟制定背景数据传输策略2,而是根据决策信息2、决策信息1以及已存在的所有背景数据传输策略制定背景数据传输策略2,只不过,背景数据传输策略1和背景数据传输策略2的执行互不影响,如背景数据传输策略1和背景数据传输策略2的时间窗口设置为不重叠和/或背景数据传输策略1和背景数据传输策略2在网络交叉区域(如同一区域)同时执行时最大传输速率不会超过运营商设置的网络性能指标的预设阈值等。
或者,PCF2延迟决策,如PCF2在后续S715中获取到背景数据传输策略1之后,根据决策信息2、UDR网元保存的所有背景数据传输策略和背景数据传输策略1制定背景数据传输策略2。如下所述,PCF2可以接收到来自UDR网元的背景数据传输策略1后,根据决策信息2、UDR网元保存的所有背景数据传输策略和背景数据传输策略1制定背景数据传输策略2。
或者,PCF2延迟决策,在后续S715获取到UDR发送的决策信息1被删除的指示后,PCF2根据决策信息2和UDR保存的所有背景数据传输策略制定背景数据传输策略2。例如在执行下述S709~S714的过程中,PCF1与第三方应用服务器协商背景数据传输策略1失败,PCF1向UDR发送删除决策信息1的指示(即删除背景数据传输 策略1的指示),指示UDR删除决策信息1,UDR指示PCF2删除决策信息1。PCF2收到UDR的指示后,根据决策信息2和UDR保存的所有背景数据传输策略制定背景数据传输策略2。
S709:PCF1根据决策信息1、已存在的所有背景数据传输策略、当前的网络状态以及运营商策略制定一个或多个候选背景数据传输策略,并向NEF发送确认消息1。
其中决策信息1为PCF1从UDR中获取的,也可以是AF1在向PCF1请求背景数据传输策略时PCF1本地保存的。
S710:NEF接收确认消息1,并向AF1返回通知消息1。
S711:AF1接收通知消息1,若AF1决定从一个或者多个候选背景数据传输策略中选择其中一个背景数据传输策略作为背景数据传输策略1,则AF1在向NEF发送更新请求1中携带reference Id1和选择的背景数据传输策略1的策略标识;若AF1拒绝所有候选背景数据传输策略,则AF1在向NEF发送的更新请求1中携带拒绝指示。
S712:NEF接收更新请求1,向PCF1发送更新请求1。
S713:PCF1接收更新请求1,向UDR网元发送更新请求2。
其中,该更新请求2可以为Nudr_DM_Update Request。
示例性的,PCF1可以根据更新请求1中的内容向UDR发送更新请求2。例如,如果更新请求1中携带reference Id1和选择的背景数据传输策略1的策略标识,则更新请求2中携带reference Id1和选择的背景数据传输策略1;如果更新请求1中携带拒绝指示,则更新请求中可以携带reference Id1和删除指示,该删除指示可以用于指示删除reference Id1对应的决策信息和/或背景数据传输策略。
S714:UDR网元接收更新请求2,向PCF1返回更新请求2的响应。
进一步的,在更新请求2中携带reference Id1和新的背景数据传输策略1的情况下,UDR网元将reference Id1对应的背景数据传输策略3更新为背景数据传输策略1。此外,UDR从决策信息1中删除背景数据传输策略正在制定的指示或制定背景数据传输策略的原因;或者,在更新请求2中携带reference Id1和删除指示的情况下,删除reference Id1对应的决策信息1和/或以及背景数据传输策略3。
S715:基于之前PCF2已经向UDR网元订阅了背景数据传输策略改变的事件通知,UDR网元向PCF2发送背景数据传输策略1或是发送reference Id1和删除指示。
S716:PCF2接收背景数据传输策略1或reference Id1和删除指示,向UDR网元返回响应消息。
S717:PCF2根据决策信息2、已存在的所有背景数据传输策略(包括背景数据传输策略1)、当前的网络状态以及运营商策略为AF2制定一个或多个候选背景数据传输策略;或者根据决策信息2、已存在的所有背景数据传输策略(不包括背景数据传输策略3)、当前的网络状态以及运营商策略为AF2制定一个或多个候选背景数据传输策略。
S718:PCF2向NEF发送确认消息2。
S719:NEF接收确认消息2,并向AF2返回通知消息2。
其中,该通知消息中可以携带Reference Id2和一个或多个候选背景数据传输策略。
S720:AF2接收通知消息2,从一个或者多个候选背景数据传输策略中选择其中 一个背景数据传输策略作为背景数据传输策略2,并向NEF发送更新请求3。
S721:NEF接收更新请求3,向PCF2发送更新请求3。
S722:PCF2接收更新请求3,向UDR网元发送更新请求4。
其中,该更新请求4可以为Nudr_DM_Update Request。如果更新请求3携带reference Id2和选择的背景数据传输策略2,则更新请求4中携带reference Id2和选择的背景数据传输策略2;如果更新请求3携带拒绝指示,则更新请求4携带reference Id2和删除指示,该删除指示可以用于指示删除reference Id2对应的决策信息2和/或背景数据传输策略2。
S723:UDR网元接收更新请求4,向PCF2返回更新请求4的响应。
进一步的,在更新请求4中携带reference Id2和背景数据传输策略2的情况下,UDR网元将reference Id2对应的背景数据传输策略4更新为背景数据传输策略2。此外,UDR从决策信息2中删除背景数据传输策略正在制定的指示或制定背景数据传输策略的原因;或者,在更新请求2中携带reference Id2和删除指示的情况下,删除reference Id2对应的决策信息2和/或保存的背景数据传输策略4。
其中,上述S706~S723的执行过程可对应参照S608~S625所述,不予赘述。
基于图7所示方法,多个PCF可以在网络性能指标较低或者恢复到正常值时,重新制定背景数据传输策略,并在制定背景数据传输策略时,不仅参考已存在的背景数据传输策略,还参考其他PCF制定背景数据传输策略所需的决策信息,避免与自身制定的背景数据传输策略与其他PCF制定的背景数据传输策略冲突,保证背景数据传输策略的可用性。
需要说明的是,图6或图7所示方法可应用于图3a所示5G通信系统,类似的,图6或图7所示方法还可以应用于图3b所示的4G通信系统,如将图6或图7所示方法中的PCF替换为PCRF、UDR网元替换为SPR,NEF替换为SCEF后,图6或图7所示方法即可应用到图3b所示的4G通信系统。
上述主要从各个节点之间交互的角度对本申请实施例提供的方案进行了介绍。可以理解的是,各个节点,例如第一策略控制网元为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的算法步骤,本申请实施例的方法能够以硬件、软件、或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例可以根据上述方法示例对第一策略控制网元进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
图8示出了一种通信装置80的结构图,该通信装置80可以为第一策略控制网元、第一策略控制网元中的芯片、片上系统或者其他能够实现上述方法中第一策略控制网 元的功能的装置等,该通信装置80可以用于执行上述方法实施例中涉及的第一策略控制网元的功能。作为一种可实现方式,图8所示通信装置80包括:发送单元801、接收单元802、处理单元803;
发送单元801,用于向第一网元发送第一消息,第一消息用于请求第一网元保存的背景数据传输策略。例如,发送单元801用于支持通信装置80执行S501、S608、S706。
接收单元802,用于从第一网元获取第一网元保存的背景数据传输策略以及第二决策信息,第二决策信息用于制定第二背景数据传输策略。例如,接收单元802用于支持通信装置80执行S502、S609、S707。
处理单元803,用于根据第一决策信息、第二决策信息以及第一网元保存的背景数据传输策略,制定第一背景数据传输策略,第一决策信息用于制定第一背景数据传输策略的信息。例如,处理单元803用于支持通信装置执行S503、S619、S717。
一种可能的实现方式中,处理单元803,具体用于当第二决策信息影响第一背景数据传输策略的决策/制定时,不延迟制定第一背景数据传输策略,而是根据第一决策信息、第二决策信息以及第一网元保存的背景数据传输策略制定第一背景数据传输策略,只不过,第一背景数据传输策略和第二背景数据传输策略的执行互不影响。
又一种可能的实现方式中,处理单元803,具体用于当第二决策信息影响第一背景数据传输策略的决策/制定时,延迟制定第一背景数据传输策略,如在获取到第二背景数据传输策略之后,再根据根据第一决策信息、第二背景数据传输策略以及第一网元保存的背景数据传输策略制定第一背景数据传输策略。
可选的,在发送单元801向第一网元发送第一消息之前,接收单元802,还用于从第一应用服务器接收第一决策信息,如接收单元802从第一应用服务器接收第二消息,第二消息包括第一决策信息,第二消息用于请求制定第一背景数据传输策略。
一种可能的实现方式中,发送单元801,具体用于根据第二消息向第一网元发送第一消息,如第二消息为发送单元801发送第一消息的触发条件,一旦接收单元802接收到第二消息,发送单元801就向第一网元发送第一消息。
又一种可能的设计中,发送单元801,具体用于当网络性能指标低于或者恢复到预设阈值时,向第一网元发送第一消息,网络性能指标可以指网络根据第三背景数据传输策略传输背景数据时的性能指标,第三背景数据传输策略可以为在制定第一背景数据传输策略之前,根据第一决策信息制定的背景数据传输策略。
进一步的,第一消息可以包括第一参考标识以及第一决策信息,以便第一网元对应保存第一参考标识以及第一决策信息,并在其他策略控制网元制定背景数据传输策略时,将第一决策信息提供给其他策略控制网元,避免其他策略控制网元制定的背景数据传输策略与第一决策信息对应的背景数据传输策略出现冲突。
具体的,上述图5-图7所示方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。通信装置80用于执行图5-图7所示方法所示制定背景数据传输策略的方法中第一策略控制网元的功能,因此可以达到与上述制定背景数据传输策略的方法相同的效果。
在本实施例中,该通信装置80还可以采用集成的方式划分各个功能模块的形式来 呈现。这里的“功能模块”可以指专用集成电路(application specific integrated circuit,ASIC),电路,执行一个或多个软件或固件程序的处理器和存储器,集成逻辑电路,和/或其他可以提供上述功能的器件。在一个简单的实施例中,本领域的技术人员可以想到该通信装置80可以采用图4所示的通信装置400的形式。
比如,图4所示的通信装置400中的处理器401可以通过调用存储器404中保存的计算机执行指令,使得通信装置400执行上述方法实施例中的制定背景数据传输策略的方法。
具体的,图8中的发送单元801和接收单元802的功能/实现过程可以通过图4所示的通信装置400中的处理器401调用存储器404中保存的计算机执行指令来实现。图8中的发送单元801和接收单元802的功能/实现过程可以通过图4中所示的通信装置400中的通信接口403来实现。图8中的处理单元803的功能/实现过程可以通过图4中所示的通信装置400中的处理器401来实现。
上述实施例介绍了当网络性能指标低于或者恢复到预设阈值时,PCF触发PCF重新制定(即重新协商)背景数据传输策略的过程中,或者应用服务器触发PCF制定背景数据传输策略的过程中,不同PCF之间如何避免制定的背景数据传输策略冲突的方案。其中,PCF制定背景数据传输策略的过程中,除了要考虑不同PCF制定的背景数据传输策略冲突的问题,还需要考虑PCF正在制定(即正在协商)的背景数据传输策略是否会影响到UE的其他策略的制定,譬如影响UE策略、UE的UE会话管理策略的制定。
为避免PCF正在制定(即协商)的背景数据传输策略对UE其他策略,如UE的会话的会话管理策略的制定的影响,本申请还提供了图9所示的会话管理方案。
下面结合说明书附图,对本申请实施例提供的会话管理方案进行描述。
本申请实施例提供的会话管理的方法可用于图9所示网络,如图9所示,为本申请实施例提供的一种通信系统10,该通信系统10包括第二策略控制网元、第一网元。
在第一种实现中:
第二策略控制网元,可以用于制定背景数据传输策略、服务质量(quality of service)策略、切片选择策略等策略与计费控制规则(policy and charging control rule,PCC),并将制定的策略提供给移动性管理网元、会话管理网元等网元。
第一网元,可以称为网络存储网元,用于存储用户数据,如:用户的签约信息、鉴权或授权数据等。具体的,网络存储网元可以为UDM网元或者NRF网元或者UDR网元等。
一种示例中,第二策略控制网元,用于接收对应于用户设备UE的会话的建立请求的策略关联的建立请求,向第一网元发送用于请求应用于会话的第一背景数据传输策略的第四消息。
第一网元,用于接收第四消息,向第二策略控制网元发送第一决策信息。
第二策略控制网元,还用于从第一网元获取对应于第一背景数据传输策略的第一决策信息,根据第一决策信息对会话进行管理。
一种可能的设计中,第二策略控制网元根据第一决策信息对会话进行管理包括:
第二策略控制网元,具体用于根据第一决策信息拒绝策略关联的建立请求,或者, 根据第一决策信息接受策略关联的建立请求。
进一步的,在第二策略控制网元根据第一决策信息接受策略关联的建立请求情况下,第二策略控制网元,还用于接收第一网元发送的第一决策信息对应的第一背景数据传输策略后,根据第一背景数据传输策略制定用于对会话进行策略计费控制的会话的会话管理策略,向会话管理网元发送会话的会话管理策略。
一种可能的设计中,第二策略控制网元,还用于接收第一网元发送的第一背景数据传输策略后,根据第一背景数据传输策略终结策略关联。
一种可能的设计中,第二策略控制网元,还用于在接收到第一决策信息对应的删除指示后,终结策略关联。
在第二种实现中:
第二策略控制网元,用于接收对应于用户设备的注册请求的策略关联的建立请求,向第一网元发送用于请求应用于UE的第一背景数据传输策略的第四消息。
第一网元,用于接收第四消息,向第二策略控制网元发送第一决策信息。
第二策略控制网元,还用于从第一网元获取对应于第一背景数据传输策略的第一决策信息,根据第一决策信息制定UE的UE策略。
其中,第二策略控制网元根据第一决策信息制定UE的UE策略可以包括:
第二策略控制网元具体用于延迟制定UE的UE策略,在获取到第一决策信息对应的第一背景数据传输策略后,根据第一背景数据传输策略制定UE的UE策略。
一种可能的设计中,第二策略控制网元,还用于第二策略控制网元发送策略关联的建立应答,策略关联的建立应答中不携带UE的UE策略。
需要说明的是,图9仅为示例性架构图,除图9中所示功能单元外,该系统还可以包括其他功能网元,如:第一策略控制网元等,本申请实施例对此不进行限定。此外,图9中各个设备的名称不受限制,除图9所示名称之外,各个设备还可以命名为其他名称,如替换成具备相同或相似功能的网元名称,不予限制。
其中,第一策略控制网元用于向第一网元发送第一决策信息。
其中,图9所示通信系统可以为第三代合作伙伴计划(3rd generation partnership project,3GPP)通信系统,如图9可以为图3b所示的第4代(4th generation,4G)通信系统、长期演进(long term evolution,LTE)系统,又可以为图3a所示的第五代(5th generation,5G)通信系统或者新空口(new radio,NR)系统、下一代通信系统等,也可以为非3GPP通信系统,不予限制。
可选的,本申请实施例中的第二策略控制网元也可以称之为通信装置,其可以是一个通用设备或者是一个专用设备,本申请实施例对此不作具体限定。
可选的,本申请实施例中的第二策略控制网元的相关功能可以由一个设备实现,也可以由多个设备共同实现,还可以是由一个设备内的一个或多个功能模块实现,本申请实施例对此不作具体限定。可以理解的是,上述功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行的软件功能,或者是硬件与软件的结合,或者是平台(例如,云平台)上实例化的虚拟化功能。
在具体实现时,图9所示各设备(如第二策略控制网元等)均可以采用图4所示的组成结构,或者包括图4所示的部件。
下面结合图9所示通信系统,对本申请实施例提供的会话管理的方法进行描述。下述实施例中的各网元可以具备图4所示部件,不予赘述。需要说明的是,本申请的实施例中各个设备之间交互的消息名称或消息中的参数名称等只是一个示例,具体实现中也可以采用其他的名称。例如本申请实施例所述的制定可以替换为决策、协商等术语。本申请实施例中的确定也可以理解为创建(create)或者生成(generate),本申请实施例中的“包括”也可以理解为“携带”,本申请实施例中的“制定”也可以理解为“决策”或“确定”等,在此统一说明,本申请实施例对此不作具体限定。
如图10所示,为本申请实施例提供的一种会话管理的方法,该方法可以包括:
S1001:第二策略控制网元接收策略关联的建立请求。
其中,第二策略控制网元可以为图2a所示通信系统中任一策略控制网元。
其中,策略关联的建立请求可以对应于用户设备(UE)的会话的建立请求。策略关联的建立请求可以替换为会话管理策略关联建立请求,用于请求建立UE的会话的会话管理策略。UE的会话的会话管理策略用于对会话进行策略计费控制,会话管理策略至少可以包括策略计费控制(policy charging control)规则,可以用于规定UE建立的用于传输背景数据的PDU会话的相关性能参数,如规定该PDU会话的服务质量(quanlity of service,QoS)参数、最大速率等。
其中,UE的会话的建立请求用于请求建立UE的会话,例如,在5G通信系统下,UE的会话的建立请求可以为UE的协议数据单元(protocol data unit,PDU)会话建立请求,UE的会话可以为UE的PDU会话。
示例性的,第二策略控制网元可以接收来自会话管理网元(如SMF)的策略关联的建立请求。
S1002:第二策略控制网元向第一网元发送第四消息。相应的,第一网元接收第四消息。
其中,第一网元可以为UDR网元或UDM网元或NRF网元或其他能够保存背景数据传输策略的网元等。第一网元的相关描述可参照S501中所述,不予赘述。
其中,第四消息可以用于请求第一网元保存的应用于UE的第一参考标识对应的背景数据传输策略。第一参考标识对应的背景数据传输策略,可以为制定第一策略需要获取的背景数据传输策略,即第一参考标识对应的背景数据传输策略与制定第一策略关联,有可能制定第一策略时需要参考第一参考标识对应的背景数据传输策略。之前,第一策略控制网元与第一应用服务器参考上述实施例协商,根据第一决策信息制定了第一参考标识对应的第三背景数据传输策略,并保存在第一网元。后续,第一策略控制网元由于上述实施例中描述的原因决定重新制定第一参考标识对应的背景数据传输策略(即第一背景数据传输策略)。第一背景数据传输策略为未完成或正在制定(即协商)的背景数据传输策略,而第三背景数据传输策略为失效的背景数据传输策略。
示例性的,第四消息可以包括第一参考标识,第一参考标识可以用于标识第一背景数据传输策略、第三背景数据传输策略,第三背景数据传输策略为旧的背景数据传输策略,第一背景数据传输策略可以为新制定的背景数据传输策略。第一参考标识也可以用于标识第一背景数据传输策略对应的第一决策信息。
S1003:第一网元根据第四消息,向第二策略控制网元发送第一决策信息。相应的, 第二策略控制网元从第一网元获取第一决策信息。
其中,第一决策信息可以包括第一终端数量、第一时间窗口、第一网络区域信息、每个终端传输背景数据时的第一流量、第一背景数据传输策略正在协商的指示或制定第一背景数据传输策略的原因等一种或多种信息。第一网元可以通过特殊信元携带第一决策信息来表示背景数据传输策略正在制定(即协商),或是在第一决策信息中包括特殊的标识来表示背景数据传输策略正在制定(即协商),或是用第一决策信息中的制定背景数据传输策略的原因来表示背景数据传输策略正在制定(即协商)。示例性的,第一网元向第二策略控制网元发送第一网元保存的第一决策信息的过程可参照S502所述,不予赘述。
S1004:第二策略控制网元根据第一决策信息对UE的会话进行管理。
示例性的,第二策略控制网元可以判断第一决策信息是否影响UE的会话管理策略的制定,若第一决策信息不影响UE的会话管理策略的制定,则第二策略控制网元可参照现有方式对UE的会话进行管理;若第一决策信息影响UE的会话管理策略的制定,则第二策略控制网元可采用下述方式一或者方式二对UE的会话进行管理。其中第一决策信息影响UE的会话管理策略的制定可以包括下述一种或者多种情况:如根据运营商配置的网络策略确定不考虑第一背景数据传输策略。
方式一:第二策略控制网元根据第一决策信息拒绝策略关联的建立请求,停止制定UE的会话管理策略。
方式二:第二策略控制网元根据第一决策信息接受策略关联的建立请求。
进一步的,方式二下,第二策略控制网元延迟制定第一策略,直至第二策略控制网元在获取到第一决策信息对应的第一背景数据传输策略后,根据第一背景数据传输策略制定UE的会话的会话管理策略,向会话管理网元发送会话的会话管理策略,触发会话管理网元建立UE的会话。或者,
进一步的,方式二下,当第一背景数据传输策略制定完成,第二策略控制网元在获取到第一背景数据传输策略后,如果第一背景数据传输策略与UE的会话冲突,则根据第一背景数据传输策略终结策略关联。或者,
进一步的,方式二下,如果第一背景数据传输策略协商失败,如第一应用服务器拒绝第一策略控制网元生成的背景数据传输策略,向第一策略控制网元发送拒绝指示,第一策略控制网元向第一网元发送第一参考标识和删除指示,第一网元向第二策略控制网元发送删除第一参考标识和删除指示,第二策略控制网元在接收到删除指示后,终结策略关联。
本申请实施例中,第二策略控制网元终结策略关联可以指第二策略控制网元向会话管理网元发送一个终结请求消息,该终结请求消息用于指示终结策略关联。
需要说明的是,在第二策略控制网元从第一网元获取第一背景数据传输策略或获取删除指示的情况下,所述方法还包括:第二策略控制网元向第一网元订阅第一事件,第一事件为第一网元保存的背景数据传输策略/决策信息改变的事件通知,以便第一网元在保存的背景数据传输策略发生改变时,将改变的背景数据传输策略通知给第二策略控制网元,或者将第一网元中改变之后的所有背景数据传输策略通知给第二策略控制网元,或者,将决策信息的改变情况通知给第二策略控制网元。其中,背景数据传 输策略改变可以包括背景数据传输策略增加或删减或更新等。决策信息的改变可以包括删除决策信息、或者更新决策信息包括的内容、或者增加新的决策信息等等。
基于图10所示方法,策略控制网元在制定UE的会话的会话管理策略时,可以从第一网元获取制定UE的其他策略所需要的决策信息,参考获取到的决策信息对会话进行管理,避免制定的决策信息对应背景数据传输策略与UE的会话的会话管理策略冲突的问题,保证背景数据传输策略以及UE的其他策略的可用性。
除根据决策信息对UE的会话进行管理之外,第二策略控制网元还可以根据决策信息制定UE的除背景数据传输策略之外的其他策略,如UE策略等,避免UE的除背景数据传输策略之外的其他策略与其他策略冲突,导致背景数据传输失败。其中,以根据决策信息制定UE的UE策略为例,第二策略控制网元根据决策信息制定UE的UE策略的方法可参照图10所示,可以包括下述(1)~(4):
(1)第二策略控制网元接收对应于用户设备的注册请求的策略关联的建立请求。
其中,对应于用户设备的注册请求的策略关联的建立请求可以为UE策略关联建立请求,用于请求建立UE策略。UE策略可以用于指示UE建立用于传输背景数据的PDU会话。
其中,注册请求可以请求注册到网络。
示例性的,第二策略控制网元可以接收来自会话管理网元的对应于用户设备的注册请求的策略关联的建立请求。
(2)第二策略控制网元向第一网元发送用于请求应用于UE的第一背景数据传输策略的第四消息。该步骤与S1002相同,不予赘述。
(3)第二策略控制网元从第一网元获取对应于第一背景数据传输策略的第一决策信息。该步骤与S1003相同,不予赘述。
(4)第二策略控制网元根据第一决策信息制定UE的UE策略。
示例性的,第二策略控制网元可以延迟制定UE的UE策略,在获取到第一决策信息对应的第一背景数据传输策略后,根据第一背景数据传输策略制定UE的UE策略。
可选的,第二策略控制网元发送策略关联的建立应答,策略关联的建立应答中不携带UE的UE策略,如第二策略控制网元向会话管理网元发送不携带UE策略的策略关联的建立应答。
如此,策略控制网元在制定UE的UE策略时,可以从第一网元获取制定UE的其他策略所需要的决策信息,参考获取到的决策信息对UE策略进行制定,避免制定的决策信息对应背景数据传输策略与UE策略冲突的问题,保证背景数据传输策略以及UE策略的可用性。
下面结合图3a所示5G通信系统,以策略控制网元为PCF(如第一策略控制网元为PCF2、第二策略控制网元为PCF1),应用服务器为AF(如第一应用服务器为AF2、第二应用服务器为AF1),第一网元为UDR网元、第一背景数据传输策略为背景数据传输策略1、第一决策信息为决策信息1,PCF1更新或重新协商背景数据传输策略1,PCF2制定UE策略、UE会话管理策略为例,对图10所示方法进行介绍。其中,虽然图3a中未示出,但是图3a所示5G通信系统中还可以包括:接入与移动性管理功能 (access and mobility management function,AMF)、会话管理功能(session management function,SMF)以及其他网元,不予限制。
图11为本申请实施例提供的一种基于背景数据传输策略的制定UE策略和会话管理策略的方法流程图,如图11所示,该方法可以包括:
S1101:PCF1确定网络性能指标低于或者恢复到预设阈值。
其中,预设阈值可以根据需要设置,不予限制。例如,传输窗口分配之后,若网络发生变化,该时段的网络负载变得相对拥挤,费率也相应的变得较高,从而导致用户传输费率高,不能满足用户使用最低的费用进行网络传输的需求,即网络性能指标低于预设阈值。
示例性的,PCF1可以自己确定网络性能指标是否低于或者恢复到预设阈值;或者,PCF1可以从其他网元获知网络性能指标是否低于或者恢复到预设阈值,如PCF1向NWDAF发送订阅请求,订阅请求用于获取网络性能指标事件,网络性能指标事件为已制定的背景数据传输策略(如根据决策信息1制定的背景数据传输策略3)时间窗口期间内的网络性能指标低于或者恢复到预设阈值的事件;PCF1接收NWDAF通知的网络性能指标事件。
其中,S1101之前PCF1根据决策信息1制定了背景数据传输策略3,并将reference Id1对应的决策信息1和背景数据传输策略3保存在UDR。
S1102:PCF1向UDR网元发送消息1。
其中,消息1可以为Nudr接口提供的数据管理服务_查询请求(Nudr_DM_query reqeust),消息1用于请求UDR网元保存的所有背景数据传输策略,消息1中可以携带PCF1为背景数据传输策略3分配的参考标识:reference Id1以及决策信息1。本申请不限于将reference Id1和决策信息1携带在消息1中发送给UDR网元,PCF1也可以通过其他消息将reference Id1和决策信息1发送给UDR网元。
其中,PCF1可以通过在特殊信元来携带决策信息1来表示reference Id1对应的背景数据传输策略正在制定,或是在决策信息1中包括特殊的标识来表示reference Id1对应的背景数据传输策略正在制定,或是用决策信息1中的制定背景数据传输策略的原因来表示reference Id1对应的背景数据传输策略正在制定。同时也通过上述信息来指示背景数据传输策略3不是有效的背景数据传输策略。
S1103:UDR网元接收消息1,向PCF1返回UDR网元保存的所有背景数据传输策略。
进一步的,UDR网元对应保存决策信息1以及reference Id1。
需要说明的是,若此时UDR网元中保存有其他PCF正在制定背景数据传输策略所需要的决策信息,UDR网元还返回UDR网元中保存的决策信息等。
S1104:PCF1接收UDR网元保存的所有背景数据传输策略,根据UDR网元保存的所有背景数据传输策略以及当前的网络状态、运营商策略等制定一个或多个候选背景数据传输策略。
其中,候选背景数据传输策略为可能被AF1选中作为背景数据传输策略1的一些背景传输数据传输策略。一个候选背景数据传输策略可以包括策略标识、推荐的传输时间窗口、最大聚合比特率、计费组标识等一种或者多种信息。
示例性的,PCF1根据UDR网元保存的所有背景数据传输策略以及当前的网络状态、运营商策略等制定一个或多个候选背景数据传输策略的过程可参照现有技术,不予赘述。
进一步的,PCF1制定一个或者多个候选背景数据传输策略之后,执行图1所示S116~S113,在PCF1执行S116~S113的过程中,会存在其他PCF要基于制定背景数据传输策略制定UE策略或会话管理策略。具体的,该过程如下步骤所示:
S1105:UE向AMF发起注册请求,AMF接收到UE的注册请求。
其中,UE的注册请求用于请求注册到网络。
S1106:AMF向PCF2发送UE策略关联建立请求,PCF2根据UE的签约信息、网络策略或获得的应用数据等确定制定UE策略需要获取reference Id1对应的背景数据传输策略。AMF和PCF2之间的UE策略关联是用于PCF2向AMF提供发送给UE的UE策略。
S1107:PCF2向UDR网元发送消息2。
其中,消息2可以用于请求reference Id1对应的背景数据传输策略,消息2中可以包括reference Id1。
S1108:UDR网元向PCF2返回reference Id1对应的决策信息1。
其中,UDR网元可以通过决策信息1携带特殊信元来表示reference Id1对应的背景数据传输策略正在协商,或是在决策信息1中包括特殊的标识来表示reference Id1对应的背景数据传输策略正在协商,或是用决策信息1中的制定背景数据传输策略1的原因来表示reference Id1对应的背景数据传输策略正在协商。
可选的,UDR还向PCF2返回背景数据传输策略3。决策信息1指示背景数据传输策略3已经失效。
S1109:PCF2确定决策信息1影响UE策略的制定。
由于决策信息1指示reference Id1对应的背景数据传输策略正在制定或决策信息1指示背景数据传输策略3已经失效,PCF2不根据决策信息1或背景数据传输策略3决策/制定背景数据传输策略3对应的UE策略,或者延迟根据背景数据传输策略1决策/制定背景数据传输策略1对应的UE策略。
S1110:PCF2向AMF返回UE策略关联建立应答。
其中,UE策略关联建立应答中不携带需要根据背景数据传输策略1或背景数据传输策略3制定的UE策略。
S1111:UE注册成功后,UE向AMF发送PDU会话建立请求,AMF进一步向SMF发送PDU会话建立请求。SMF接收到来自AMF的PDU会话建立请求。
S1112:SMF向PCF2发送会话管理策略关联建立请求,PCF2根据签约或网络策略等确定制定会话管理策略需要获取reference Id1对应的背景数据传输策略。SMF和PCF2之间建立的会话管理策略关联用于PCF2向SMF提供管理PDU会话的相关策略,譬如PDU会话相关策略信息(包括会话最大聚会比特率,策略控制请求触发器等)、策略计费规则等。从而实现PCF对PDU会话的管理。
S1113:PCF2向UDR网元发送消息3请求背景数据传输策略。
其中,消息3中包括reference Id1。
S1114:UDR网元向PCF2返回reference Id1对应的决策信息1。
示例性的,UDR网元通过决策信息1携带特殊信元来表示reference Id1对应的背景数据传输策略正在协商,或是在决策信息1中包括特殊的标识来表示reference Id1对应的背景数据传输策略正在协商,或是用决策信息1中的制定背景数据传输策略的原因来表示reference Id1对应的背景数据传输策略正在协商。
可选的,UDR向PCF2返回背景数据传输策略3。
S1115:PCF2确定决策信息1影响UE会话管理策略的制定。
由于决策信息1指示reference Id1对应的背景数据传输策略正在制定或决策信息1指示背景数据传输策略3已经失效,PCF2不根据决策信息1决策UE的会话管理策略;或PCF2决定接受会话管理策略关联建立请求,延迟根据决策信息1或背景数据传输策略3决策背景数据传输策略对应的UE的会话管理策略;或者PCF2决定拒绝会话管理策略关联建立请求。
S1116:PCF2向SMF返回会话管理策略关联应答消息。
若PCF2根据决策信息1决定延迟决策背景数据传输策略对应的UE会话管理策略,则PCF2向SMF返回接受指示或成功应答指示;若PCF2决定拒绝会话管理策略关联建立请求,在会话管理策略关联应答消息中携带拒绝指示以及原因值,拒绝指示可以用于指示拒绝会话管理策略关联建立请求,原因值可以是背景数据传输策略正在重协商或背景数据传输策略失效。
进一步的,SMF向AMF发送拒绝指示以及原因值,而AMF进一步向UE发送拒绝指示以及原因值。SMF进一步向AMF返回相应的应答消息。
S1117:PCF1根据决策信息1、已存在的所有背景数据传输策略、当前的网络状态以及运营商策略制定一个或多个候选背景数据传输策略,并向NEF发送确认消息1。
S1118:NEF接收确认消息1,并向AF1返回通知消息1。
S1119:AF1接收通知消息1,若AF1决定从一个或者多个候选背景数据传输策略中选择其中一个背景数据传输策略作为背景数据传输策略1,则在向NEF发送更新请求1中携带reference Id1和选择的背景数据传输策略1的策略标识;若AF1拒绝所有候选背景数据传输策略,则AF1在向NEF发送的更新请求1中携带拒绝指示。
S1120:NEF接收更新请求1,向PCF1发送更新请求1。
S1121:PCF1接收更新请求1,向UDR网元发送更新请求2。
其中,该更新请求2可以为Nudr_DM_Update Request。
示例性的,PCF1可以根据更新请求1中的内容向UDR发送更新请求2。例如,如果更新请求1中携带reference Id1和选择的背景数据传输策略1的策略标识,则更新请求2中携带reference Id1和选择的背景数据传输策略1;如果更新请求1中携带拒绝指示,则更新请求中可以携带reference Id1和删除指示,该删除指示可以用于指示删除reference Id1对应的决策信息和/或背景数据传输策略。
S1122:UDR网元接收更新请求2,向PCF1返回更新请求2的响应。
进一步的,在更新请求2中携带reference Id1和背景数据传输策略1的情况下,UDR网元将reference Id1对应的背景数据传输策略更新为背景数据传输策略1;或者,在更新请求2中携带reference Id1和删除指示的情况下,删除reference Id1对应的决 策信息1和/或即删除保存的背景数据传输策略3)。
S1123:基于之前PCF2已经向UDR网元订阅了背景数据传输策略改变的事件通知,UDR网元向PCF2发送新的背景数据传输策略1或发送reference Id1和删除指示。
S1124:PCF2接收背景数据传输策略1,或者,PCF2接收reference Id1和删除指示,向UDR网元返回响应消息。
S1125:若PCF2接收到背景数据传输策略1,则PCF2根据背景数据传输策略1制定对应的UE策略,PCF2向AMF发送UE策略提供消息,UE策略提供消息中包括制定的UE策略。AMF进一步将UE策略发送给UE。
若PCF2接收reference Id1和删除指示,则PCF2删除reference Id1对应的决策信息1和/或背景数据传输策略3,终结会话管理策略关联建立请求。
S1126:若步骤S1116中,PCF2向SMF返回接受指示或成功应答指示,且若接收新的背景数据传输策略1,则PCF2根据新的背景数据传输策略1制定对应的UE会话管理策略或是根据新的背景数据传输策略1拒绝PDU会话的建立。
若PCF2制定了对应的UE会话管理策略,PCF2向SMF发送UE会话管理策略。
若PCF决定拒绝PDU会话,则PCF2向SMF发送拒绝指示以及原因值,原因值可以是校验条件不满足或策略授权失败等。进一步的SMF将决策信息发送给AMF。
若步骤S1116中,PCF2向SMF返回接受指示或成功应答指示,且若接收reference Id1和删除指示,PCF2向SMF发送拒绝指示以及原因值,原因值可以是校验条件不满足或策略授权失败等。
基于图11所示方法,PCF可以在制定UE策略或者UE会话管理策略时,参考其他PCF已制定的背景数据传输策略或者其他PCF制定背景数据传输策略所需的决策信息,避免与自身制定的UE策略或者UE会话管理策略与其他PCF制定的背景数据传输策略冲突,保证自身制定的UE策略或者UE会话管理策略的可用性。
图12示出了一种通信装置120的结构图,该通信装置120可以为第二策略控制网元、第二策略控制网元中的芯片、片上系统或者其他能够实现上述方法中第二策略控制网元的功能的装置等,该通信装置120可以用于执行上述方法实施例中涉及的第二策略控制网元的功能。作为一种可实现方式,图12所示通信装置120包括:发送单元1201、接收单元1202、处理单元1203;
在第一种实现中:
接收单元1202,用于接收策略关联的建立请求,所述策略关联的建立请求对应于用户设备UE的会话的建立请求。如接收单元1202支持通信装置120执行S1001。
发送单元1201,用于向第一网元发送第四消息,第四消息可以用于请求应用于会话的第一背景数据传输策略。例如,发送单元1201用于支持通信装置120执行S1002、S1107、S1113。
接收单元1202,用于从第一网元获取第一网元保存的第一决策信息,第一决策信息对应于第一背景数据传输策略。例如,接收单元1202用于支持通信装置120执行S1003。
处理单元1203,用于根据第一决策信息对会话进行管理。例如,处理单元1203用于支持通信装置执行S1004、S1109、S1115以及S1126。
其中,该可能的实现方式中,处理单元1203,具体用于当第二决策信息影响第一背景数据传输策略的决策/制定时,根据所述第一决策信息接受所述策略关联的建立请求,进一步的,第二策略控制网元接收第一网元发送的第一决策信息对应的第一背景数据传输策略后,根据第一背景数据传输策略制定会话的会话管理策略,向会话管理网元发送会话的会话管理策略;或者,第二策略控制网元接收第一网元发送的第一背景数据传输策略后,根据第一背景数据传输策略终结策略关联;或者,第二策略控制网元在接收到第一决策信息对应的删除指示后,终结策略关联。或者,
处理单元1203,具体用于当第二决策信息影响第一背景数据传输策略的决策/制定时,根据第一决策信息拒绝策略关联的建立请求。
在第二种实现中:
接收单元1202,用于接收策略关联的建立请求,所述策略关联的建立请求对应于用户设备的注册请求。
发送单元1201,用于向第一网元发送第四消息,所述第四消息用于请求应用于所述UE的第一背景数据传输策略。
接收单元1202,还用于从第一网元获取第一决策信息,第一决策信息对应于第一背景数据传输策略。
处理单元1203,用于根据第一决策信息制定UE的UE策略。
一种可能的设计中,处理单元1203,具体用于延迟制定UE的UE策略,在获取到第一决策信息对应的第一背景数据传输策略后,根据第一背景数据传输策略制定UE的UE策略。
一种可能的设计中,发送单元1201,还用于第二策略控制网元发送策略关联的建立应答,策略关联的建立应答中不携带UE的UE策略。
具体的,上述图10-图11所示方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。通信装置120用于执行图10-图11所示方法所示制定背景数据传输策略的方法中第二策略控制网元的功能,因此可以达到与上述制定背景数据传输策略的方法相同的效果。
在本实施例中,该通信装置120还可以采用集成的方式划分各个功能模块的形式来呈现。这里的“功能模块”可以指专用集成电路(application specific integrated circuit,ASIC),电路,执行一个或多个软件或固件程序的处理器和存储器,集成逻辑电路,和/或其他可以提供上述功能的器件。在一个简单的实施例中,本领域的技术人员可以想到该通信装置120可以采用图4所示的通信装置400的形式。
比如,图4所示的通信装置400中的处理器401可以通过调用存储器404中保存的计算机执行指令,使得通信装置400执行上述方法实施例中的制定背景数据传输策略的方法。
具体的,图12中的发送单元1201和接收单元1202的功能/实现过程可以通过图4所示的通信装置400中的处理器401调用存储器404中保存的计算机执行指令来实现。图12中的发送单元1201和接收单元1202的功能/实现过程可以通过图4中所示的通信装置400中的通信接口403来实现。图12中的处理单元1203的功能/实现过程可以通过图4中所示的通信装置400中的处理器401来实现。
本申请实施例还提供了一种计算机可读存储介质。上述方法实施例中的全部或者部分流程可以由计算机程序来指令相关的硬件完成,该程序可存储于上述计算机可读存储介质中,该程序在执行时,可包括如上述各方法实施例的流程。计算机可读存储介质可以是前述任一实施例的终端装置,如:包括数据发送端和/或数据接收端的内部存储单元,例如终端装置的硬盘或内存。上述计算机可读存储介质也可以是上述终端装置的外部存储设备,例如上述终端装置上配备的插接式硬盘,智能存储卡(smart media card,SMC),安全数字(secure digital,SD)卡,闪存卡(flash card)等。进一步地,上述计算机可读存储介质还可以既包括上述终端装置的内部存储单元也包括外部存储设备。上述计算机可读存储介质用于存储上述计算机程序以及上述终端装置所需的其他程序和数据。上述计算机可读存储介质还可以用于暂时地存储已经输出或者将要输出的数据。
本申请实施例还提供了一种计算机指令。上述方法实施例中的全部或者部分流程可以由计算机指令来指令相关的硬件(如计算机、处理器、网络设备、和终端等)完成。该程序可被存储于上述计算机可读存储介质中。
应理解,在本申请实施例中,“与A对应的B”表示B与A相关联。例如,可以根据A可以确定B。还应理解,根据A确定B并不意味着仅仅根据A确定B,还可以根据A和/或其它信息确定B。此外,本申请实施例中出现的“连接”是指直接连接或者间接连接等各种连接方式,以实现设备间的通信,本申请实施例对此不做任何限定。
本申请实施例中出现的“传输”(transmit/transmission)如无特别说明,是指双向传输,包含发送和/或接收的动作。具体地,本申请实施例中的“传输”包含数据的发送,数据的接收,或者数据的发送和数据的接收。或者说,这里的数据传输包括上行和/或下行数据传输。数据可以包括信道和/或信号,上行数据传输即上行信道和/或上行信号传输,下行数据传输即下行信道和/或下行信号传输。本申请实施例中出现的“网络”与“系统”表达的是同一概念,通信系统即为通信网络。
在本申请的描述中,除非另有说明,“/”表示前后关联的对象是一种“或”的关系,例如,A/B可以表示A或B;本申请中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,其中A,B可以是单数或者复数。并且,在本申请的描述中,除非另有说明,“多个”是指两个或多于两个。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。另外,为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。同时,在本申请实施例中,“示例性的”或者“例如”等词用于表示作例子、例证或说明。本申请实施例中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念,便于理解。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个装置,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或也可以不是物理上分开的,作为单元显示的部件可以是一个物理单元或多个物理单元,即可以位于一个地方,或者也可以分布到多个不同地方。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该软件产品存储在一个存储介质中,包括若干指令用以使得一个设备,如:可以是单片机,芯片等,或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何在本申请揭露的技术范围内的变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。
Claims (52)
- 一种制定背景数据传输策略的方法,其特征在于,所述方法包括:第一策略控制网元向第一网元发送第一消息,所述第一消息用于请求所述第一网元保存的背景数据传输策略;所述第一策略控制网元从所述第一网元获取所述第一网元保存的背景数据传输策略以及第二决策信息,所述第二决策信息用于制定第二背景数据传输策略;所述第一策略控制网元根据第一决策信息、所述第二决策信息以及所述第一网元保存的背景数据传输策略,制定第一背景数据传输策略,所述第一决策信息用于制定所述第一背景数据传输策略。
- 根据权利要求1所述的方法,其特征在于,所述第一策略控制网元根据所述第一决策信息、所述第二决策信息以及所述第一网元保存的背景数据传输策略,制定所述第一背景数据传输策略包括:当确定所述第二决策信息影响所述第一背景数据传输策略的制定时,所述第一策略控制网元根据所述第一决策信息、所述第二决策信息以及所述第一网元保存的背景数据传输策略制定所述第一背景数据传输策略,所述第一背景数据传输策略和所述第二背景数据传输策略的执行互不影响。
- 根据权利要求1所述的方法,其特征在于,所述第一策略控制网元根据所述第一决策信息、所述第二决策信息以及所述第一网元保存的背景数据传输策略,制定所述第一背景数据传输策略包括:当确定所述第二决策信息影响所述第一背景数据传输策略的制定时,所述第一策略控制网元在获取到所述第二背景数据传输策略后,根据所述第一决策信息、所述第一网元保存的背景数据传输策略和所述第二背景数据传输策略制定所述第一背景数据传输策略。
- 根据权利要求1所述的方法,其特征在于,所述第一策略控制网元根据第一决策信息、所述第二决策信息以及所述第一网元保存的背景数据传输策略,制定所述第一背景数据传输策略包括:所述第一策略控制网元延迟所述第一背景数据传输策略的制定,并且在获取到所述第二背景数据传输策略后,根据所述第一决策信息、所述第一网元保存的背景数据传输策略制定所述第一背景数据传输策略。
- 根据权利要求1所述的方法,其特征在于,所述第一策略控制网元根据第一决策信息、所述第二决策信息以及所述第一网元保存的背景数据传输策略,制定所述第一背景数据传输策略包括:所述第一策略控制网元延迟所述第一背景数据传输策略的制定,并且在获取到所述第二决策信息对应的删除指示后,根据所述第一决策信息、所述第一网元保存的背景数据传输策略制定所述第一背景数据传输策略。
- 根据权利要求1-5任一项所述的方法,其特征在于,所述第一决策信息包括下述一种或者多种:第一终端数量、第一时间窗口、第一网络区域信息、每个终端传输背景数据时的第一流量、或制定所述第一背景数据传输策略的原因;所述第二决策信息包括下述一种或者多种:第二终端数量、第二时间窗口、第二网络区域信息、每个终端传输背景数据时的第二流量、或制定所述第二背景数据传输策略的原因。
- 根据权利要求1-5任一项所述的方法,其特征在于,所述第二决策信息包括下述一种或者多种:第二终端数量、第二时间窗口、第二网络区域信息、每个终端传输背景数据时的第二流量、或所述第二背景数据传输策略正在协商的指示、或者制定所述第二背景数据传输策略的原因。
- 根据权利要求6或7所述的方法,其特征在于,所述第二决策信息影响所述第一背景数据传输策略的制定包括下述一种或者多种情况:所述第一时间窗口与所述第二时间窗口重叠、所述第一网络区域信息所指示的网络区域与所述第二网络区域信息所指示的网络区域重叠。
- 根据权利要求1-8任一项所述的方法,其特征在于,所述第一消息包括第一参考标识以及所述第一决策信息,所述第一参考标识用于标识所述第一背景数据传输策略。
- 根据权利要求1-9任一项所述的方法,其特征在于,所述第一策略控制网元向所述第一网元发送所述第一消息之前,还包括:所述第一策略控制网元接收来自第一应用服务器的第二消息,所述第二消息用于请求所述第一策略控制网元制定所述第一背景数据传输策略,所述第二消息包括所述第一决策信息。
- 根据权利要求1-9任一项所述的方法,其特征在于,所述方法还包括:第一策略控制网元向所述第一网元发送第三消息,所述第三消息包括第一参考标识以及所述第一决策信息,所述第一参考标识用于标识所述第一背景数据传输策略。
- 根据权利要求1-11任一项所述的方法,其特征在于,所述第一策略控制网元向所述第一网元发送所述第一消息包括:当网络性能指标低于或者恢复到预设阈值时,所述第一策略控制网元向所述第一网元发送所述第一消息,所述网络性能指标为第三背景数据传输策略时间窗口期间内的网络性能指标,所述第三背景数据传输策略为所述第一策略控制网元根据所述第一决策信息制定的背景数据传输策略。
- 根据权利要求1-12任一项所述的方法,其特征在于,所述第一网元包括统一数据仓库UDR网元或统一数据管理UDM网元或网络存储功能NRF网元。
- 一种第一策略控制网元,其特征在于,包括:发送单元,用于向第一网元发送第一消息,所述第一消息用于请求所述第一网元保存的背景数据传输策略;接收单元,用于从所述第一网元获取所述第一网元保存的背景数据传输策略以及第二决策信息,所述第二决策信息用于制定第二背景数据传输策略;处理单元,用于根据第一决策信息、所述第二决策信息以及所述第一网元保存的背景数据传输策略,制定第一背景数据传输策略,所述第一决策信息为用于制定所述第一背景数据传输策略的信息。
- 根据权利要求14所述的第一策略控制网元,其特征在于,所述处理单元,具体用于当确定所述第二决策信息影响所述第一背景数据传输策略的制定时,根据所述第一决策信息、所述第二决策信息以及所述第一网元保存的背景数据传输策略制定所述第一背景数据传输策略,所述第一背景数据传输策略和所述第二背景数据传输策略的执行互不影响。
- 根据权利要求14所述的第一策略控制网元,其特征在于,所述处理单元,具体用于当确定所述第二决策信息影响所述第一背景数据传输策略的制定时,在获取到所述第二背景数据传输策略后,根据所述第一决策信息、所述第一网元保存的背景数据传输策略和所述第二背景数据传输策略制定所述第一背景数据传输策略。
- 根据权利要求14所述的第一策略控制网元,其特征在于,所述处理单元,具体用于延迟所述第一背景数据传输策略的制定,并且在获取到所述第二背景数据传输策略后,根据所述第一决策信息、所述第一网元保存的背景数据传输策略和所述第二背景数据传输策略制定所述第一背景数据传输策略。
- 根据权利要求14所述的第一策略控制网元,其特征在于,所述处理单元,具体用于延迟所述第一背景数据传输策略的制定,并且在获取到所述第二决策信息对应的删除指示后,根据所述第一网元保存的背景数据传输策略制定所述第一背景数据传输策略。
- 根据权利要求14-18任一项所述的第一策略控制网元,其特征在于,所述第一决策信息包括下述一种或者多种:第一终端数量、第一时间窗口、第一网络区域信息、每个终端传输背景数据时的第一流量、或制定所述第一背景数据传输策略的原因;所述第二决策信息包括下述一种或者多种:第二终端数量、第二时间窗口、第二网络区域信息、每个终端传输背景数据时的第二流量、或制定所述第二背景数据传输策略的原因。
- 根据权利要求14-18任一项所述的第一策略控制网元,其特征在于,所述第二决策信息包括下述一种或者多种:第二终端数量、第二时间窗口、第二网络区域信息、每个终端传输背景数据时的第二流量、或所述第二背景数据传输策略正在协商的指示、或制定所述第二背景数据传输策略的原因。
- 根据权利要求19或20所述的第一策略控制网元,其特征在于,所述第二决策信息影响所述第一背景数据传输策略的制定包括下述一种或者多种情况:所述第一时间窗口与所述第二时间窗口重叠、所述第一网络区域信息所指示的网络区域与所述第二网络区域信息所指示的网络区域重叠。
- 根据权利要求14-21任一项所述的第一策略控制网元,其特征在于,所述第一消息包括第一参考标识以及所述第一决策信息,所述第一参考标识用于标识所述第一背景数据传输策略。
- 根据权利要求14-22任一项所述的第一策略控制网元,其特征在于,所述接收单元,还用于在所述发送单元向所述第一网元发送所述第一消息之前,接收来自第一应用服务器的第二消息,所述第二消息用于请求所述第一策略控制网元 制定所述第一背景数据传输策略,所述第二消息包括所述第一决策信息。
- 根据权利要求14-23任一项所述的第一策略控制网元,其特征在于,所述处理单元,具体用于向所述第一网元发送第三消息,所述第三消息包括第一参考标识以及所述第一决策信息,所述第一参考标识用于标识所述第一背景数据传输策略。
- 根据权利要求14-24任一项所述的第一策略控制网元,其特征在于,所述发送单元,具体用于当网络性能指标低于或者恢复到预设阈值时,向所述第一网元发送所述第一消息,所述网络性能指标为第三背景数据传输策略时间窗口期间内的网络性能指标,所述第三背景数据传输策略为根据所述第一决策信息制定的背景数据传输策略。
- 根据权利要求14-25任一项所述的第一策略控制网元,其特征在于,所述第一网元包括统一数据仓库UDR网元或统一数据管理UDM网元或网络存储功能NRF网元。
- 一种通信系统,其特征在于,所述通信系统包括:第一策略控制网元,用于向第一网元发送第一消息,所述第一消息用于请求所述第一网元保存的背景数据传输策略;所述第一网元,用于接收所述第一消息,向所述第一策略控制网元发送所述第一网元保存的背景数据传输策略以及第二决策信息,所述第二决策信息用于制定第二背景数据传输策略;所述第一策略控制网元,还用于从所述第一网元获取所述第一网元保存的背景数据传输策略以及第二决策信息,根据第一决策信息、所述第二决策信息以及所述第一网元保存的背景数据传输策略,制定第一背景数据传输策略,所述第一决策信息用于制定所述第一背景数据传输策略。
- 根据权利要求27所述的通信系统,其特征在于,所述第一消息包括第一参考标识以及所述第一决策信息,所述第一参考标识用于标识所述第一背景数据传输策略;所述第一网元,还用于保存所述第一参考标识以及所述第一决策信息之间的对应关系。
- 根据权利要求27或28所述的通信系统,其特征在于,所述通信系统还包括:第一应用服务器,用于向所述第一策略控制网元发送第二消息,所述第二消息用于请求所述第一策略控制网元制定所述第一背景数据传输策略,所述第二消息包括所述第一决策信息。
- 根据权利要求27-29任一项所述的通信系统,其特征在于,所述通信系统还包括:第二策略控制网元,用于向所述第一网元发送所述第二决策信息。
- 一种制定背景数据传输策略的方法,其特征在于,所述方法包括:第一策略控制网元确定网络性能指标在第一时间窗口内低于预设阈值,所述第一时间窗口为第一背景数据传输策略包括的时间窗口,所述第一背景数据传输策略为第一参考标识对应的背景数据传输策略;所述第一策略控制网元从所述第一网元获取所述第一网元保存的所有背景数据传 输策略;所述第一策略控制网元根据所述第一网元保存的所有背景数据传输策略和所述网络性能重新协商所述第一参考标识对应的背景数据传输策略;所述第一策略控制网元向第一网元发送第一消息,所述第一消息包括所述第一参考标识和第一决策信息,所述第一决策信息用于指示所述第一参考标识对应的背景数据传输策略正在协商。
- 根据权利要求31所述的方法,其特征在于,所述第一策略控制网元根据所述第一网元保存的所有背景数据传输策略和所述网络性能重新协商所述第一参考标识对应的背景数据传输策略,包括:所述第一策略控制网元根据所述第一网元保存的所有背景数据传输策略和所述网络性能制定至少一个候选背景数据传输策略,并将所述至少一个候选背景数据传输策略以及所述第一参考标识发送给第一应用功能网元;所述第一策略控制网元接收所述第一应用功能网元选择的背景数据传输策略的策略标识;所述第一策略控制网元向所述第一网元发送第二消息,所述第二消息包括所述第一参考标识和所述选择的背景数据传输策略。
- 根据权利要求31所述的方法,其特征在于,所述第一策略控制网元根据所述第一网元保存的所有背景数据传输策略和所述网络性能重新协商所述第一参考标识对应的背景数据传输策略,包括:所述第一策略控制网元根据所述第一网元保存的所有背景数据传输策略和所述网络性能制定至少一个候选背景数据传输策略,并将所述至少一个候选背景数据传输策略以及所述第一参考标识发送给第一应用功能网元;所述第一策略控制网元接收所述第一应用功能网元发送的拒绝指示,所述拒绝指示用于指示所述第一应用功能网元拒绝所有候选背景数据传输策略;所述第一策略控制网元根据所述拒绝指示,向所述第一网元发送删除指示和所述第一参考标识,所述删除指示用于指示所述第一网元删除所述第一参考标识对应的决策信息和/或背景数据传输策略。
- 一种通信系统,其特征在于,所述通信系统包括第一策略控制网元、第一网元;所述第一策略控制网元,用于确定网络性能指标在第一时间窗口内低于预设阈值,所述第一时间窗口为第一背景数据传输策略包括的时间窗口,所述第一背景数据传输策略为第一参考标识对应的背景数据传输策略;所述第一策略控制网元,还用于从所述第一网元获取所述第一网元保存的所有背景数据传输策略;根据所述第一网元保存的所有背景数据传输策略和所述网络性能重新协商所述第一参考标识对应的背景数据传输策略;所述第一策略控制网元,还用于向所述第一网元发送第一消息,所述第一消息包括所述第一参考标识和第一决策信息,所述第一决策信息用于指示所述第一参考标识对应的背景数据传输策略正在协商。
- 根据权利要求34所述的通信系统,其特征在于,所述第一网元,还用于接收来自所述第一策略控制网元的所述第一消息,保存所 述第一决策信息和所述第一参考标识。
- 根据权利要求35所述的通信系统,其特征在于,所述第一网元,还用于接收来自第二策略控制网元的用于请求所述第一网元保存的背景数据传输策略的消息;所述第一网元向所述第二策略控制网元发送所述第一网元保存的所有背景数据传输策略、所述第一参考标识和所述第一决策信息。
- 根据权利要求35所述的通信系统,其特征在于,所述第一网元,还用于接收来自第二策略控制网元的第四消息,所述第四消息包括所述第一参考标识,所述第四消息用于请求应用于用户设备UE的所述第一参考标识对应的的背景数据传输策略;所述第一网元,还用于向所述第二策略控制网元发送所述第一决策信息。
- 根据权利要求34-37任一项所述的通信系统,其特征在于,所述第一策略控制网元,还用于向所述第一网元发送所述第一参考标识和所述第一策略控制网元重新协商的背景数据传输策略;所述第一网元,还用于接收来自所述第一策略控制网元的所述第一参考标识和所述第一策略控制网元重新协商的背景数据传输策略;所述第一网元,还用于保存所述重新协商的背景数据传输策略。
- 根据权利要求38所述的通信系统,其特征在于,所述第一网元,还用于向第二策略控制网元发送所述重新协商的背景数据传输策略。
- 一种会话管理的方法,其特征在于,所述方法包括:第二策略控制网元接收对应于用户设备UE的会话的建立请求的策略关联的建立请求;所述第二策略控制网元向第一网元发送第四消息,所述第四消息包括第一参考标识,所述第四消息用于请求第一参考标识对应的背景数据传输策略;所述第二策略控制网元从所述第一网元接收第一决策信息,所述第一决策信息指示所述第一参考标识对应的背景数据传输策略正在协商;所述第二策略控制网元根据所述第一决策信息对所述会话进行管理。
- 根据权利要求40所述的方法,其特征在于,所述第二策略控制网元根据第一决策信息对所述会话进行管理包括:所述第二策略控制网元根据第一决策信息拒绝所述策略关联的建立请求。
- 根据权利要求40所述的方法,其特征在于,所述第二策略控制网元根据第一决策信息对所述会话进行管理包括:所述第二策略控制网元根据所述第一决策信息延迟制定用于对所述会话进行管理的会话管理策略;所述第二策略控制网元接收所述第一网元发送的所述第一参考标识对应的第一背景数据传输策略后,根据所述第一背景数据传输策略制定所述会话管理策略;所述第二策略控制网元向会话管理网元发送所述会话管理策略。
- 根据权利要求40所述的方法,其特征在于,所述第二策略控制网元根据第一决策信息对所述会话进行管理包括:所述第二策略控制网元根据所述第一决策信息延迟制定用于对所述会话进行管理的会话管理策略;所述第二策略控制网元接收所述第一网元发送的所述第一参考标识对应的第一背景数据传输策略后,根据所述第一背景数据传输策略确定终结所述会话;所述第二策略控制网元向会话管理网元发送终结所述会话的指示。
- 一种通信系统,其特征在于,所述通信系统包括:第二策略控制网元,用于接收对应于用户设备UE的会话的建立请求的策略关联的建立请求,向第一网元发送第四消息,所述第四消息包括第一参考标识,所述第四消息用于请求第一参考标识对应的背景数据传输策略;所述第一网元,用于接收所述第四消息,向所述第二策略控制网元发送第一决策信息,所述第一决策信息指示所述第一参考标识对应的背景数据传输策略正在协商;所述第二策略控制网元,用于从所述第一网元接收所述第一决策信息,根据所述第一决策信息对所述会话进行管理。
- 根据权利要求44所述的通信系统,其特征在于,所述第二策略控制网元,具体用于根据第一决策信息拒绝所述策略关联的建立请求。
- 根据权利要求44所述的通信系统,其特征在于,所述第二策略控制网元,具体用于:根据所述第一决策信息延迟制定用于对所述会话进行管理的会话管理策略,接收所述第一网元发送的所述第一参考标识对应的第一背景数据传输策略后,根据所述第一背景数据传输策略制定所述会话管理策略,向会话管理网元发送所述会话管理策略。
- 根据权利要求44所述的通信系统,其特征在于,所述第二策略控制网元,具体用于:根据所述第一决策信息延迟制定用于对所述会话进行管理的会话管理策略;接收所述第一网元发送的所述第一参考标识对应的第一背景数据传输策略后,根据所述第一背景数据传输策略确定终结所述会话,向会话管理网元发送终结所述会话的指示。
- 一种通信装置,其特征在于,包括:存储器,用于存储计算机程序;处理器,用于从所述存储器调用并运行所述计算机程序,以执行如权利要求1-13任一项,或如权利要求31-33任一项,或者如权利要求40-43任一项所述的方法。
- 一种处理器,其特征在于,用于执行如权利要求1-13任一项,或如权利要求31-33任一项,或者如权利要求40-43任一项所述的方法。
- 一种芯片系统,其特征在于,包括:存储器,用于存储计算机程序;处理器,用于从所述存储器调用并运行所述计算机程序,使得安装有所述芯片系统的设备执行如权利要求1-13任一项,或如权利要求31-33任一项,或者如权利要求40-43任一项所述的方法。
- 一种计算机可读存储介质,包括计算机程序,当其在计算机上运行时,使得所 述计算机执行如权利要求1-13任一项,或如权利要求31-33任一项,或者如权利要求40-43任一项所述的方法。
- 一种计算机程序产品,所述计算机程序产品包括计算机程序,当所述计算机程序在计算机上运行时,使得计算机执行如权利要求1-13任一项,或如权利要求31-33任一项,或者如权利要求40-43任一项所述的方法。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP21817728.5A EP4152812A4 (en) | 2020-06-03 | 2021-06-02 | METHOD, DEVICE AND SYSTEM FOR IMPLEMENTING A BACKGROUND DATA TRANSFER POLICY |
JP2022574542A JP7483949B2 (ja) | 2020-06-03 | 2021-06-02 | バックグラウンドデータ転送ポリシー策定方法、装置、及びシステム |
US18/060,202 US20230098362A1 (en) | 2020-06-03 | 2022-11-30 | Background Data Transfer Policy Formulation Method, Apparatus, and System |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010496925 | 2020-06-03 | ||
CN202010496925.5 | 2020-06-03 | ||
CN202011017967.2A CN113766574A (zh) | 2020-06-03 | 2020-09-24 | 制定背景数据传输策略的方法、装置及系统 |
CN202011017967.2 | 2020-09-24 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/060,202 Continuation US20230098362A1 (en) | 2020-06-03 | 2022-11-30 | Background Data Transfer Policy Formulation Method, Apparatus, and System |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021244585A1 true WO2021244585A1 (zh) | 2021-12-09 |
Family
ID=78785855
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/098005 WO2021244585A1 (zh) | 2020-06-03 | 2021-06-02 | 制定背景数据传输策略的方法、装置及系统 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20230098362A1 (zh) |
EP (1) | EP4152812A4 (zh) |
JP (1) | JP7483949B2 (zh) |
CN (1) | CN113766574A (zh) |
WO (1) | WO2021244585A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114630355A (zh) * | 2022-03-31 | 2022-06-14 | 深圳艾灵网络有限公司 | 基于核心网的故障恢复方法、装置、设备及存储介质 |
WO2023213139A1 (zh) * | 2022-05-06 | 2023-11-09 | 华为技术有限公司 | 通信方法和通信装置 |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2024120680A1 (en) * | 2023-09-14 | 2024-06-13 | Lenovo (Singapore) Pte. Ltd. | Applying energy criteria to background data in a wireless communication network |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019194954A1 (en) * | 2018-04-06 | 2019-10-10 | Convida Wireless, Llc | Methods of managing connections to a local area data network (ladn) in a 5g network |
CN110519795A (zh) * | 2018-05-21 | 2019-11-29 | 华为技术有限公司 | 一种确定背景流量传输策略的方法及装置 |
WO2020037653A1 (en) * | 2018-08-24 | 2020-02-27 | Telefonaktiebolaget Lm Ericsson (Publ) | Background data transfer handling |
CN111225013A (zh) * | 2018-11-27 | 2020-06-02 | 华为技术有限公司 | 一种传输策略确定方法、策略控制方法及装置 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11496573B2 (en) * | 2018-06-22 | 2022-11-08 | Huawei Technologies Co., Ltd. | Optimizing user equipment operation by conditioning multiple policies on information elements |
-
2020
- 2020-09-24 CN CN202011017967.2A patent/CN113766574A/zh active Pending
-
2021
- 2021-06-02 JP JP2022574542A patent/JP7483949B2/ja active Active
- 2021-06-02 WO PCT/CN2021/098005 patent/WO2021244585A1/zh unknown
- 2021-06-02 EP EP21817728.5A patent/EP4152812A4/en active Pending
-
2022
- 2022-11-30 US US18/060,202 patent/US20230098362A1/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019194954A1 (en) * | 2018-04-06 | 2019-10-10 | Convida Wireless, Llc | Methods of managing connections to a local area data network (ladn) in a 5g network |
CN110519795A (zh) * | 2018-05-21 | 2019-11-29 | 华为技术有限公司 | 一种确定背景流量传输策略的方法及装置 |
WO2020037653A1 (en) * | 2018-08-24 | 2020-02-27 | Telefonaktiebolaget Lm Ericsson (Publ) | Background data transfer handling |
CN111225013A (zh) * | 2018-11-27 | 2020-06-02 | 华为技术有限公司 | 一种传输策略确定方法、策略控制方法及装置 |
Non-Patent Citations (3)
Title |
---|
3GPP: "3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; 5G System; Background Data Transfer Policy Control Service; Stage 3(Release 16)", 3GPP TS 29.554 V16.3.0, 27 March 2020 (2020-03-27), pages 1 - 33, XP051861172 * |
HUAWEI ET AL.: "Correction of BDT Policy Re-negotiation Procedure", 3GPP TSG-WG SA2 MEETING #139E E-MEETING S2-2003870, 22 May 2020 (2020-05-22), XP051889878 * |
See also references of EP4152812A4 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114630355A (zh) * | 2022-03-31 | 2022-06-14 | 深圳艾灵网络有限公司 | 基于核心网的故障恢复方法、装置、设备及存储介质 |
CN114630355B (zh) * | 2022-03-31 | 2023-09-08 | 深圳艾灵网络有限公司 | 基于核心网的故障恢复方法、装置、设备及存储介质 |
WO2023213139A1 (zh) * | 2022-05-06 | 2023-11-09 | 华为技术有限公司 | 通信方法和通信装置 |
Also Published As
Publication number | Publication date |
---|---|
CN113766574A (zh) | 2021-12-07 |
US20230098362A1 (en) | 2023-03-30 |
EP4152812A1 (en) | 2023-03-22 |
EP4152812A4 (en) | 2023-10-18 |
JP2023529628A (ja) | 2023-07-11 |
JP7483949B2 (ja) | 2024-05-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021244585A1 (zh) | 制定背景数据传输策略的方法、装置及系统 | |
EP3843337A1 (en) | Slice information processing method and apparatus | |
EP3723413B1 (en) | Policy control method, apparatus, and system | |
EP3902324A1 (en) | Method, device, and system for implementing service continuity | |
WO2017080518A1 (en) | System and methods for network management and orchestration for network slicing | |
WO2020108002A1 (zh) | 一种传输策略确定方法、策略控制方法及装置 | |
WO2021197185A1 (zh) | 一种通信方法和通信装置 | |
KR102426639B1 (ko) | 요청 프로세싱 방법 및 대응하는 엔티티 | |
WO2021031672A1 (zh) | 通知服务质量信息的方法、设备及系统 | |
JP2009536005A (ja) | 通信環境における動的サービス品質事前認可 | |
WO2021139696A1 (zh) | 一种报告信息的发送方法、装置及系统 | |
EP4124094A1 (en) | Policy determination method and device, and system | |
WO2019242698A1 (zh) | 一种管理网元的方法、设备及系统 | |
WO2018214821A1 (zh) | 服务质量控制方法、设备及系统 | |
CN107113186B (zh) | 统一机器到机器系统中数据传输的方法和公共服务实体 | |
EP4358576A1 (en) | Service quality processing method and apparatus, and communication system | |
US10091645B1 (en) | Handling mobile device administration in anchorless mobile networks | |
WO2021233063A1 (zh) | 用于策略控制的方法和装置 | |
WO2021139378A1 (zh) | 通信方法和通信装置 | |
EP4040845B1 (en) | Communication method, apparatus and system | |
WO2023010979A1 (zh) | 一种通信方法及装置 | |
WO2023143255A1 (zh) | 一种通信方法及装置 | |
EP4210381A1 (en) | Communication method and apparatus | |
RU2772710C2 (ru) | Способ обработки запроса и соответствующий объект | |
WO2022032517A1 (zh) | 通信方法和装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21817728 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2022574542 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2021817728 Country of ref document: EP Effective date: 20221214 |