WO2022022322A1 - 访问本地网络的方法和装置 - Google Patents

访问本地网络的方法和装置 Download PDF

Info

Publication number
WO2022022322A1
WO2022022322A1 PCT/CN2021/107254 CN2021107254W WO2022022322A1 WO 2022022322 A1 WO2022022322 A1 WO 2022022322A1 CN 2021107254 W CN2021107254 W CN 2021107254W WO 2022022322 A1 WO2022022322 A1 WO 2022022322A1
Authority
WO
WIPO (PCT)
Prior art keywords
session
service
identifier
network access
target
Prior art date
Application number
PCT/CN2021/107254
Other languages
English (en)
French (fr)
Inventor
李永翠
倪慧
吴义壮
朱方园
李岩
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN202110507770.5A external-priority patent/CN114071649B/zh
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP21850412.4A priority Critical patent/EP4185010A4/en
Publication of WO2022022322A1 publication Critical patent/WO2022022322A1/zh
Priority to US18/161,885 priority patent/US20230269794A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/12Setup of transport tunnels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]

Definitions

  • the present application relates to the field of communications, and more particularly to a method and apparatus for accessing a local network.
  • MEC mobile edge computing
  • the local (local) DN in the MEC architecture can provide services to users in the edge area closer to the terminal.
  • a low-latency service experience is provided by deploying services, service processing, and resource scheduling functions to the edge network close to the terminal.
  • the present application provides a method and device for accessing a local network, which can access the local DN, thereby meeting the requirements of low-latency services and improving service processing performance.
  • a first aspect provides a method for accessing a local network, the method comprising: acquiring a first network access identifier, where the first network access identifier is used to indicate the first local network; sending a session to a session management function network element an establishment request, where the session establishment request is used for requesting establishment of a first session, where the first session is used by a terminal to access the first local network, and the session establishment request includes the first network access identifier.
  • the terminal After obtaining the first network access identifier indicating the first local network, the terminal can actively send a session establishment request to the session management function network element to request to establish a first session, and the first session is used for the terminal to access the first local network.
  • the session establishment request includes the first network access identifier. That is to say, the terminal can realize access to the local network, so as to meet the requirements of low-latency services and improve the performance of service processing.
  • the method further includes: acquiring at least one service and at least one network access identifier corresponding to the at least one service; wherein the at least one service includes a first service, and the The obtaining the first network access identifier includes: determining, according to the first service, the first network access identifier corresponding to the first service, where the at least one network access identifier includes the first network access identifier. Enter the ID.
  • the terminal After the terminal acquires at least one service and at least one network access identifier corresponding to the at least one service, it can determine the network access identifier corresponding to any service, so that the terminal can implement access to different services
  • the local network can meet the needs of low-latency services and improve the performance of service processing.
  • the acquiring at least one service and at least one network access identifier corresponding to the at least one service includes: receiving a registration accept message from an access and mobility management function, the registration The acceptance message includes the at least one service and at least one network access identifier corresponding to the at least one service; or receives a configuration update command message from the access and mobility management function, the configuration update command message includes all at least one service and at least one network access identifier corresponding to the at least one service.
  • the terminal can acquire the at least one service and at least one network access identifier corresponding to the at least one service through different messages, thereby improving the flexibility of acquiring the network access identifier.
  • the method further includes: acquiring at least one network access identifier corresponding to at least one location of the terminal and at least one location; wherein the at least one location of the terminal includes a first location, and the The acquiring the first network access identifier includes: determining the first network access identifier corresponding to the first location according to the first location, where the at least one network access identifier includes the first network access identifier. Enter the ID.
  • the terminal may correspond to different network access identifiers at different locations. In this way, after the terminal acquires at least one network access identifier corresponding to at least one location and at least one location, the terminal can obtain the network access identifier corresponding to any location, so that the terminal can realize that terminals in different locations access the local network , so as to meet the requirements of low-latency services and improve the performance of service processing.
  • the method further includes: determining the first network access identifier corresponding to the first location and the first service according to the first location and the first service.
  • the terminal can determine the network access identifier corresponding to the first location and the first service in combination with the location of the terminal (that is, the first location) and the first service initiated by the terminal, so that the terminal can be located in different locations and initiate different services.
  • the terminal connected to the local network can further improve the performance of service processing while meeting the requirements of low-latency services.
  • the determining, according to the first location and the first service, the first network access identifier corresponding to the first location and the first service includes: according to at least one service and at least one network access identifier corresponding to the at least one service, at least one network access identifier corresponding to at least one location and at least one location, the first location and the first service, determine the first A network access identifier.
  • the terminal can determine the network access identifier corresponding to the first service according to the first service, and then determine the network access identifier corresponding to the first location according to the first location. After that, the terminal can use the same network access identifier in the network access identifier corresponding to the first service and the network access identifier corresponding to the first location as the first network access identifier, so that the terminal can be implemented as a network access identifier in different locations.
  • the terminal and different services are connected to the local network, so as to meet the requirements of low-latency services and improve the performance of service processing.
  • the method further includes: receiving at least one network access identifier corresponding to the first location of the terminal from the session management function network element; wherein the acquiring the first network access The identifying includes: determining the first network access identity from the at least one network access identity.
  • the terminal may first acquire at least one network access identifier corresponding to the first location of the terminal, and then further select the first network access identifier from the at least one network access identifier. In this way, the first network access identifier is selected from a smaller range, thereby further selecting an appropriate network access identifier, and further improving the performance of service processing.
  • the determining the first network access identifier from the at least one network access identifier includes: according to a first service, selecting from the at least one network access identifier and the The first network access identifier corresponding to the first service.
  • the first network access identifier is selected from a smaller range, thereby further selecting an appropriate network access identifier for different services, and further improving the performance of service processing.
  • the method further includes: acquiring at least one service and at least one network access identifier corresponding to the at least one service, where the at least one service includes a second service; according to the For the second service, the network access identifier corresponding to the second service is determined; and the second service is sent according to the relationship between the network access identifier corresponding to the second service and the first network access identifier.
  • the terminal can determine the session used to send the second service according to whether the network access identifier corresponding to the second service is the same as the first network access identifier, which helps the terminal to select an appropriate session, thereby improving service processing efficiency.
  • the sending the target service according to the relationship between the network access identifier corresponding to the second service and the first network access identifier includes: if the network corresponding to the second service If the access identifier and the first network access identifier are the same, the second service is sent through the first session; if the network access identifier corresponding to the second service is different from the first network access identifier , the second service is sent through the second session, and the second session is used for the terminal to access the central network; or if the network access identifier corresponding to the second service is different from the first network access identifier, then The second service is sent through a third session, where the third session is used by the terminal to access the local network corresponding to the second service.
  • the terminal may determine that the first session is used for sending the second service when the network access identifier corresponding to the second service is the same as the first network access identifier, thereby saving the signaling overhead of reestablishing the session.
  • a method for accessing a local network comprising: receiving a trigger message, where the trigger message is used to trigger a terminal to establish a session; sending a first message according to the trigger message, the first message using upon requesting to establish a first session, where the first session is used by the terminal to access the local network.
  • the network element of the session management function can actively trigger the terminal to initiate the establishment of a session for accessing the local network, so as to realize the access to the local network, thereby meeting the requirements of low-latency services and improving the performance of service processing.
  • the first message further includes a session identifier of a second session, where the second session is used for the terminal to access the central network.
  • the method further includes: selecting a target session for the target service from the first session and the second session according to the first routing condition and the second routing condition, the first routing condition corresponding to the the first session, the second routing condition corresponds to the second session; and the target service is sent through the target session.
  • the first routing condition is a condition for the terminal to select the first session
  • the second routing condition is a condition for the terminal to select the second session.
  • the method further includes: sending first information, where the first information includes a service identifier of the target service; receiving second information, where the second information includes a target session corresponding to the service identifier of the target service Session ID; send the target service through the target session.
  • a method for accessing a local network comprising: sending a trigger message to a terminal, where the trigger message is used to trigger the terminal to establish a session; receiving a first session establishment request from the terminal, the The first session establishment request is used to request the establishment of a first session, and the first session is used for the terminal to access the local network; according to the first session establishment request, a target network access identifier is determined, and the target network access identifier is used to indicate the target local network; according to the target network access identifier, determine the target UPF.
  • the network element of the session management function can actively trigger the terminal to initiate the establishment of a session for accessing the local network, so as to realize the access to the local network, thereby meeting the requirements of low-latency services and improving the performance of service processing.
  • the first session request includes a session identifier of a second session
  • the second session is used for the terminal access center network
  • the target network access identifier includes: determining the target network access identifier according to the session identifier of the second session and a mapping relationship, where the mapping relationship is the session identifier of at least one session and the network access identifier of at least one local network mapping relationship.
  • the network element of the session management function can obtain the target network access identifier corresponding to the session identifier of the second session according to the preset mapping relationship, so that the terminal can access the local network through the target network access identifier, thereby meeting the requirements of low-latency services and improving performance of business processing.
  • the method further includes: receiving first information, where the first information includes a service identifier of a target service; determining a session identifier of a target session corresponding to the service identifier of the target service; sending second information, the The second information includes the session identifier of the target session.
  • a method for accessing a local network comprising: sending a trigger message to a terminal, where the trigger message is used to trigger the terminal to establish a session; receiving the first message from the terminal, the The first message is used to request the establishment of a first session, and the first session is used for the terminal to access the target local network; according to the first message, the target network access identifier is determined, and the target network access identifier is used to indicate the target network.
  • a local network determining a first SMF according to the target network access identifier; sending the target network access identifier to the first SMF, where the target network access identifier is used by the first SMF to determine a target UPF.
  • the session management function network element can actively trigger the terminal to initiate a session establishment for accessing the local network, receive the first message from the terminal, and then determine the target network access according to the first message. ID, and then determine the first SMF according to the target network access ID, so as to realize the establishment of the first session.
  • the terminal can access the local network through the established first session, thereby meeting the requirements of low-latency services and improving the performance of service processing.
  • the first message includes a session identifier of a second session
  • the second session is used for the terminal to access the central network
  • the method further includes: acquiring the session identifier of at least one session and the the network access identifier of at least one local network corresponding to the session identifier of the at least one session; wherein, determining the target network access identifier according to the first message includes: determining, according to the session identifier of the second session, the target network access identifier corresponding to the session identifier of the second session.
  • the network element of the session management function can obtain the target network access identifier corresponding to the session identifier of the second session according to the preset mapping relationship, so that the terminal can access the local network through the target network access identifier, thereby meeting the requirements of low-latency services and improving performance of business processing.
  • the method further includes: receiving the mapping relationship from a second SMF, where the second SMF is used by the terminal to establish the second session.
  • the method further includes: receiving a first request, where the first request includes a target network access identifier; determining a session identifier of a target session corresponding to the target network access identifier; sending to the first network element a first response, where the first response includes the session identifier of the target session, or sends second information to the second network element, where the second information includes the session identifier of the target session.
  • the first network element includes an SMF
  • the second network element includes a terminal
  • the method before determining the session identifier of the target session corresponding to the target network access identifier, the method further includes: acquiring a correspondence between the target network access identifier and the session identifier of the target session.
  • a fifth aspect provides a method for accessing a local network, the method comprising: receiving first information, where the first information includes a service identifier of the target service; determining a target network access identifier corresponding to the service identifier of the target service; Send third information, where the third information includes the target network access identifier.
  • a sixth aspect provides a method for accessing a local network, the method comprising: receiving first information, where the first information includes a service identifier of the target service; determining a session identifier of a target session corresponding to the service identifier of the target service; Send second information, where the second information includes a session identifier of the target session.
  • the method further includes: acquiring a first correspondence, where the first correspondence includes a correspondence between a target network access identifier corresponding to the target service and a session identifier of the target session; and determining the The session identifier of the target session corresponding to the service identifier of the target service includes: according to the first correspondence relationship, the session identifier of the target session corresponding to the service identifier of the target service.
  • determining the session identifier of the target session corresponding to the service identifier of the target service includes: determining the target network access identifier corresponding to the service identifier of the target service; sending a first request, where the first request is used for Request the session ID of the target session corresponding to the target network access ID; and receive a first response, where the first response includes the session ID of the target session.
  • a method for discovering an edge application server EAS includes: receiving a discovery request from a first device, the discovery request is used to request discovery of the EAS, and the discovery request includes a preset condition, so The first device is a session management function network element or terminal; according to the discovery request, determine at least one EAS that satisfies the preset condition; send a discovery response message to the first device, where the discovery response message includes the The Internet Protocol IP address of at least one EAS.
  • the AF receives a discovery request including a preset condition, and determines at least one EAS that meets the preset condition according to the discovery request, and then feeds back a discovery response message including the IP address of the at least one EAS to the AF, so as to avoid discovering unsatisfactory requirements. EAS, thereby increasing the effectiveness of EAS discovery.
  • the discovery request further includes at least one of an application identifier, a list of network access identifiers of the local network, and an EAS requirement.
  • the response message further includes a service area, where the service area is used by the terminal to determine whether to re-initiate the discovery request.
  • the terminal can determine whether to re-initiate the EAS request after the movement occurs, thereby improving the service quality of serving the EAS.
  • a method for discovering an edge application server EAS comprising: sending a discovery request, where the discovery request is used for requesting discovery of the edge application server EAS, and the discovery request includes a preset condition; receiving a discovery response message, the discovery response message includes the Internet Protocol IP address of at least one EAS that satisfies the preset condition.
  • the first device sends a discovery request including a preset condition to the AF, so that the AF determines at least one EAS that satisfies the preset condition according to the discovery request, and then feeds back a discovery response message including the IP address of the at least one EAS to the AF, thus avoiding EASs that do not meet requirements are found, thereby increasing the effectiveness of finding EASs.
  • the discovery request further includes at least one of an application identifier, a list of network access identifiers of the local network, and an EAS requirement.
  • the method further includes: receiving parameter information from the AMF, where the parameter information is used to indicate the first location of the terminal and the application identifier requested by the terminal; according to the parameter information and Network topology, and determine a list of network access identifiers of the local network that the terminal can connect to at the first location.
  • the method further includes: determining a target DNAI according to the IP address of the at least one EAS; determining a distribution node according to the target DNAI, where the distribution node is used to distribute the access center network and access local network data.
  • the response message further includes a service area, where the service area is used by the terminal to determine whether to re-initiate the discovery request.
  • the terminal can determine whether to re-initiate the EAS request after the movement occurs, thereby improving the service quality of serving the EAS.
  • a device for accessing a local network may be a terminal or a chip in the terminal.
  • the device has the function of implementing the above-mentioned first aspect and various possible implementation manners. This function can be implemented by hardware or by executing corresponding software by hardware.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the apparatus includes: a transceiver module and a processing module, the transceiver module may be, for example, at least one of a transceiver, a receiver, and a transmitter, and the transceiver module may include a receiving module and a sending module.
  • Transceiver modules may include radio frequency circuits or antennas.
  • the processing module may be a processor.
  • the apparatus further includes a storage module, which may be, for example, a memory. When included, the memory module is used to store the instructions.
  • the processing module is connected to the storage module, and the processing module can execute the instructions stored in the storage module or other instructions, so that the apparatus executes the above-mentioned first aspect and the communication method of various possible implementations.
  • the device may be a terminal.
  • the chip when the device is a chip, the chip includes: a transceiver module and a processing module, and the transceiver module may include a receiving module and a sending module.
  • the transceiver module may be, for example, an input/output interface, a pin or a circuit on the chip.
  • the processing module may be, for example, a processor.
  • the processing module can execute instructions to cause the chip in the terminal to execute the above-mentioned first aspect and any possible implementation of the communication method.
  • the processing module may execute instructions in a storage module, and the storage module may be an in-chip storage module, such as a register, a cache, and the like.
  • the memory module can also be located in the communication device, but located outside the chip, such as read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (random access memory) memory, RAM), etc.
  • the processor mentioned in any one of the above may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more of the above An integrated circuit for program execution of various aspects of the communication method.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • a device for accessing a local network may be an SMF or a chip in the SMF.
  • the device has the function of implementing the above-mentioned second aspect and various possible implementation manners. This function can be implemented by hardware or by executing corresponding software by hardware.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the apparatus includes: a transceiver module and a processing module, and the transceiver module may include a receiving module and a sending module.
  • the transceiver module may be at least one of a transceiver, a receiver, and a transmitter, and the transceiver module may include a radio frequency circuit or an antenna.
  • the processing module may be a processor.
  • the apparatus further includes a storage module, which may be, for example, a memory.
  • a storage module which may be, for example, a memory.
  • the memory module is used to store the instructions.
  • the processing module is connected to the storage module, and the processing module can execute instructions stored in the storage module or instructions derived from other instructions, so that the apparatus executes the method of the second aspect or any one thereof.
  • the chip when the device is a chip, the chip includes: a transceiver module and a processing module, and the transceiver module may include a receiving module and a sending module.
  • the transceiver module may be, for example, an input/output interface, a pin or a circuit on the chip.
  • the processing module may be, for example, a processor. The processing module can execute instructions to cause the chip in the SMF to perform the above-mentioned second aspect, and any possible communication method of implementation.
  • the processing module may execute instructions in a storage module
  • the storage module may be an in-chip storage module, such as a register, a cache, and the like.
  • the memory module can also be located in the communication device, but located outside the chip, such as read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (random access memory) memory, RAM), etc.
  • the processor mentioned in any one of the above may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more of the above An integrated circuit for program execution of various aspects of the communication method.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • a device for accessing a local network is provided, and the device may be an SMF or a chip in the SMF.
  • the apparatus has the function of implementing the above-mentioned second aspect, the third aspect or the fourth aspect, and various possible implementation manners. This function can be implemented by hardware or by executing corresponding software by hardware.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the apparatus includes: a transceiver module and a processing module, and the transceiver module may include a receiving module and a sending module.
  • the transceiver module may be at least one of a transceiver, a receiver, and a transmitter, and the transceiver module may include a radio frequency circuit or an antenna.
  • the processing module may be a processor.
  • the apparatus further includes a storage module, which may be, for example, a memory.
  • a storage module which may be, for example, a memory.
  • the memory module is used to store the instructions.
  • the processing module is connected to the storage module, and the processing module can execute instructions stored in the storage module or instructions derived from other instructions, so that the apparatus executes the second aspect, the third aspect or the fourth aspect, or any one of them Methods.
  • the chip when the device is a chip, the chip includes: a transceiver module and a processing module, and the transceiver module may include a receiving module and a sending module.
  • the transceiver module may be, for example, an input/output interface, a pin or a circuit on the chip.
  • the processing module may be, for example, a processor. The processing module can execute instructions to cause the chip in the SMF to perform the second aspect, the third aspect or the fourth aspect, and any possible communication method implemented.
  • the processing module may execute instructions in a storage module
  • the storage module may be an in-chip storage module, such as a register, a cache, and the like.
  • the storage module may also be located in the communication device, but outside the chip, such as read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (random access memory) memory, RAM), etc.
  • ROM read-only memory
  • RAM random access memory
  • the processor mentioned in any one of the above may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more of the above An integrated circuit for performing the program of the method of the second aspect, the third aspect or the fourth aspect.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • a twelfth aspect provides a device for accessing a local network, where the device may be an AF or a chip in the AF.
  • the device has the function of realizing the above-mentioned fifth aspect and various possible implementation manners. This function can be implemented by hardware or by executing corresponding software by hardware.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the apparatus includes: a transceiver module and a processing module, and the transceiver module may include a receiving module and a sending module.
  • the transceiver module may be at least one of a transceiver, a receiver, and a transmitter, and the transceiver module may include a radio frequency circuit or an antenna.
  • the processing module may be a processor.
  • the apparatus further includes a storage module, which may be, for example, a memory.
  • a storage module which may be, for example, a memory.
  • the memory module is used to store the instructions.
  • the processing module is connected to the storage module, and the processing module can execute instructions stored in the storage module or other instructions, so that the apparatus executes the method of the fifth aspect or any one of the above.
  • the chip when the device is a chip, the chip includes: a transceiver module and a processing module, and the transceiver module may include a receiving module and a sending module.
  • the transceiver module may be, for example, an input/output interface, a pin or a circuit on the chip.
  • the processing module may be, for example, a processor. The processing module can execute instructions to cause the chip in the AF to execute the above-mentioned fifth aspect and any possible implementation of the communication method.
  • the processing module may execute instructions in a storage module
  • the storage module may be an in-chip storage module, such as a register, a cache, and the like.
  • the memory module can also be located in the communication device, but located outside the chip, such as read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (random access memory) memory, RAM), etc.
  • the processor mentioned in any one of the above may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more of the above An integrated circuit in which the program of the method of the fifth aspect executes.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • a thirteenth aspect provides a device for accessing a local network, where the device may be a terminal or an SMF, or a chip in the terminal or the SMF.
  • the device has the function of implementing the above sixth aspect and various possible implementation manners. This function can be implemented by hardware or by executing corresponding software by hardware.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the apparatus includes: a transceiver module and a processing module, and the transceiver module may include a receiving module and a sending module.
  • the transceiver module may be at least one of a transceiver, a receiver, and a transmitter, and the transceiver module may include a radio frequency circuit or an antenna.
  • the processing module may be a processor.
  • the apparatus further includes a storage module, which may be, for example, a memory.
  • a storage module which may be, for example, a memory.
  • the memory module is used to store the instructions.
  • the processing module is connected to the storage module, and the processing module can execute instructions stored in the storage module or other instructions, so that the apparatus executes the method of the sixth aspect or any one thereof.
  • the chip when the device is a chip, the chip includes: a transceiver module and a processing module, and the transceiver module may include a receiving module and a sending module.
  • the transceiver module can be, for example, an input/output interface, a pin or a circuit on the chip.
  • the processing module may be, for example, a processor. The processing module can execute instructions to cause the terminal or the chip in the SMF to execute the above-mentioned sixth aspect and any possible communication method.
  • the processing module may execute instructions in a storage module
  • the storage module may be an in-chip storage module, such as a register, a cache, and the like.
  • the memory module can also be located in the communication device, but located outside the chip, such as read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (random access memory) memory, RAM), etc.
  • the processor mentioned in any one of the above may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more of the above An integrated circuit in which the program of the method of the sixth aspect executes.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • a fourteenth aspect provides a computer storage medium, where program codes are stored in the computer storage medium, and the program codes are used to instruct to execute any one of the above-mentioned first to sixth aspects, and any possible implementations thereof method in the directive.
  • a fifteenth aspect provides a computer program product comprising instructions, which, when run on a computer, cause the computer to execute the method in any one of the first to sixth aspects, or any possible implementations thereof.
  • a communication system comprising a device and a session management function network element having functions for implementing the methods and various possible designs of the above-mentioned first aspect.
  • a seventeenth aspect provides a communication system, the communication system includes a device having functions for implementing the methods and various possible designs of the above-mentioned second aspect, and the above-mentioned methods and various possible designs for implementing the above-mentioned fourth aspect. functional device.
  • a communication system in an eighteenth aspect, includes a terminal and the above-mentioned apparatus having the functions of implementing the methods and various possible designs of the above-mentioned third aspect.
  • a nineteenth aspect provides a communication system, the communication system includes a device having functions for implementing the methods and various possible designs of the above-mentioned fifth aspect, and the above-mentioned methods and various possible designs for implementing the above-mentioned sixth aspect. functional device.
  • the terminal after the terminal obtains the first network access identifier used to indicate the first local network, it can actively send a session establishment request to the session management function network element to request the establishment of the first session, and the first session is used for the terminal
  • the first local network is accessed, and the session establishment request includes the first network access identifier. That is to say, the embodiments of the present application can access the local network, so that the requirements of low-latency services can be met, and the performance of service processing can be improved.
  • FIG. 1 is a schematic diagram of a possible network architecture according to an embodiment of the present application
  • FIG. 2 is a schematic diagram of another possible application architecture of an embodiment of the present application.
  • Figure 3 is a schematic diagram of the comparison between the 5G application architecture and the MEC architecture
  • FIG. 4 is a schematic diagram of a service processing model according to an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of a method for accessing a local network according to an embodiment of the present application
  • FIG. 6 is a schematic flowchart of a method for accessing a local network according to another embodiment of the present application.
  • FIG. 7 is a schematic flowchart of a method for accessing a local network according to still another embodiment of the present application.
  • FIG. 8 is a schematic flowchart of a method for accessing a local network according to another embodiment of the present application.
  • FIG. 9 is a schematic flowchart of a method for accessing a local network according to another embodiment of the present application.
  • FIG. 10 is a schematic flowchart of a method for accessing a local network according to another embodiment of the present application.
  • FIG. 11 is a schematic flowchart of a method for accessing a local network according to another embodiment of the present application.
  • FIG. 12 is a schematic flowchart of a method for discovering an edge application server EAS according to an embodiment of the present application
  • FIG. 13 is a schematic flowchart of a method for discovering an edge application server EAS according to another embodiment of the present application.
  • FIG. 14 is a schematic block diagram of an apparatus for accessing a local network according to an embodiment of the present application.
  • 15 is a schematic structural diagram of an apparatus for accessing a local network according to an embodiment of the present application.
  • 16 is a schematic block diagram of an apparatus for accessing a local network according to another embodiment of the present application.
  • FIG. 17 is a schematic structural diagram of an apparatus for accessing a local network according to another embodiment of the present application.
  • FIG. 18 is a schematic block diagram of an apparatus for accessing a local network according to another embodiment of the present application.
  • FIG. 19 is a schematic structural diagram of an apparatus for accessing a local network according to another embodiment of the present application.
  • 20 is a schematic block diagram of an apparatus for accessing a local network according to another embodiment of the present application.
  • FIG. 21 is a schematic structural diagram of an apparatus for accessing a local network according to another embodiment of the present application.
  • the terminal in the embodiments of the present application may refer to a device with a wireless transceiver function, which may be referred to as a terminal (terminal), user equipment (UE), a mobile station (mobile station, MS), or a mobile terminal (mobile terminal). , MT), vehicle terminal, remote station, remote terminal, etc.
  • the specific form of the terminal can be a mobile phone, a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wearable device tablet computer (pad), a desktop computer, a notebook computer, an all-in-one computer, and a vehicle terminal.
  • wireless local loop (wireless local loop, WLL) station personal digital assistant (personal digital assistant, PDA) and so on.
  • the terminal can be applied to the following scenarios: virtual reality (VR), augmented reality (AR), industrial control (industrial control), unmanned driving (self driving), remote medical surgery (remote medical surgery), smart grid (smart grid), transportation safety (transportation safety), smart city (smart city), smart home (smart home), etc.
  • Terminals can be fixed or mobile. It should be noted that the terminal may support at least one wireless communication technology, such as LTE, NR, wideband code division multiple access (WCDMA), and the like.
  • the terminal includes a hardware layer, an operating system layer running on the hardware layer, and an application layer running on the operating system layer.
  • This hardware layer includes hardware such as central processing unit (CPU), memory management unit (MMU), and memory (also called main memory).
  • the operating system may be any one or more computer operating systems that implement business processing through processes, such as a Linux operating system, a Unix operating system, an Android operating system, an iOS operating system, or a Windows operating system.
  • the application layer includes applications such as browsers, address books, word processing software, and instant messaging software.
  • the embodiments of the present application do not specifically limit the specific structure of the execution body of the methods provided by the embodiments of the present application, as long as the program that records the codes of the methods provided by the embodiments of the present application can be executed to provide the methods provided by the embodiments of the present application.
  • the execution subject of the method provided by the embodiment of the present application may be a terminal or an access network device, or a functional module in the terminal or access network device that can call and execute a program.
  • computer readable media may include, but are not limited to, magnetic storage devices (eg, hard disks, floppy disks, or magnetic tapes, etc.), optical disks (eg, compact discs (CDs), digital versatile discs (DVDs) etc.), smart cards and flash memory devices (eg, erasable programmable read-only memory (EPROM), card, stick or key drives, etc.).
  • various storage media described herein can represent one or more devices and/or other machine-readable media for storing information.
  • the term "machine-readable medium” may include, but is not limited to, wireless channels and various other media capable of storing, containing, and/or carrying instructions and/or data.
  • the access network equipment and terminals can be deployed on land, including indoor or outdoor, handheld or vehicle-mounted; they can also be deployed on water; they can also be deployed on aircraft, balloons and satellites in the air.
  • the embodiments of the present application do not limit the application scenarios of wireless access network devices and terminals.
  • FIG. 1 is a schematic diagram of a possible network architecture according to an embodiment of the present application.
  • the network architecture includes: a terminal 101, a (wireless) access network (radio access network, (R)AN) 102, a user plane function (UPF) network element 103, a DN network element 104, authentication server function (authentication server function, AUSF) network element 105, AMF network element 106, session management function (session management function, SMF) network element 107, network exposure function (network exposure function, NEF) network element 108, Network function library function (network repository function, NRF) network element 109, policy control function module (policy control function, PCF) network element 110, unified data management (unified data management, UDM) network element 111, network data analysis function entity ( network data analytics function, NWDAF) network element 112 and application function entity (application function, AF) network element 113.
  • R radio access network
  • UPF user plane function
  • the UPF network element 103, the DN network element 104, the AUSF network element 105, the AMF network element 106, the SMF network element 107, the NEF network element 108, the NRF network element 109, and the policy control function (PCF) network element are described below. 110.
  • the UDM network element 111 and the NSSF network element 112 are referred to as UPF103, DN104, AUSF105, AMF106, SMF107, NEF108, NRF109, PCF110, UDM111, NWDAF112, and AF113 for short.
  • the terminal 101 mainly accesses the 5G network through the wireless air interface and obtains services.
  • the terminal interacts with the RAN through the air interface, and interacts with the AMF of the core network through non-access stratum signaling (NAS).
  • NAS non-access stratum signaling
  • the RAN 102 is responsible for air interface resource scheduling and air interface connection management for the terminal to access the network.
  • the UPF 103 is responsible for the forwarding and reception of user data in the terminal.
  • the UPF can receive user data from the data network and transmit it to the terminal through the access network device, and can also receive user data from the terminal through the access network device and forward it to the data network.
  • the transmission resources and scheduling functions that serve the terminal in the UPF 103 are managed and controlled by the SMF network element.
  • DN104 can be the Internet or an enterprise private network.
  • carrier services for example, carrier services, Internet access or third-party services.
  • AUSF105 belongs to the core network control plane network element, and is mainly responsible for user authentication and authorization to ensure that the user is a legitimate user.
  • AMF106 belongs to the core network element, and is mainly responsible for the signaling processing part, such as: access control, mobility management, attach and detach, and gateway selection and other functions, and AMF106 can also provide services for sessions in the terminal.
  • a storage resource of the control plane is provided for the session to store the session ID, the SMF network element ID associated with the session ID, and the like.
  • the SMF107 is responsible for user plane network element selection, user plane network element redirection, Internet Protocol (IP) address allocation, bearer establishment, modification and release, and quality of service (QoS) control.
  • IP Internet Protocol
  • QoS quality of service
  • the NEF 108 belongs to the core network control plane network element and is used to open the mobile network capabilities to the outside world.
  • the NRF109 belongs to the core network control plane network element, and is used for dynamic registration of service capabilities of network functions and network function discovery.
  • PCF 110 mainly supports providing a unified policy framework to control network behavior, provides policy rules to control layer network functions, and is responsible for acquiring user subscription information related to policy decisions.
  • UDM111 belongs to the core network control plane network element and belongs to the user server. It can be used for unified data management and supports functions such as 3GPP authentication, user identity operation, authority granting, registration and mobility management.
  • NWDAF112 is used for network data analysis functional entities, providing network data collection and analysis functions based on technologies such as big data and artificial intelligence.
  • the AF 113 is used to interact with the 3GPP core network to provide services, to affect service flow routing, access network capability opening, and policy control.
  • Nausf is the service-based interface presented by AUSF105
  • Namf is the service-based interface presented by AMF106
  • Nsmf is the service-based interface presented by SMF107
  • Nnef is the service-based interface presented by NEF108.
  • Nnrf is the service-based interface presented by NRF109
  • Npcf is the service-based interface presented by PCF110
  • Nudm is the service-based interface presented by UDM111
  • Nnwdaf is the service-based interface presented by NWDAF112
  • Naf is the service-based interface presented by AF113 .
  • N1 is the reference point between UE101 and AMF106
  • N2 is the reference point of (R) AN102 and AMF106, which is used for sending non-access stratum (NAS) messages, etc.
  • N3 is (R) AN102 and UPF103 The reference point between them is used to transmit user plane data, etc.
  • N4 is the reference point between SMF107 and UPF103, which is used to transmit, for example, the tunnel identification information of N3 connection, data buffer indication information, and downlink data notification messages and other information
  • the N6 interface is the reference point between UPF103 and DN104, and is used to transmit data on the user plane.
  • FIG. 2 shows a schematic diagram of another possible application architecture (mobile edge computing (mobile edge computing, MEC) architecture) according to an embodiment of the present application.
  • the application architecture includes a terminal 210 , an edge data network (EDN) 220 and an edge configuration server (ECS) 230 .
  • the EDN 220 includes an edge application 221 and an edge enabler server (edge enabler server, EES) 222 .
  • the terminal includes an application client (application client) 211 and an edge enabler client (edge enabler client, EEC) 212 .
  • EDN corresponds to a data network, which is a special local data network (local DN), including edge-enabled functions, and can use the data network access identifier (DN access identifier, DNAI) and data network name ( data network name, DNN) identification, is a network logic concept.
  • EDN is the equivalent concept of the central cloud, which can be understood as a local data center (ie, the concept of geographic location), which can be identified by DNAI and can contain multiple local data networks (local DN).
  • Edge applications are applications deployed in edge data networks.
  • the edge application may also be referred to as an "application instance”. Specifically, it refers to an instance (instance) of a server application (eg, social media software, augmented reality (AR), virtual reality (VR)) deployed and running on the EDN.
  • An application can deploy one or more EASs in one or more EDNs. EASs deployed and running in different EDNs can be considered as different EASs of an application.
  • Applications use different domain names, which can be fully qualified domain names (FQDNs).
  • EAS can also be referred to as an edge application (server), an application instance, an edge application instance, a mobile edge computing (mobile edge computing, MEC) application (server), an EAS function, and the like.
  • the application client is the peer entity of the edge application on the UE side.
  • the application client is used for the application user (user) to obtain the application service from the application server.
  • the application client is a client program applied on the terminal side.
  • the application client can connect to the application server on the cloud to obtain application services, and can also connect to the EAS deployed and running in one or more EDNs to obtain application services.
  • EES is deployed in the EDN, and can provide some enabling capabilities for the application instances deployed in the EDN, which can better support the deployment of applications in the MEC, and can also support the registration of edge applications, and the authentication and authentication of UEs.
  • Providing the UE with IP address information of the application instance, etc. may further support obtaining the identification and IP address information of the application instance, and further send the identification and IP address information of the application instance to the edge data network configuration server.
  • an EAS is registered on an EES, or the information of an EAS is configured on an EES through a management system, the EES is called the EES associated with the EAS, and the EES controls/manages the EAS registered/configured on the EES. .
  • the identifier of the above application instance may include the FQDN.
  • EEC is the peer entity of EES on the UE side.
  • EEC is used to register EEC information and application client information with EES, perform security authentication and authentication, obtain EAS IP address from EES, and provide edge computing enabling capabilities to application clients. returned to the application client.
  • the EEC may be a sub-function module implemented in an application client (application client, AC), or a module integrated in an operating system, or an independent application.
  • the ECS is responsible for the configuration of the EDN, such as providing EES information to the UE.
  • the ECS can also directly provide the UE with application instance information, and interact with the application domain name server (domain name server, DNS) to obtain the application instance information.
  • the application instance and IP address information can be further obtained and saved from other functional entities.
  • Figure 3 shows a schematic diagram of the comparison between the 5G application architecture and the MEC architecture.
  • the local DN in the MEC architecture can provide services to users in the edge area closer to the terminal.
  • a low-latency service experience is provided by deploying services, service processing, and resource scheduling functions to the edge network close to the terminal.
  • the MEC is deployed at the sinking UPF (ie, the local UPF), and the DN network is deployed at the remote UPF.
  • the path for the UE to access the MEC platform is greatly shortened. That is to say, MEC technology can provide users with low-latency services.
  • FIG. 4 shows a schematic diagram of a service processing model of an embodiment of the present application.
  • Business processing can be carried out through the three connection models shown in Figure 4.
  • the services are deployed in the edge area in a distributed manner, and the services are accessed through the anchor point (PDU session anchor, PSA) located in the edge area.
  • the anchor point PDU session anchor, PSA
  • the path optimization can be achieved by changing the anchor point. For example, the UE establishes a session whose SSC mode is SSC mode 2 or SSC mode 3, and when the path is not optimal, the path is optimized by creating a new session to replace the anchor point.
  • branch point may specifically be an uplink classifier (ULCL) or a branching point (branching point, BP).
  • ULCL uplink classifier
  • BP branching point
  • Multi-session. Services are deployed both in the edge area and in the central area.
  • the access to the edge service is realized by means of multiple sessions, that is, establishing a session for accessing the edge service.
  • terminals can access data networks by creating protocol data units (PDU) sessions.
  • PDU protocol data units
  • a terminal can create multiple PDU sessions to access different data networks.
  • the session type may include IPv4, IPv6, IPv4IPv6, Ethernet (ethernet), or unstructured (unstructured) types.
  • the session continuity mode may include session and service continuity (session and service continuity, SSC) mode (mode) 1, SSC mode2, or SSC mode3, and the like.
  • SSC mode1 may be the continuity of the service provided to the terminal by the network
  • SSC mode2 may be the service connection and the corresponding PDU session released by the network to the terminal
  • SSC mode3 may be before the original connection is terminated. Establish a new PDU session connection.
  • UE route selection policy (URSP):
  • the URSP may include the correspondence between application identifiers (app IDs) and application requirements.
  • the application may be an Internet of Vehicles application or an Internet of Things application, which is not limited.
  • the application identifier may also be represented by an IP quintuple, an IP triple, or the like.
  • the application requirements in the corresponding relationship may be subscription application requirements of the terminal device.
  • Application requirements can be DNN, S-NSSAI, SSC mode, etc.
  • the terminal can determine the routing path of the application data flow according to the URSP, for example, determine which PDU session to route to.
  • the terminal can use the PDU session to transmit the data of the application; when the session attribute of the PDU session is inconsistent with the application requirements of the application, the terminal can initiate a new PDU session to establish a PDU sessions that meet the application requirements of the application.
  • the URSP may be preset in the terminal, or may be sent to the terminal by the PCF through AMF.
  • the terminal can preferentially select the URSP delivered by the network device.
  • the terminal In the process of surfing the Internet, the terminal first needs to determine the IP address corresponding to the domain name of the service to be accessed, so as to send data packets of the service to be accessed. This operation requires the terminal to query the domain name system (domain name system, DNS) server (server) to complete.
  • DNS domain name system
  • DNS is a host information database that provides mapping and translation between domain names and Internet Protocol addresses.
  • the UE can resolve the domain name to the corresponding IP address through the DNS server, so as to realize the UE's access to the service.
  • the correspondence between domain names and IP addresses may be referred to as DNS records or resource records.
  • the terminal starts an application (application, APP), and initiates a session establishment process or reuses an existing session of the UE to establish a user plane connection between the terminal and the UPF. Additionally, during session establishment, the SMF may send the DNS server address to the terminal.
  • application application, APP
  • the SMF may send the DNS server address to the terminal.
  • the application of the embodiment of the present application may be QQ, WeChat, Fetion, mobile phone securities, mobile phone browsing or file download, which is not limited in this application.
  • the terminal determines whether there is a relevant DNS record of the domain name corresponding to the APP.
  • the terminal can determine the IP address corresponding to the domain name, and use the IP address as the destination IP of the service.
  • the terminal may initiate a DNS query process.
  • the terminal sends a DNS request (query) message to the DNS server, where the DNS query message carries the domain name of the service.
  • the DNS query message may be sent by the UE to the DNS server through the user plane connection with the UPF.
  • the DNS server receives the DNS query message, and queries the database to obtain the IP address corresponding to the domain name, and returns a DNS response message to the terminal, carrying the IP address and time to live (TTL) corresponding to the domain name.
  • TTL time to live
  • TTL indicates how long a DNS record can be cached.
  • the retention time is represented by 4 bytes, where a value of "0" indicates that the DNS record cannot be cached.
  • FIG. 5 shows a schematic flowchart of a method for accessing a local network according to an embodiment of the present application.
  • the terminal acquires a first network access identifier, where the first network access identifier is used to indicate a first local network.
  • the system may include one or more local networks, and different local networks are identified by different network access identifiers (DN access identifier, DNAI).
  • DN access identifier DNAI
  • the local network may be the local DN in the MEC architecture shown in FIG. 3 .
  • the terminal may actively acquire the first network access identifier, or passively receive the first network access identifier.
  • the active acquisition may be that the terminal first sends a request to another device to request to acquire the first network access identifier, and then acquires the first network access identifier in a response message receiving the request.
  • the passive reception may be that the terminal directly receives the first network access identifier periodically or temporarily sent by other devices.
  • a session connection may or may not exist on the terminal.
  • the session connection of the terminal before performing step 501 may be the second session, and the second session may be used for the terminal to access the central network.
  • the session attribute can be SSC mode, DNN, S-NSSAI, etc.
  • the first session is a session connection from UE, RAN, UPF to MEC in sequence
  • the second session is a session connection from UE, RAN, UPF to DN in sequence.
  • the access to the central network in the embodiment of the present application can be understood that the service needs to be processed through the central network, and the access to the local network can be understood that the service needs to be processed through the MEC.
  • the session connection in this embodiment of the present application may be a user plane connection, a control plane connection, or a user plane connection and a control plane connection, which is not limited in this application.
  • the terminal may first obtain a first mapping relationship, where the first mapping relationship is a mapping relationship between at least one service and at least one network access identifier.
  • step 501 may specifically be that the terminal determines the first network access identifier corresponding to the first service according to the first mapping relationship and the first service.
  • the terminal can determine the network access identifier corresponding to any service according to the first mapping relationship.
  • the network access identifier corresponding to the first service may be determined according to the first mapping relationship and the first service.
  • the terminal may use the network access identifier corresponding to the first service as the first network access identifier.
  • the correspondence between at least one service and at least one network access identifier may be that one service corresponds to one or one network access identifier, or one service may correspond to multiple network access identifiers, or may also be multiple network access identifiers.
  • the service corresponds to a network access identifier, which is not limited in this application.
  • the terminal can directly acquire at least one service and at least one network access identifier corresponding to the at least one service.
  • the following embodiments take the acquisition of the first mapping relationship by the terminal as an example for description, but the present application is not limited to this.
  • the first mapping relationship may also be embodied in the form of Table 2.
  • the network corresponding to DNAI1 can provide service 1, service 2 and service 3; the network corresponding to DNAI2 can provide service 4 and service 5; the network corresponding to DNAI3 can provide service 4 and service 6; the network corresponding to DNAI4 can provide service 7 , Business 8.
  • the first network access identifier may be any one of the multiple network access identifiers corresponding to the first service .
  • the terminal may determine the network access identifier corresponding to the first service only when an application (APP) (ie, the first service) is started.
  • APP application
  • the terminal may obtain the first mapping relationship from a registration accept message of the access and mobility management function.
  • the terminal receives a registration accept message from the access and mobility management function, where the registration accept message includes the first mapping relationship.
  • the terminal may acquire the first mapping relationship from a configuration update command message of the access and mobility management function.
  • the terminal receives a configuration update command message from the access and mobility management function, where the configuration update command message includes the first mapping relationship.
  • the configuration update command message may be sent to the terminal by the mobility management function in the terminal configuration update process after the registration process.
  • the configuration update command message is a UE configuration update (UE configuration update, UCU) message.
  • the first mapping relationship may also be configured by the terminal itself, that is, the terminal locally configures the first mapping relationship.
  • the terminal may first obtain a second mapping relationship, where the second mapping relationship is a mapping relationship between at least one location of the terminal and at least one network access identifier.
  • step 501 may specifically be that the terminal determines the first network access identifier according to the second mapping relationship and the first location of the terminal.
  • the location of the terminal may have a mapping relationship with the network access identifier. That is to say, the terminal may correspond to different network access identities at different locations. In this way, the terminal can obtain the network access identifier corresponding to any position according to the second mapping relationship.
  • the terminal may use the network access identifier corresponding to the first location as the first network access identifier. That is, when the terminal is in the first position, the established first session can be used to send various services.
  • At least one location corresponds to at least one network access identifier, which may be one location or one network access identifier, one location corresponding to multiple network access identifiers, or multiple locations corresponding to one network access identifier.
  • Network access identifier which is not limited in this application.
  • the terminal can directly acquire at least one location and at least one network access identifier corresponding to the at least one location.
  • the following embodiment takes the acquisition of the second mapping relationship by the terminal as an example for description, but the application is not limited to this.
  • the number of network access identifiers corresponding to a terminal at one location may be one or multiple, which is not limited in this application.
  • the first network access identifier may be any one of the multiple network access identifiers corresponding to the first location .
  • the second mapping relationship may be generated by the terminal itself, or may be acquired from the core network during the session establishment process.
  • the terminal may further determine the first network access identifier according to the first mapping relationship, the second mapping relationship, the first location and the first service.
  • the first mapping relationship is a mapping relationship between at least one service and at least one network access identifier
  • the second mapping relationship is a mapping relationship between at least one location and at least one network access identifier.
  • the terminal can determine the network access identifier corresponding to the first service according to the first service and the first mapping relationship, and then determine the network access identifier corresponding to the first location according to the first location and the second mapping relationship.
  • the terminal may use the same network access identifier in the network access identifier corresponding to the first service and the network access identifier corresponding to the first location as the first network access identifier. That is to say, in the first position, for the first service, transmission can be performed through the first session.
  • the terminal may also determine the first network access identifier in the following manner: the terminal determines the network access identifier corresponding to the first service according to the first service and the first mapping relationship, and then the terminal determines the network access identifier corresponding to the first service according to the determined The network access identifier, the first location and the second mapping relationship determine the first network access identifier.
  • the terminal may also determine the first network access identifier in the following manner: the terminal determines the network access identifier corresponding to the first location according to the first location and the second mapping relationship, and then the terminal determines the network access identifier corresponding to the first location according to the determined first location.
  • the network access identifier, the first service and the first mapping relationship determine the first network access identifier.
  • the terminal may first acquire at least one network access identifier corresponding to the first location of the terminal. In this way, step 501 may specifically be that the terminal selects the first network access identifier from the at least one network access identifier.
  • the terminal may acquire actively or passively receive at least one network access identifier corresponding to the first location.
  • the terminal may receive at least one network access identifier corresponding to the first location from the session management function network element.
  • the at least one network access identifier can be regarded as a network access identifier list (DNAI list).
  • the terminal may further select the first network access identifier from the at least one network access identifier according to the first service and the first mapping relationship.
  • the terminal may further determine the network access identifier corresponding to the first service according to the first mapping relationship. In this way, the terminal uses the network access identifier corresponding to the first service and the same network access identifier in the at least one network access identifier as the first network access identifier.
  • the terminal sends a session establishment request to the session management function network element, where the session establishment request is used to request to establish a first session, the first session is used for the terminal to access the first local network, and the session establishment request includes the first session.
  • a network access identifier is used to request to establish a first session.
  • the terminal may actively send a session establishment request to the session management function network element.
  • the terminal can send an AS message to the access network device, the AS message includes a NAS message, and the NAS message carries the session identifier and the session establishment request; the access network device sends the access and mobility management network element to the network element.
  • An N2 message is sent, where the N2 message includes a session identifier and a session establishment request; the access and mobility management network element sends the session establishment request to the session management function network element.
  • the first network access identifier may be included in the NAS message.
  • the NAS message includes the session identifier, the first network access identifier, and the session establishment request.
  • the network element of the session management function in the embodiment of the present application may be an SMF, but is not limited thereto.
  • SMF SMF
  • the terminal may first determine the network access identifier corresponding to the second service.
  • the method for the terminal to determine the network access identifier corresponding to the second service reference may be made to the description of step 501, which will not be repeated here.
  • the terminal can reuse the first session to transmit the second service.
  • the first session is a session for accessing a local network, where the local network may be represented by the first network access identifier.
  • the local network may only be able to provide limited services, for example, the local network only deploys the first service and the third service.
  • a problem occurs when the terminal reuses the first session to transmit the second service.
  • the present application solves this problem in the following manner.
  • the terminal determines whether the network access identifier corresponding to the second service is the same as the first network access identifier, and sends the second service.
  • the manner in which the terminal sends the second service may be different. It can be understood that when the terminal sends the second service, it can be understood that the terminal transmits a packet of the second service.
  • the terminal may use the first session to send the second service.
  • the terminal may use the second session to send the second service.
  • the second session is for the terminal to access the central network.
  • the terminal may use the third session to send the second service.
  • the third session may be a session connection for accessing the local network re-established by the terminal for the second service.
  • the terminal may also be unable to determine the network access identifier corresponding to the second service.
  • the terminal may use the second session to transmit the packets of the second service.
  • the second session is a session accessing the central network.
  • the second session is established before the first session.
  • the terminal may create a new session to implement packet transmission of the second service.
  • the newly created session is a session of the access center network.
  • the terminal sending the service to the local network may specifically receive the IP address of the EAS in the first local network first, and send the service to the EAS in the first local network according to the IP address of the EAS.
  • the service may be the above-mentioned first service or the above-mentioned second service.
  • IP address of the EAS may be carried in the session response message, may also be sent separately, or may also be carried in other messages, which is not limited in this application.
  • the terminal acquiring the IP address of the EAS may specifically be that the terminal sends a DNS request message to the DNS server, where the DNS request message includes the domain name of the first service.
  • the DNS server determines the IP address of the corresponding EAS according to the domain name of the first service, and sends a DNS response message to the terminal, where the DNS response message includes the IP address of the EAS.
  • the terminal may initiate a DNS query message to the DNS server on the user plane connection of the first session.
  • the DNS query message includes the APP FQDN of the service to be sent (for example, the APP FQDN is the domain name of the first service).
  • the DNS server receives the DNS query message, and queries the database to obtain the IP address corresponding to the APP FQDN.
  • the DNS server will return a DNS response message to the terminal, where the DNS response message includes the IP address corresponding to the APP FQDN.
  • the terminal may also query the IP address of the EAS corresponding to the second service or other services.
  • the IP address of the EAS obtained by the terminal may also be obtained from the SMF.
  • the DNS server in this embodiment of the present application may be deployed in a distributed manner, or may be deployed in a centralized manner.
  • the terminal may also receive the service area identifier of the EAS, and when the terminal moves out of the service area indicated by the service area identifier, send a session modification request to the session management function network element to request to change the session connection.
  • the service area identifier of the EAS received by the terminal may be carried in the session response message, may be sent separately, or may also be carried in other messages, which is not limited in this application.
  • the terminal triggers the process of actively creating a session, and creates a first session to access the local network, which is applicable to the multi-session scenario (ie, connection model 3) in FIG. 4 .
  • the terminal can also actively trigger the modification process of the existing session, and use the modified session to access the local network.
  • This embodiment is applicable to the offloading scenario (ie, connection model 2) in FIG. 4 .
  • the third session may be used for service transmission and processing of EES and/or EAS and/or ECS.
  • the above-mentioned existing session may be used for the existing session for the terminal to access the central network, or may be the existing session for the terminal to access the local network, which is not limited in this application.
  • the terminal acquires a second network access identifier, where the second network access identifier is used to indicate a second local network.
  • one or more local networks may be included in the system, and different local networks are identified by different network access identifiers (DN access identifiers, DNAI), and each local network has its corresponding service scope. It can be understood as the service scope of EAS, and can also be understood as the service scope of EES or the service scope of ECS.
  • the second network access identifier corresponds to the current location of the terminal, or in other words, the current terminal is in the service range of the second local network.
  • the terminal may actively acquire the second network access identifier, or passively receive the second network access identifier, or the terminal may be preconfigured with information about EES or ECS or EAS and its corresponding service scope.
  • the service scope information corresponding to the EES or ECS or EAS may be represented by at least one DNAI, and the at least one DNAI includes the second network access identifier.
  • the manner in which the terminal actively obtains the second network access identifier may be that the terminal first sends a request to other devices to request to obtain the relevant information of EES/ECS/EAS, and then after receiving the request
  • the information about the EES or ECS or EAS and its corresponding service scope is obtained in the response message.
  • the corresponding service scope includes the service scope corresponding to the second network access identifier, which can also be understood as the above-mentioned service scope of the EES or ECS or EAS.
  • the corresponding DNAI includes the second network access identifier.
  • the terminal sends a request to the network side (such as ECS or EES) to request to obtain the relevant information of EES/ECS/EAS and the information of the corresponding service range, and the terminal receives the response to the request
  • the message includes the relevant information of the EES/ECS/EAS and the information of the corresponding service scope.
  • the service scope information corresponding to the EES or ECS or EAS can be represented by at least one DNAI, and the at least one DNAI includes the second network access. logo.
  • the passive reception by the terminal may be that the terminal directly receives the EES/ECS/EAS related information and the corresponding service range information periodically or temporarily sent by other devices.
  • the network access identifier (which may be referred to as the third network access identifier) corresponding to the existing session (that is, the third session) actively modified by the terminal is different from the service scope of the second network access identifier. It can be understood that Therefore, the service range of the third local network corresponding to the third network access identifier is different from that of the second local network corresponding to the second network access identifier, and the terminal is currently in the service range of the second local network. It can be understood that the current location of the terminal may be the location after the terminal moves, and the above description can also be understood as, the terminal is in the service range of the third local network before the movement, and the terminal is in the service range of the second local network after the movement. Scope.
  • the terminal may first obtain a first mapping relationship, where the first mapping relationship is a mapping relationship between at least one service and at least one network access identifier.
  • the first mapping relationship is a mapping relationship between at least one service and at least one network access identifier.
  • the terminal may first obtain a second mapping relationship, where the second mapping relationship is a mapping relationship between at least one location of the terminal and at least one network access identifier.
  • the second mapping relationship is a mapping relationship between at least one location of the terminal and at least one network access identifier.
  • the terminal further determines the second network access identifier according to the first mapping relationship and the second service, or the second mapping relationship and the second position, where the second position is the current position of the terminal, and the second The service is the service corresponding to the current location of the terminal. It can be understood that the current position of the terminal may be the position after the terminal moves.
  • the terminal sends information #A to the SMF, where the information #A is used to request modification of the third session.
  • the terminal sends a PDU session modification request (that is, information #A) to the SMF, and the request information is used to request modification of the third session, or in other words, the request information is used to request the modification of the third session.
  • the request information includes the session identifier of the third session (which can be recorded as session 3) and the second network access identifier, wherein the session identifier of the third session is used to determine the modified session, and the second network access identifier The identifier is used to determine the local user plane anchor point corresponding to the second local network.
  • the information #A may also be a NAS message sent by the terminal to the AMF, including the session identifier of the third session, the second network access identifier and the PDU session modification request.
  • the above-mentioned information #A further includes service information, where the service information is used to indicate a service that needs to be offloaded locally.
  • the terminal may determine the above service information according to the related information of the EES/ECS/EAS obtained in step S601 and the location information of the UE.
  • the terminal obtains the identification information of EAS1 and EAS2 and the service range information corresponding to EAS1 and EAS2, and the terminal determines according to its own location information that the terminal is in the service range of EAS1 and the service range of EAS2 at the same time before moving. After moving, it is still in the service scope of EAS1, but not in the service scope of EAS2.
  • the service information included in the information #A can be the service information of EAS2.
  • the service information of EES/ECS/EAS can be understood as Identification information of EES/ECS/EAS, such as IP quintuple, etc.
  • the SMF determines the local user plane anchor point.
  • the information #A received by the SMF includes the second network access identifier and the session identifier, the SMF determines the session to be modified according to the session identifier, and the SMF determines the session to be modified according to the second network access identifier.
  • the local user plane anchor point corresponding to the local network is optionally, the SMF further determines the offload point corresponding to the second network according to the second network access identifier.
  • the SMF may also locally offload the service corresponding to the service information according to the service information.
  • the terminal actively triggers the modification process of the existing session.
  • the network side can also trigger the modification process for the existing session, for example, the SMF triggers the modification process for the existing session.
  • the process in which the SMF triggers the modification process of the existing session may be that the SMF obtains the information #B from the EAS (it may also be the EES or the ECS), and the SMF determines the current location of the terminal according to the obtained information #B.
  • the network access identifier and the session identifier of the existing session of the terminal determines the session to be modified according to the session identifier, and the SMF determines the offload point and local user plane anchor point corresponding to the network access identifier according to the network access identifier.
  • the above information #B may include the location information of the terminal, the corresponding local network access identifier, service information, the existing session information of the terminal, etc.
  • the network access identifier corresponding to the current location of the terminal and the session identifier of the existing session of the terminal may be sufficient, which are not limited in this application.
  • the SMF may also acquire the service information of the terminal from the EAS (it may also be an EES or an ECS), and locally offload the service corresponding to the service information according to the service information.
  • the terminal actively initiates the process of creating a new session.
  • the SMF may also trigger the terminal to create a new session.
  • FIG. 7 shows a schematic flowchart of a method for accessing a local network according to an embodiment of the present application.
  • the terminal receives a trigger message sent from the session management function network element, where the trigger message is used to trigger the terminal to establish a session.
  • the session management function network element sends the trigger message to the terminal.
  • the session management function network element sends a trigger message to the terminal for triggering the terminal to establish a session.
  • step 701 there may be a session connection between the terminal and the network.
  • the session connection of the terminal before performing step 701 may be the second session, and the second session may be used for the terminal to access the central network.
  • the session attribute can be SSC mode, DNN, S-NSSAI, etc.
  • the network element of the session management function in the embodiment of the present application may be an SMF, but is not limited thereto.
  • SMF SMF
  • the SMF in the embodiment shown in FIG. 7 can manage all UPFs, that is, the SMF service area (service area, SA) is the entire PLMN.
  • the terminal may establish a session connection of the second session before step 701 .
  • the terminal starts the first service, and initiates a DNS query message to the RAN to obtain the EAS IP address corresponding to the first service.
  • the DNS query message includes the domain name (eg, FQDN2) of the first service.
  • the RAN sends the DNS query message to the PSA, which detects the DNS query message and sends it to the SMF.
  • the PSA detects the DNS query message by identifying the service type according to the domain name in the DNS query message. For example, PSA only handles some domain names that belong to a pre-set list of domain names, or business types. If the domain name in the DNS query message does not belong to the preset domain name list, it will not be sent to the SMF. According to the stored mapping relationship between the domain name and DNAI, the SMF can obtain the target DNAI (target DNAI) corresponding to the domain name in the query message.
  • target DNAI target DNAI
  • mapping relationship between the domain name and the DNAI stored in the SMF includes the corresponding relationship between the identifier of the first service and the target DNAI.
  • the corresponding relationship may be regarded as a list or table, which is not limited in this application.
  • the identifier of the first service may be represented by the domain name of the first service.
  • the DNS query message mentioned in this application may also be the first upstream message of the service.
  • the PSA detection DNS query message may be the first upstream message of the PSA detection service.
  • the trigger message further includes indication information, where the indication information is used to indicate that the current session connection of the terminal is the second session.
  • the indication information may indicate a cause value.
  • the terminal can learn that the current session connection of the terminal is used to access the central network. This can facilitate session selection for subsequent transmission of new services.
  • the trigger message further includes indication information, where the indication information is used to instruct the terminal to carry the identity of the current session when establishing the first session, that is, to carry the identity of the second session, or in other words, the indication information is used to instruct the terminal to carry the identity of the current session.
  • the session identifier of the existing session is carried.
  • the terminal sends a first message to the SMF according to the trigger message, where the first message is used to request the establishment of a first session, and the first session is used for the terminal to access the first local network.
  • the terminal sends a NAS message to the AMF, where the NAS message includes the session identifier of the second session and the first session establishment request.
  • the AMF sends a first message to the SMF, where the first message includes the first session establishment request, and the first session establishment request may include a session identifier of the second session.
  • the first session establishment request includes the session identifier of the second session, and it may also be understood that the first message includes the session identifier of the second session.
  • the SMF determines the target network access identifier according to the first message.
  • the first message may include the session identifier of the second session and the session identifier of the first session, so that the SMF can
  • the session identifier of the session and the mapping relationship determine the target network access identifier corresponding to the session identifier of the second session.
  • the SMF may use the target network access identifier corresponding to the session identifier of the second session in the first message as the network access identifier corresponding to the session identifier of the first session.
  • the mapping relationship is a mapping relationship between at least one session identifier and at least one network access identifier.
  • the mapping relationship includes the corresponding relationship between the identifier of the second session and the access identifier of the target network.
  • the SMF may pre-store the correspondence between at least one session identifier and at least one network access identifier, where at least one session identifier includes the second session identifier. Or, in the process of establishing the second session, the SMF stores the correspondence between the session identifier of the second session and the target network access identifier. In this way, the SMF can determine the corresponding target network access identifier according to the second session identifier included in the first session establishment request.
  • the SMF can save the correspondence between the session identifier of the first session and the target network access identifier.
  • the SMF may store the correspondence between the session identifier of the first session, the session identifier of the second session, and the target network access identifier.
  • the SMF may also store the correspondence between other sessions and the network access identifier, which is not limited in this application.
  • the SMF saves the correspondence between the session identifier and the target network access identifier as an example for description.
  • the SMF may also store the target network access identifier. After the SMF receives the first message, it determines the target UPF for the first session according to the saved target network access identifier. Optionally, for a session whose SSC mode is SSC mode3, the SMF determines the target UPF for the first session according to the saved target network access identifier.
  • the SMF After the SMF receives the first message, it determines whether the first session is SSC mode3, and if so, determines the target UPF for the first session according to the saved target network access identifier; if not, when the SMF selects the target UPF The saved target network access identity is not considered.
  • the above logic is also applicable to the SMF saving the correspondence between the session identifier and the target network access identifier.
  • the SMF deletes the target network access identifier, or the corresponding relationship between the session identifier and the target network access identifier includes: after the SMF determines the target UPF for the first session, the SMF deletes the target network access identifier. and/or the SMF deletes the target network access identification or the corresponding relationship after a period of time; and/or the SMF deletes the target network access identification or the corresponding relationship when the second session is released.
  • the UE may send the UE capability to the SMF to indicate that the UE supports carrying the old session identifier.
  • the UE capability can also be described as the UE supports carrying multiple session identifiers, and can also be described as the UE is an R17 UE.
  • the SMF determines the processing method for the target network access identifier according to the UE capability: (1) when the UE supports carrying the old session identifier, the SMF saves the correspondence between the target network access identifier and the session identifier; In the process of establishing a new session, the SMF determines the target network access identifier according to the old session identifier carried by the UE and the corresponding relationship, and selects the target UPF according to the target network access identifier. (2) When the UE does not support carrying the old session identifier, the SMF saves the target network access identifier and starts a timer, and when the timer expires, the SMF deletes the target network access identifier. In the process of establishing a new session initiated by the UE, the SMF selects the target UPF according to the saved target network access identifier.
  • the SMF determines the target UPF according to the target network access identifier.
  • the terminal can connect to the target local network through the access network device and the target UPF, that is, the establishment of the first session connection is completed. In this way, the terminal can perform service transmission and processing through the first session.
  • the target local network refers to the local network where the first service in step 701 is located; the target UPF refers to the user plane functional network element that the terminal passes through when accessing the target local network.
  • the sending of the first service by the terminal to the local network may specifically include first receiving the IP address of the EAS in the first local network, and sending the service to the EAS in the first local network according to the IP address of the EAS.
  • obtaining the IP address of the EAS that transmits the first service by the terminal may specifically be that the terminal sends a DNS query request message to the DNS server, where the DNS query request message includes the domain name (eg, FQDN1) of the first service.
  • the DNS server determines the IP address of the corresponding EAS according to the domain name of the first service, and sends a DNS response message to the terminal, where the DNS response message includes the IP address of the EAS.
  • the terminal may initiate the DNS query for the first service on the user plane connection of the first session.
  • the terminal may initiate the DNS query for the first service on the user plane connection of the second session.
  • the user plane connection of the second session includes the target UPF.
  • the terminal may not re-initiate the DNS query, and the SMF stores the DNS query request message corresponding to the first service when receiving the DNS query request message corresponding to the first service.
  • the SMF determines that the establishment of the first session is completed, the stored DNS query request message is forwarded to the DNS server through the target UPF corresponding to the first session, and the EAS IP corresponding to the first service is obtained from the DNS server, and then the target UPF sends the EAS IP It is sent to the terminal to complete the DNS query for the first service.
  • the terminal does not re-initiate the DNS query, and the SMF stores the DNS query request message corresponding to the first service when receiving the DNS query request message corresponding to the first service. And, the SMF forwards the DNS query request message to the DNS server, obtains the EAS IP corresponding to the first service from the DNS server, and then the SMF sends the EAS IP to the UE. It can be understood that the SMF may carry the current location of the terminal when forwarding the DNS query message.
  • the DNS server may be a centralized DNS server or a local DNS server.
  • the deployment position of the centralized DNS server is higher, and the deployment position of the local DNS server is lower.
  • the local DNS server is close to the terminal or close to the UPF.
  • the terminal can also use the first session and the second route according to the first routing condition and the second routing condition.
  • a session is selected as a target session, and then service transmission and processing are performed through the target session.
  • the first routing condition is sent by the SMF to the terminal during the establishment of the first session;
  • the second routing condition is sent by the SMF to the terminal during the establishment of the second session.
  • the first routing condition is a condition for the terminal to select the first session
  • the second routing condition is a condition for the terminal to select the second session.
  • routing condition may also be referred to as a "forwarding rule”.
  • the terminal can directly acquire the domain name corresponding to the target service when starting a new APP (hereinafter referred to as "target service").
  • target service When the first routing condition and the second routing condition are represented by the domain name of the service, the terminal can directly select the session according to the domain name corresponding to the target service, but when the first routing condition and the second routing condition are not represented by the domain name of the service (For example, when represented by the target IP address segment), the terminal fails to obtain the IP corresponding to the target service when starting the target service, and therefore cannot select a session according to the first routing condition and the second routing condition.
  • step 704 when the terminal starts a new APP (hereinafter referred to as "target service"), if the terminal does not obtain the first routing condition and the second routing condition, or the terminal cannot obtain it by providing When selecting a session from the first session and the second session according to the first routing condition and the second routing condition, the terminal may select the session in the following manner.
  • target service a new APP
  • the terminal has established a first session and a second session, wherein the first session is used to access the local network, the first session is provided by PSA1, and the second session is used to access The central network, the second session is served by PSA2, where PSA1 and PSA2 are managed by SMF, in other words, SMF can manage all UPFs, that is, SMF service area (SA) is the entire PLMN, it should be understood that PSA is A kind of UPF.
  • SA SMF service area
  • the AMF stores the corresponding relationship between the session identifier and the network access identifier.
  • the corresponding relationship between the network access identifier and the session identifier may be in Sent by SMF to AMF during session establishment. Table 4 shows one possible correspondence.
  • the process of storing the session ID and the network access ID by the AMF may be that the terminal selects a session from the existing sessions (here, session 2 is used as an example) to initiate a DNS query for the target service, and the SMF receives a DNS query for the target service.
  • the service identifier of the target service carried in the DNS query (for example, the service domain name of the target service) and the stored correspondence between the service identifier and the network access identifier determine the target network access identifier corresponding to the service identifier of the target service (recorded here).
  • SMF sends the target network access identifier to AMF, if AMF does not query the session identifier of the target session corresponding to the target network access identifier, AMF will temporarily save the target network access identifier and the current terminal of the terminal.
  • the corresponding relationship between the session identifier of the session that is, the corresponding relationship between session 2 and DNAI-a
  • session 1 the target service
  • AMF The originally saved correspondence between the target network access identifier and the session identifier (that is, the correspondence between session 2 and DNAI-a) will be updated to the correspondence between the target network access identifier and the session identifier of the newly created session (that is, session 1 and DNAI-a). -a correspondence).
  • the AMF may also store session identifiers and corresponding DNAIs of other sessions, or may also store other DNAIs corresponding to the above-mentioned sessions 1 and 2.
  • the AMF may also delete the correspondence between the target network access identifier and the session identifier.
  • the AMF selects the target SMF according to the DNAI in the stored correspondence between the target network access identifier and the session identifier (that is, the correspondence between session 2 and DNAI-a). and delete the saved correspondence.
  • the method for the AMF to delete the correspondence between the target network access identifier and the session identifier may also be: after a period of time, the AMF deletes the stored correspondence between the network access identifier and the session attribute; When the session 2 is released, the stored correspondence between the network access identifier and the session attribute is deleted.
  • the AMF may also store the target network access identifier.
  • the AMF selects the target SMF according to the saved target network access identifier.
  • the method for the AMF to delete the stored target network access identifier includes: after the AMF determines the target SMF for session 1, that is, after the AMF determines the target SMF according to the stored target network access identifier, the AMF deletes the target network access identifier. and/or, the AMF deletes the target network access identifier after a period of time; and/or, the AMF deletes the target network access identifier when session 2 or session 1 is released.
  • the SMF sends the target network access identifier, or the correspondence between the target network access identifier and the session identifier, to the AMF.
  • the SMF determines whether the session is in SSC mode3, and if so, the SMF sends the target network access identifier to the AMF, or the target network access identifier and the The corresponding relationship of the session identifier; if not, the SMF does not send the target network access identifier to the AMF. That is to say, determining the target SMF or the target UPF according to the target access network is only applicable to the session of SSC mode3.
  • the UE may send the UE capability to the AMF to indicate that the UE supports carrying the old session identifier.
  • the UE capability can also be described as the UE supports carrying multiple session identifiers, and can also be described as the UE is an R17 UE.
  • the AMF determines the processing method for the target network access identifier according to the UE capability: (1) when the UE supports carrying the old session identifier, the AMF saves the correspondence between the target network access identifier and the session identifier; In the process of establishing a new session, the AMF determines the target network access identifier according to the old session identifier carried by the UE and the corresponding relationship, and selects the target SMF according to the target network access identifier. (2) When the UE does not support carrying the old session identifier, the AMF saves the target network access identifier and starts a timer. When the timer expires, the AMF deletes the target network access identifier. In the process of establishing a new session initiated by the UE, the AMF selects the target SMF according to the saved target network access identity.
  • the AMF stores the correspondence between session attributes and network access identifiers.
  • the corresponding relationship between the network access identifier and the session attribute may be sent by the SMF to the AMF during the session establishment process.
  • the correspondence between the network access identifier and part of the session attributes may be sent by the SMF to the AMF during the session establishment process, and another part of the session attributes may be sent by the UE to the AMF during the session establishment process.
  • the session attribute refers to the DNN, S-NSSAI, PDU session type, SSC mode, etc. corresponding to the session. Table 5 shows one possible correspondence.
  • session ID network access identifier Some or all session attributes for session 1 DNAI-a Some or all session attributes for session 2 ⁇
  • the process that the AMF saves the session attributes and the network access identifier of the session may be that the terminal initiates a session establishment process (here, session 2 is taken as an example), including the UE sending a NAS message to the AMF, carrying a session establishment request , and DNN, S-NSSAI, session ID; AMF saves session ID, DNN, S-NSSAI, wherein DNN, S-NSSAI, session ID are saved on AMF as part of session attributes.
  • session 2 is taken as an example
  • the terminal initiates a DNS query of the target service on the session 2, and the SMF receives the service identifier of the target service (for example, the service domain name of the target service) carried in the DNS query, and the stored correspondence between the service identifier and the network access identifier.
  • Determine the target network access identifier (referred to as DNAI-a here) corresponding to the service identifier of the target service
  • the SMF sends the target network access identifier and some/all session attributes to the AMF, wherein some/all session attributes include: DNN , S-NSSAI, SSC mode, session ID, etc.
  • AMF saves the correspondence between the target network access ID and some/all session attributes. So far, according to the partial session attributes received from the UE and some/all of the session attributes received from the SMF, the AMF can store the corresponding relationship between the target network access identifier and the session attributes.
  • the indication information included in the trigger message in step 701 is used to instruct the terminal to carry the session attribute when establishing the first session, and the session attribute is sent by the UE to the AMF.
  • the AMF receives the first message sent by the terminal in step 702
  • the first message carries the session attribute.
  • the AMF determines the network access identifier corresponding to the session attribute in the first message according to the session attribute in the first message and the stored correspondence between the network access identifier and the session attribute, and selects a new SMF according to the network access identifier.
  • the AMF deletes the stored correspondence between the network access identifier and the session attribute.
  • the AMF may delete the stored correspondence between the network access identifier and the session attribute after a period of time.
  • the AMF may delete the saved correspondence between the network access identifier and the session attribute when the session 2 is released.
  • the SMF determines whether a new session is required. If no new session is required, the reused session needs to be further determined, and the corresponding session identifier is sent to the terminal. If a new session needs to be created, the SMF can trigger the terminal to create a new session. It should be noted that the description can also be replaced by SMF to determine whether the existing session can be reused, if yes, send the identifier corresponding to the reused session to the terminal; if not, trigger the terminal to create a new session.
  • the terminal can select one of the sessions to transmit the domain name query request corresponding to the target service.
  • PSA1 the PSA corresponding to the first session is denoted as PSA1.
  • the terminal sends information #a1 (ie, the first information) to the SMF, where the information #a1 is used to determine the session used for sending the domain name query request corresponding to the target service, and the information #a1 includes the domain name of the target service.
  • information #a1 ie, the first information
  • the information #a1 may also be described as an IP address corresponding to a domain name used to determine the target service, in other words, the information #a1 may be a DNS query.
  • the terminal sends information #a1 to the SMF through the RAN and PSA1, where the information #a1 is used to determine the session used for sending the domain name query request corresponding to the target service, and the information #a1 includes the target service
  • the domain name of the target service is FQDN3.
  • PSA1 sending the information #a1 to the SMF can also be described as the PSA1 sending the domain name included in the information #a1 to the SMF.
  • the process of the terminal sending the information #a1 to the SMF1 through the RAN and the PSA1 may be: the terminal sends the information #a1 to the RAN, the information #a1 includes the domain name of the target service, and the RAN sends the information #a1 to the PSA1, When the PSA1 detects the message #a1, the message #a1 is reported to the SMF.
  • the process of PSA1 detecting the information #a1 may specifically be identifying the service type according to the domain name of the target service in the information #a1. For example, PSA1 only handles some domain names belonging to a pre-set list of domain names, or business types.
  • the SMF can obtain the target DNAI (target DNAI) corresponding to the domain name in the request message according to the stored mapping relationship between the domain name and the DNAI.
  • the information #a1 can be a domain name query request (DNS query), and the above detection information #a1 and reporting information #a1 can also be implemented by other network elements other than PSA1, such as the edge application server discovery function network element (edge application server discovery function, EASDF), where EASDF is used to process domain name-related messages, such as DDNS query, DNS response, and can be deployed behind PSA1.
  • DNS query domain name query request
  • EASDF edge application server discovery function network element
  • EASDF edge application server discovery function network element
  • the above-mentioned manner for the UE to send the information #a1 to the SMF may be that the UE sends the information #a1 to the SMF through the AMF, and the specific sending method here may refer to the prior art, which will not be repeated in this application.
  • the SMF determines whether there is a session identifier corresponding to the target service.
  • the domain name of the service stored by the SMF includes the domain name of the target service in the information #a1, then the SMF determines that there is a session identifier corresponding to the domain name of the target service, and further, the SMF determines the target service.
  • the manner in which the SMF determines the session identifier corresponding to the domain name of the target service may be that the SMF determines the corresponding relationship between the domain name of the service and the network access identifier and the corresponding relationship between the network access identifier and the session identifier. .
  • the SMF first determines the network access identifier DNAI corresponding to the target service according to the stored correspondence between the domain name of the service and the network access identifier, which may be recorded as DNAI-b; the SMF then determines the network access identifier DNAI according to the stored network access identifier and session The corresponding relationship of the identifiers determines the session identifier corresponding to DNAI-b, and the session identifier corresponding to the reused session may be recorded as session x.
  • the manner in which the SMF determines the session identifier corresponding to the domain name of the target service may be that the SMF determines the session identifier according to the correspondence between the domain name of the service and the session identifier.
  • the SMF determines the correspondence between the domain name of the service and the session identifier according to the stored correspondence between the domain name of the service and the network access identifier and the stored correspondence between the network access identifier and the session identifier, and then determines the correspondence between the domain name of the service and the session identifier according to the stored correspondence between the domain name of the service and the session identifier.
  • the corresponding relationship of the identifiers determines the session identifier corresponding to the domain name of the target service, and the session identifier corresponding to the reused session may be recorded as session x.
  • the corresponding relationship (or a mapping relationship) between the domain name of the service stored in the SMF and the DNAI includes the corresponding relationship between the identifier of the target service and the target DNAI, and the network access identifier stored by the SMF is the same as the one.
  • the correspondence between the session identifiers includes the correspondence between the target network access identifier and the target session identifier.
  • the corresponding relationship may be regarded as a list or table, which is not limited in this application.
  • the identifier of the target service may be represented by the domain name of the target service.
  • the domain name of the service stored by the SMF does not include the domain name of the target service in the information #a1, and the SMF determines that there is no session identifier corresponding to the domain name of the target service.
  • the SMF sends information #a2 to the UE, where the information #a2 is used to determine the session for transmitting the target service.
  • the determined session for transmitting the target service may be a certain session (ie, a reused session) in the existing sessions, or may be a newly created session.
  • the SMF determines that there is a session identifier corresponding to the domain name of the target service
  • the SMF sends information #a2 to the UE, where the information #a2 includes the session identifier corresponding to the domain name of the target service, that is, session x, It is used to instruct the terminal to use session x to transmit services.
  • the SMF determines that there is no session corresponding to the domain name of the target service, the SMF sends information #a2 to the SMF1 to instruct the terminal to initiate a new session.
  • the information #a2 is empty, that is, it does not contain the identifier of the reused session, or the identifier of the reused session is empty.
  • the above information #a2 may further include indication information, where the indication information is used to instruct the terminal to transmit the target service using session x, or to indicate that there is no session identifier corresponding to the domain name of the target service in the existing session.
  • the above-mentioned manner of sending the information #a2 to the terminal by the SMF may be that the SMF sends the information #a2 to the terminal through the AMF, and the specific sending manner here may refer to the prior art, which will not be repeated in this application.
  • the terminal determines a session for transmitting the target service.
  • the terminal receives the above information #a2, and if the information #a2 includes the session identifier corresponding to the target service - session x, the terminal determines to transmit the target service through the session x.
  • the terminal may initiate a domain name query request (that is, DNS query) on the session x to obtain the IP address corresponding to the target service.
  • a domain name query request that is, DNS query
  • the terminal receives the above information #a2, if the information #a2 is empty, or the indication information in the information #a2 indicates that there is no session identifier corresponding to the domain name of the target service in the existing session , the terminal can establish a new session so that the terminal can transmit services on the newly created session.
  • the terminal initiates a domain name query request (ie, DNS query) on the newly created session to obtain the IP address corresponding to the target service.
  • DNS query domain name query request
  • session 1, session 2 or session x to represent the session identifier is only an example, and it should be understood that the session identifier may also be identified in other forms, which is not limited in this application.
  • the method described in this embodiment is not only applicable to the situation where the terminal has established the second session accessing the central network and the first session accessing the local network, but also is applicable to the situation where the terminal has only established the second session accessing the central network.
  • the method described in this embodiment can also be used to trigger the establishment process of the second session.
  • the method described in this embodiment can also be applicable to In the case of other sessions (such as the third session) of the local network, there is no limitation on the number of sessions of the type of access to the local network that the terminal has established.
  • the terminal actively initiates the process of creating a new session or the SMF triggers the terminal to create a new session.
  • the AMF can also trigger the terminal to create a new session.
  • FIG. 9 shows a schematic flowchart of a method for accessing a local network according to an embodiment of the present application.
  • the AMF sends a trigger message to the terminal, where the trigger message is used to trigger the terminal to establish a session.
  • the terminal may establish a session connection of the second session before step 901 .
  • the terminal starts the first service, and initiates a DNS query message to the RAN to obtain the EAS IP address corresponding to the first service.
  • the DNS query message includes the domain name (eg, FQDN2) of the first service.
  • the RAN sends the DNS query message to the PSA, which detects the DNS query message and sends it to SMF2.
  • the PSA detection query message may specifically identify the service type according to the domain name in the DNS query message. For example, PSA only handles some domain names that belong to a pre-set list of domain names, or business types. If the domain name in the DNS query message does not belong to the preset domain name list, it will not be sent to SMF2.
  • SMF2 can obtain the target DNAI (target DNAI) corresponding to the domain name in the query message according to the stored mapping relationship between the domain name and the DNAI.
  • mapping relationship between the domain name and the DNAI stored in the SMF2 includes the corresponding relationship between the identifier of the first service and the target DNAI.
  • the corresponding relationship may be regarded as a list or table, which is not limited in this application.
  • the trigger message sent by the AMF to the terminal refers to that the AMF receives the trigger message sent by the SMF2 and sends it to the terminal.
  • the SMF also sends the session identifier and target DNAI of the second session to the AMF.
  • the AMF stores the session identifier and target DNAI of the second session.
  • the AMF can also store session identifiers and corresponding DNAIs of other sessions.
  • the DNS query message mentioned in this application may also be the first upstream message of the service.
  • the PSA detection DNS query message may be the first upstream message of the PSA detection service.
  • the trigger message further includes indication information, where the indication information is used to indicate that the current session connection of the terminal is the second session.
  • the indication information may indicate a cause value.
  • the terminal can learn that the current session connection of the terminal is used to access the central network. This can facilitate session selection for subsequent transmission of new services.
  • the trigger message further includes indication information, where the indication information is used to instruct the terminal to carry the identity of the current session when establishing the first session, that is, to carry the identity of the second session, or in other words, the indication information is used to instruct the terminal to carry the identity of the current session.
  • the session identifier of the existing session is carried.
  • the terminal sends a first message according to the trigger message, where the first message is used to request to establish a first session, and the first session is used for the terminal to access the local network.
  • the terminal sends a NAS message to the AMF, where the NAS message includes the session identifier of the second session and the first session establishment request.
  • the AMF determines the target network access identifier according to the first session establishment request.
  • the NAS message may include the session identifier of the second session, so that the AMF can determine the session identifier and the mapping relationship of the second session.
  • the target network access identifier corresponding to the session identifier of the second session.
  • the mapping relationship is a mapping relationship between at least one session identifier and at least one network access identifier.
  • the AMF can pre-store the correspondence between at least one session identifier and at least one network access identifier, that is, the AMF mentioned in step 901 saves the session identifier and the corresponding DNAI, wherein at least one session identifier contains the second session identifier. logo. In this way, the AMF can determine the corresponding target network access identifier according to the second session identifier included in the first session establishment request.
  • the mapping relationship may be sent to the AMF by the second SMF (ie, SMF2) during the establishment of the second session.
  • the second SMF provides session management services for the second session.
  • the second SMF (hereinafter may be referred to as "SMF2") may be used to establish a second session for the terminal.
  • the second SMF generates a mapping relationship between the at least one session identifier and the at least one network access identifier, and sends it to the AMF.
  • the AMF can determine the target network access identifier corresponding to the session identifier of the second session according to the mapping relationship.
  • the AMF determines the first SMF according to the target network access identifier.
  • the AMF may select the first SMF (which may be referred to as "SMF1" hereinafter) that can provide services according to the target network access identifier.
  • SMF1 the first SMF
  • the AMF sends the target network access identifier to the first SMF.
  • the first SMF determines the target UPF according to the target network access identifier.
  • the terminal can connect to the target local network through the access network device and the target UPF, that is, the establishment of the first session connection is completed. In this way, the terminal can perform service transmission and processing through the first session.
  • the sending of the first service by the terminal to the local network may specifically include first receiving the IP address of the EAS in the first local network, and sending the service to the EAS in the first local network according to the IP address of the EAS.
  • the terminal may initiate the DNS query for the first service on the user plane connection of the first session.
  • the terminal may initiate the DNS query for the first service on the user plane connection of the second session.
  • the user plane connection of the second session includes the target UPF.
  • PSA1 sends the DNS query message to SMF2
  • SMF2 sends the DNS query to SMF1 through AMF
  • SMF1 adds the current location of the UE to the DNS query (location), and send the DNS query to the DNS server.
  • the terminal may not re-initiate the DNS query, and the SMF2 stores the DNS query request corresponding to the first service when receiving the DNS query message corresponding to the first service.
  • SMF2 forwards the stored DNS query to the DNS server through AMF and SMF1, obtains the EAS IP corresponding to the first service from the DNS server, and then SMF2 or SMF1 sends the EAS IP to the UE, thereby completing the DNS query for the first service.
  • SMF2 caches the DNS query of the second session until the establishment of the first session is completed, SMF2 sends the cached DNS query to SMF1 through AMF, and SMF1 sends it to the DNS server.
  • SMF2 caching DNS query request can also be replaced by AMF caching DNS query request.
  • the SMF can carry the current location of the terminal when forwarding the DNS query message.
  • the terminal does not re-initiate the DNS query, and the SMF2 stores the DNS query message corresponding to the first service when receiving the DNS query message corresponding to the first service.
  • the stored DNS query is forwarded to the DNS server through AMF, SMF1, and the target UPF in step 706, and the EAS IP corresponding to the first service is obtained from the DNS server, and the target UPF will EAS IP is sent to the terminal.
  • the DNS server may be a centralized DNS server or a local DNS server.
  • the deployment position of the centralized DNS server is higher, and the deployment position of the local DNS server is lower.
  • the local DNS server is close to the terminal or close to the UPF.
  • the terminal can directly acquire the domain name corresponding to the target service when starting a new APP (hereinafter referred to as "target service").
  • target service When the first routing condition and the second routing condition are represented by the domain name of the service, the terminal can directly select the session according to the domain name corresponding to the target service, but when the first routing condition and the second routing condition are not represented by the domain name of the service (For example, when represented by the target IP address segment), the terminal fails to obtain the IP corresponding to the target service when starting the target service, and therefore cannot select a session according to the first routing condition and the second routing condition.
  • step 906 when the terminal starts a new APP (hereinafter referred to as "target service"), if the terminal does not obtain the first routing condition and the second routing condition, or the terminal cannot obtain it by providing When selecting a session from the first session and the second session according to the first routing condition and the second routing condition, the terminal may select the session in the following manner.
  • target service a new APP
  • the terminal has established a first session and a second session, wherein the first session is used to access the local network, and the first session is served by PSA1 and SMF1 (ie, the first SMF) , the second session is used to access the central network, and the second session is served by PSA2 and SMF2 (ie, the second SMF).
  • PSA1 and SMF1 ie, the first SMF
  • PSA2 and SMF2 ie, the second SMF
  • the AMF stores the correspondence between the session identifier, the network access identifier and the SMF identifier, wherein the correspondence between the network access identifier and the session identifier is It may be sent to the AMF by the corresponding SMF during the session establishment process.
  • Table 6 shows one possible correspondence.
  • the process of saving the session ID and the network access ID by the AMF may be that the terminal selects a session from the existing sessions (here, session 2 is used as an example) to initiate a DNS query for the target service, and when the SMF receives the After reaching the DNS query, the target network corresponding to the service identifier of the target service will be determined according to the service identifier of the target service (such as the service domain name of the target service) carried in the DNS query and the stored correspondence between the service identifier and the network access identifier.
  • the service identifier of the target service such as the service domain name of the target service
  • Access ID (referred to as DNAI-a here)
  • SMF sends the target network access ID to AMF, if AMF does not query the session ID of the target session corresponding to the target network access ID, AMF will temporarily save the target network The corresponding relationship between the access ID and the session ID of the current session of the terminal (that is, the corresponding relationship between session 2 and DNAI-a), and then the terminal will create a new session corresponding to the target service (referred to as session 1 here).
  • the AMF will update the previously saved correspondence between the target network access ID and the session ID (that is, the correspondence between session 2 and DNAI-a) to the corresponding relationship between the target network access ID and the session ID of the newly created session. (ie the correspondence between session 1 and DNAI-a).
  • the AMF may also store session identifiers and corresponding DNAIs of other sessions and corresponding SMF identifiers, or may also store other DNAIs corresponding to the above-mentioned sessions 1 and 2.
  • the AMF may also delete the correspondence between the target network access identifier and the session identifier.
  • the AMF selects the target SMF according to the DNAI in the stored correspondence between the target network access identifier and the session identifier (that is, the correspondence between session 2 and DNAI-a). and delete the saved correspondence.
  • the method for the AMF to delete the corresponding relationship between the target network access identifier and the session identifier may also be: after a period of time, the AMF deletes the saved correspondence between the network access identifier and the session attribute; and/or, When the session 2 is released, the AMF deletes the stored correspondence between the network access identifier and the session attribute.
  • the above description takes the AMF storing the correspondence between the target network access identifier and the session identifier as an example for description.
  • the AMF may also store the target network access identifier.
  • the AMF selects the target SMF according to the saved target network access identifier.
  • the method for the AMF to delete the stored target network access identifier includes: after the AMF determines the target SMF for session 1, that is, after the AMF determines the target SMF according to the stored target network access identifier, the AMF deletes the target network access identifier. and/or, the AMF deletes the target network access identifier after a period of time; and/or, the AMF deletes the target network access identifier when session 2 or session 1 is released.
  • the SMF sends the target network access identifier, or the correspondence between the target network access identifier and the session identifier, to the AMF.
  • the SMF determines whether the session is in SSC mode3, and if so, the SMF sends the target network access identifier to the AMF, or the target network access identifier and the The corresponding relationship of the session identifier; if not, the SMF does not send the target network access identifier to the AMF. That is to say, determining the target SMF or the target UPF according to the target access network is only applicable to the session of SSC mode3.
  • the UE may send the UE capability to the AMF to indicate that the UE supports carrying the old session identifier.
  • the UE capability can also be described as the UE supports carrying multiple session identifiers, and can also be described as the UE is an R17 UE.
  • the AMF determines the processing method for the target network access identifier according to the UE capability: (1) when the UE supports carrying the old session identifier, the AMF saves the correspondence between the target network access identifier and the session identifier; In the process of establishing a new session, the AMF determines the target network access identifier according to the old session identifier carried by the UE and the corresponding relationship, and selects the target SMF according to the target network access identifier. (2) When the UE does not support carrying the old session identifier, the AMF saves the target network access identifier and starts a timer. When the timer expires, the AMF deletes the target network access identifier. In the process of establishing a new session initiated by the UE, the AMF selects the target SMF according to the saved target network access identity.
  • the SMF determines whether a new session needs to be created by querying the AMF, or the AMF determines whether a new session needs to be created. and send the corresponding session identifier to the terminal. If a new session needs to be created, the network side (such as AMF or SMF) can trigger the terminal to create a new session. It should be noted that the description can be replaced by SMF or AMF to determine whether the existing session can be reused, if yes, send the identifier corresponding to the reused session to the terminal; if not, trigger the terminal to create a new session.
  • the terminal can choose one of the sessions to transmit the domain name query request corresponding to the target service, and the terminal queries the AMF through the SMF corresponding to the session to determine whether to create a new session.
  • the PSA is recorded as PSA1.
  • the terminal sends information #b1 to the SMF1, where the information #b1 is used to determine the session used for sending the domain name query request corresponding to the target service, and the information #b1 includes the domain name of the target service.
  • the information #b1 may also be described as an IP address corresponding to a domain name used to determine the target service, in other words, the information #b1 may be a DNS query.
  • the terminal sends information #b1 to SMF1 through the RAN and PSA1, where the information #b1 is used to determine the session used for sending the domain name query request corresponding to the target service, and the information #b1 includes the target service
  • the domain name of the target service is FQDN3.
  • the process of the terminal sending the information #b1 to the SMF1 through the RAN and the PSA1 may be: the terminal sends the information #b1 to the RAN, the information #b1 includes the domain name of the target service, and the RAN sends the information #b1 to the PSA1, When the PSA1 detects the message #b1, it reports the message #b1 to the SMF1.
  • the process of detecting the information #b1 by the PSA1 may specifically be identifying the service type according to the domain name of the target service in the information #b1. For example, PSA1 only handles some domain names belonging to a pre-set list of domain names, or business types.
  • SMF1 can obtain the target DNAI (target DNAI) corresponding to the domain name in the request message according to the stored mapping relationship between the domain name and the DNAI.
  • the information #b1 can be a domain name query request (DNS query), and the above detection information #b1 and reporting information #b1 can also be implemented by other network elements other than PSA1, such as the edge application server discovery function network element (edge application server discovery function, EASDF), where EASDF is used to process domain name-related messages, such as DDNS query, DNS response, and can be deployed behind PSA1.
  • DNS query domain name query request
  • EASDF edge application server discovery function network element
  • EASDF edge application server discovery function network element
  • the above-mentioned way for the UE to send the information #a1 to the SMF1 may be that the UE sends the information #a1 to the SMF1 through the AMF, and the specific sending method here can refer to the prior art, which will not be repeated in this application.
  • the SMF1 determines a target network access identifier corresponding to the target service, and the target network access identifier may be recorded as DNAI-b.
  • the SMF1 determines the target network access identifier corresponding to the domain name of the target service in the information #b1, and the target network access identifier may be recorded as DNAI-b.
  • SMF1 will save the corresponding relationship between the domain name of the service and the network access identifier.
  • SMF1 receives the above information #b1, it can determine the corresponding relationship between the domain name of the service and the network access identifier.
  • the network access identifier corresponding to the domain name of the target service is DNAI-b.
  • the SMF1 sends a request #c to the AMF, where the request #c includes the target network access identifier, and the request #c is used for requesting to query the session identifier corresponding to the target network access identifier.
  • the request #c may further include the identifier of the current session, that is, the identifier of the first session.
  • SMF1 sends a session query request (ie, request #c) to the AMF, where the session query request includes the target network access identifier DNAI-b, and the session query request is used to request to query the DNAI-b The corresponding session ID.
  • request #c a session query request
  • the session query request includes the target network access identifier DNAI-b
  • the session query request is used to request to query the DNAI-b The corresponding session ID.
  • the SMF1 sends a N1N2 transfer message (Namf_Communication_N1N2Message Transfer) on the Namf interface (ie, request #c) to the AMF, where the Namf_Communication_N1N2Message Transfer includes the target network access identifier DNAI-b, and the Namf interface
  • the N1N2 transmission message is used to query the session ID corresponding to the DNAI-b.
  • the AMF determines whether there is a session identifier corresponding to the target network access identifier.
  • the network access identifier stored by the AMF includes DNAI-b in the information #b1, and the AMF determines that there is a session identifier corresponding to the target network access identifier.
  • the corresponding relationship between the access ID and the session ID determines the session ID corresponding to the DNAI-b, and the reused session ID is recorded as session x.
  • the network access identifier stored by the AMF does not include DNAI-b in the information #b1, and the AMF determines that there is no session identifier corresponding to the target network access identifier.
  • the AMF may trigger the terminal to create a new session corresponding to the target service.
  • the process of creating a session may refer to the previous embodiment, and will not be repeated here.
  • the AMF may pre-store a correspondence between at least one session identifier and at least one network access identifier, where the at least one network access identifier includes a target network access identifier. In this way, the AMF can determine the corresponding session identifier according to the target network access identifier included in the request #c. It should be understood that the AMF may store the correspondence between the session identifier and the network access identifier during the session establishment process.
  • the following steps S1005-S1007 may be executed.
  • the AMF sends a response #c to the SMF1, where the response #c corresponds to the above request #c.
  • the AMF determines that there is a session ID corresponding to the target network access ID, the AMF sends a session query response (ie, response #c) to SMF1, and the session query response includes the session corresponding to the DNAI-b ID, which is session x.
  • a session query response ie, response #c
  • the AMF determines that there is no session ID corresponding to the target network access ID, the AMF sends a session query response (ie, response #c) to SMF1, and the session query response is empty, that is, the AMF does not include reuse The ID of the session, or the ID of the reused session is empty.
  • a session query response ie, response #c
  • the above-mentioned response #c may also include indication information, and the indication information is used to instruct the terminal to use session x to transmit the target service, or to indicate that there is no session identifier corresponding to the target network access identifier in the existing session. .
  • the SMF1 determines a session for transmitting the target service.
  • SMF1 receives the above-mentioned response #c, if the response #c includes the session identifier session x corresponding to the target network access identifier, SMF1 determines to transmit the target service through the session x, that is, SMF1 It is determined that session x can be reused for this target service.
  • SMF1 receives the above response #c, if the response #c is empty, or the indication information in the information #a2 indicates that there is no session corresponding to the target network access identifier in the existing session logo.
  • the SMF may trigger the terminal to create a new session corresponding to the target service, and the process of creating a session here may refer to the previous embodiment, which will not be repeated here.
  • the SMF1 sends information #b2 to the terminal, where the information #b2 is used to determine the session for transmitting the target service.
  • SMF1 determines that there is a session identifier corresponding to the target network access identifier
  • SMF1 sends information #b2 to the terminal, where information #b2 includes the session identifier corresponding to the DNAI-b, ie, session x.
  • SMF1 determines that there is no session corresponding to the target network access identifier
  • SMF1 sends information #b2 to the terminal, where the information #b2 is used to trigger the terminal to establish a new session.
  • the information #b2 is empty, that is, it does not contain the identifier of the reused session, or the identifier of the reused session is empty.
  • the above-mentioned information #b2 may also include indication information, and the indication information is used to instruct the terminal to use session x to transmit the target service, or to indicate that there is no session identifier corresponding to the target network access identifier in the existing session. .
  • the above-mentioned manner of sending the information #a2 to the terminal by the SMF may be that the SMF sends the information #a2 to the terminal through the AMF, and the specific sending manner here may refer to the prior art, which will not be repeated in this application.
  • step S1008 can be performed.
  • the AMF sends information #b3 to the terminal, where the information #b3 is used to determine the session for transmitting the target service.
  • SMF1 sends a downlink NAS message (that is, information #b3) to the terminal, and the NAS message includes the session ID corresponding to the DNAI-b , which is session x.
  • the AMF determines that there is no session identifier corresponding to the target network access identifier, the AMF sends a downlink NAS message (ie, information #b3) to the terminal, and the NAS message is used to trigger the terminal to establish a new session.
  • the NAS message is empty, that is, it does not contain the identifier of the reused session, or the identifier of the reused session is empty.
  • the above-mentioned information #b3 may also include indication information, and the indication information is used to instruct the terminal to use session x to transmit the target service, or to indicate that there is no session identifier corresponding to the target network access identifier in the existing session. .
  • the terminal determines a session for transmitting the target service.
  • the terminal receives the above information #b2 or the above information #b3, if the information #b2 or the information #b3 includes the session identifier-session x corresponding to the target service, the terminal determines to pass the session x transmits the target business.
  • the terminal may initiate a domain name query request (that is, DNS query) on the session x to obtain the IP address corresponding to the target service.
  • a domain name query request that is, DNS query
  • the terminal receives the above information #b2 or the above information #b3, if the information #b2 or the information #b3 is empty, or the indication information in the information #b2 or the information #b3 indicates If there is no session identifier corresponding to the target network access identifier in the existing session, the terminal can establish a new session so that the terminal can transmit services on the newly created session.
  • the terminal initiates a domain name query request (ie, DNS query) on the newly created session to obtain the IP address corresponding to the target service.
  • DNS query domain name query
  • session 1, session 2 or session x to represent the session identifier is only an example, and it should be understood that the session identifier may also be identified in other forms, which is not limited in this application.
  • the SMF determines whether a new session needs to be created by obtaining the corresponding relationship between the network access identifier and the session identifier. session, and send the corresponding session identifier to the terminal. If a new session is required, the terminal can be triggered by the SMF to create a new session. It should be noted that the description can also be replaced by SMF to determine whether the existing session can be reused, and if so, the identifier corresponding to the reused session is sent to the terminal; if not, the terminal is triggered to create a new session.
  • the terminal can select one of the sessions to transmit the domain name query request corresponding to the target service.
  • the method C will be described in detail with reference to FIG. 11 , taking the terminal selecting the second session (that is, the session used by the terminal to access the central network) to transmit the domain name query request corresponding to the target service as an example.
  • the second SMF acquires the correspondence between the network access identifier and the session identifier.
  • the second SMF acquires the correspondence between the network access identifier and the session identifier from the AMF.
  • the SMF2 corresponding to the second session can obtain the network access identifier by subscribing to the AMF. Correspondence with session ID. In this way, the SMF2 can be made to obtain the information of all existing sessions of the terminal accessing the local network.
  • the manner in which the second SMF acquires the correspondence between the network access identifier and the session identifier from the AMF may be to acquire from the AMF in the process of establishing the session.
  • the manner in which the second SMF obtains the correspondence between the network access identifier and the session identifier from the AMF is exemplarily described.
  • SMF2 determines the network access identifier (which can be recorded as DNAI-a) corresponding to the service, it can send a subscription request to AMF with the DNAI-a, and the subscription request is used to subscribe to the DNAI -a corresponds to the session ID.
  • the AMF will send the corresponding relationship between the DNAI-a and the identifier of the first session to the SMF2, and the SMF2 stores the corresponding relationship.
  • the SMF1 corresponding to the first session can request the AMF for network access.
  • the correspondence between the ID and the session ID In this way, the SMF1 can also obtain the information of all existing sessions of the terminal stored in the AMF accessing the local network.
  • each session is managed by its corresponding SMF, for example, the first session is managed by SMF1 and the second session is managed by SMF2.
  • the terminal sends information #d1 to the second SMF, where the information #d1 is used to determine the session used for sending the domain name query request corresponding to the target service, and the information #d1 includes the domain name of the target service.
  • step S1102 reference may be made to the description of step S701 in FIG. 7, which will not be described in detail in this application.
  • the second SMF determines whether there is a session identifier corresponding to the target service.
  • the domain name of the service stored by SMF2 includes the domain name of the target service in information #a1, then SMF2 determines that there is a session identifier corresponding to the domain name of the target service, and further, SMF2 determines the target service.
  • the session ID corresponding to the domain name It should be understood that, the description can also be replaced with, then the SMF2 determines the session identifier corresponding to the domain name of the target service.
  • the manner in which SMF2 determines the session identifier corresponding to the domain name of the target service may be that SMF2 determines the corresponding relationship between the domain name of the service and the network access identifier and the correspondence between the network access identifier and the session identifier.
  • SMF2 first determines the network access identifier DNAI corresponding to the target service according to the stored correspondence between the domain name of the service and the network access identifier, which may be recorded as DNAI-b;
  • the corresponding relationship between the incoming ID and the session ID determines the session ID corresponding to the DNAI-b, and the session ID corresponding to the reused session may be recorded as session x.
  • the manner in which the SMF2 determines the session identifier corresponding to the domain name of the target service may also be determined by the SMF2 according to the correspondence between the domain name of the service and the session identifier.
  • SMF2 determines the corresponding relationship between the domain name of the service and the session ID according to the stored correspondence between the domain name of the service and the network access ID and the corresponding relationship between the network access ID and the session ID obtained in step S1101, and then according to the corresponding relationship between the service domain name and the session ID.
  • the corresponding relationship between the domain name and the session ID of the target service determines the session ID corresponding to the domain name of the target service, and the session ID corresponding to the reused session may be recorded as session x.
  • the corresponding relationship (or a mapping relationship) between the domain name of the service stored by SMF2 and the DNAI includes the corresponding relationship between the identifier of the target service and the target DNAI, and the network access identifier obtained by SMF2.
  • the corresponding relationship with the session identifier includes the corresponding relationship between the target network access identifier and the target session identifier.
  • the corresponding relationship may be regarded as a list or table, which is not limited in this application.
  • the identifier of the target service may be represented by the domain name of the target service.
  • the domain name of the service stored in the SMF1 does not include the domain name of the target service in the information #d1, and the SMF1 determines that there is no session identifier corresponding to the domain name of the target service.
  • the second SMF sends information #d2 to the terminal, where the information #d2 is used to determine the session for transmitting the target service.
  • the determined session for transmitting the target service may be a certain session (ie, a reused session) in the existing sessions, or may be a newly created session.
  • step S1104 reference may be made to the description of step S803 in FIG. 8, which will not be described in detail in this application.
  • the terminal determines a session for transmitting the target service.
  • step S1105 reference may be made to the description of step S804 in FIG. 8, which will not be described in detail in this application.
  • the method described in this embodiment is not only applicable to the situation where the terminal has established the second session accessing the central network and the first session accessing the local network, but also is applicable to the terminal having only established the second session accessing the central network.
  • the method described in this embodiment can also be used to trigger the establishment process of the second session.
  • the method described in this embodiment can also be applied to the terminal establishing the second session accessing the central network and accessing other local In the case of other sessions on the network (such as the third session), there is no restriction on the number of sessions that the terminal has established to access the local network type.
  • FIG. 12 shows a schematic flowchart of a method for discovering an edge application server EAS according to an embodiment of the present application.
  • the AF receives a discovery request (discovery information request) from the first device, the discovery request is used to request to discover the EAS, and the discovery request includes a preset condition. Accordingly, the first device sends the discovery request to the AF.
  • a discovery request discovery information request
  • the first device sends the discovery request to the AF.
  • the AF in the embodiment shown in FIG. 12 may be the EES 222 or the ECS 230 in the MEC architecture shown in FIG. 2 .
  • the first device is an SMF.
  • the terminal initiates a protocol data unit (protocol data unit, PDU) session establishment process by sending a session establishment request to the AMF.
  • the session establishment request may include PDU session identification, single network slice selection assistance information (S-NSSAI) and data network name (DNN), EAS discovery information (discovery information), filter conditions (filter) at least one of the parameters.
  • the EAS discovery information may carry a domain name or application identifier used to identify an application, and may also carry the location information of the terminal.
  • the domain name or the application identifier is used to identify the application requested by the terminal, specifically, the FQDN identifier can be used; the filter is used to indicate what condition the application instance requested by the terminal satisfies.
  • the filter can be used to indicate that the application instance requested by the UE can support multiplayer games, or to indicate what quality of service (quality of service, QoS) requirements the application instance requested by the terminal meets. It can be understood that the terminal can determine the filter according to the local configuration.
  • the AMF selects the SMF according to the S-NSSAI and the DNN, and sends the SMF the identity of the AMF, the permanent identity of the terminal, the location information of the terminal, the PDU session identity, the EAS discovery information, and parameters such as S-NSSAI and DNN.
  • the SMF calls the PCF's service-oriented operation policy establishment control request (Npcf_SMPolicy Control_Create Request) to request to obtain the measurement information related to the PDU session from the PCF.
  • the SMF may send the location information (location) of the terminal and the domain name or application identifier in the EAS discovery information to the PCF.
  • PCF generates a policy and charging control rule (PCC rule) based on the corresponding relationship between the application identifier, the deployment location of the application server, and the domain name, and creates a control response message (Npcf_SMPolicyControl_Create Response) through the service operation policy.
  • PCC rule policy and charging control rule
  • the PCF may determine the corresponding AF ID or AF address according to the domain name or application identifier, and send it to the SMF.
  • the AF may support application address resolution corresponding to the domain name or application identifier requested by the UE.
  • the SMF selects the anchor UPF for the PDU session and sends the discovery request to the AF, the discovery request including the filter.
  • the location information of the terminal may include a tracking area identity (TAI) of the terminal.
  • TAI tracking area identity
  • the first device is a terminal.
  • the process of establishing a session connection by the terminal is the same as that in the above-mentioned embodiment, and is not limited herein to avoid repetition.
  • the SMF selects the anchor UPF for the session, it can send a session establishment accept message to the terminal, where the session establishment accept message includes the DNAI list corresponding to the EAS discovery information.
  • the terminal After receiving the DNAI list, the terminal performs step 1201.
  • the discovery request further includes at least one of an application identifier, a list of network access identifiers of the local network, and an EAS requirement.
  • the application identifier may be an identifier of an application requested by the terminal.
  • the network access identifier list of the local network may include multiple network access identifiers DNAIs, and the multiple DNAIs may be respectively used to identify the location of the MEC platform to which the terminal can connect.
  • the EAS requirement may be the EAS of the end requirement.
  • the SMF may determine the network access identifier list of the local network according to the location information of the terminal, the network topology and the discovery message.
  • the SMF may, according to the current location of the terminal, find the application identifier and network topology requested by the terminal in the discovery message, and determine the MEC platform that the terminal can connect to at the current location.
  • the location of the MEC platform is identified by DNAI, that is, the network access identifier list (DNAI list) of the local network includes the DNAI identifiers of multiple MEC platforms that the terminal can connect to at the current location.
  • the MEC platforms that the terminal can connect to are all deployed with the applications required by the terminal, that is, the applications corresponding to the domain names or application identifiers in the EAS discovery information.
  • the AF determines at least one EAS that satisfies the preset condition according to the discovery request.
  • the AF can store the correspondence between each application identifier (APP ID), the domain name supported by each application, the location of the MEC platform where each application is located, and the application instance information deployed under each MEC platform in the In the UDR, it is shown in the following Table 7.
  • the application instance may also be understood as an application server, and the application instance information includes the IP address corresponding to the application instance of the application, the service scope of the application instance, and load information.
  • AF can select at least one EAS based on FQDN, filter and DNAI list. For example, if the DNAI list includes multiple DNAIs, AF can select EAS based on the rebinding FQDN, filter, and Table 3 above.
  • the AF can also select the target EAS according to the FQDN, filter and DNAI list, and the load of the EAS.
  • the AF sends a discovery response message to the first device, where the discovery response message includes the IP address of the at least one EAS. Accordingly, the first device receives a discovery response message from the AF.
  • the SMF determines the target DNAI according to the IP address of at least one EAS in the discovery response message.
  • the SMF may determine the offload node (ULCL/BP network element) according to the target DNAI.
  • the distribution node is used to distribute data for accessing the central network and accessing the local network.
  • the SMF may send a session accept message to the terminal, and the session accept message carries the IP address of the target EAS. In this way, the terminal can initiate the transmission of service data according to the IP address of the target EAS.
  • the discovery response message further includes a serving area of each EAS in the at least one EAS.
  • the session accept message may also include the service area of the target EAS.
  • the terminal may determine whether to re-initiate the EAS request after the movement occurs. For example, when the terminal initiates the modification process of the PDU session, the discovery request is carried.
  • the SMF can also send a new DNAI list to the terminal in real time.
  • FIG. 13 shows a schematic flowchart of a method for discovering an edge application server EAS according to an embodiment of the present application.
  • FIG. 13 may be combined with any implementation manner of the embodiment shown in FIG. 12 under the condition that there is no logical contradiction.
  • the SMF sends a discovery request to the PCF, where the discovery request is used to request discovery of the EAS, and the discovery request includes a preset condition. Accordingly, the PCF receives the discovery request from the SMF.
  • the discovery request may be initiated by the terminal. That is, the terminal sends it to the SMF, and the SMF forwards it to the PCF.
  • the PCF determines at least one EAS that satisfies a preset condition according to the discovery request.
  • the PCF sends the discovery response message to the SMF, where the discovery response message includes the IP address of the at least one EAS.
  • each device may also be implemented by a component (for example, a chip or a circuit) of a corresponding device.
  • each network element such as a transmitter device or a receiver device
  • each network element includes hardware structures and/or software modules corresponding to performing each function in order to implement the above functions.
  • Those skilled in the art should realize that the present application can be implemented in hardware or a combination of hardware and computer software with the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein. Whether a function is performed by hardware or computer software driving hardware depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each particular application, but such implementations should not be considered beyond the scope of this application.
  • the transmitting-end device or the receiving-end device may be divided into functional modules according to the foregoing method examples.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. middle.
  • the above-mentioned integrated modules can be implemented in the form of hardware, or can be implemented in the form of software function modules.
  • the division of modules in the embodiments of the present application is schematic, and is only a logical function division, and there may be other division manners in actual implementation. The following description will be given by using the division of each function module corresponding to each function as an example.
  • the size of the sequence numbers of the above-mentioned processes does not mean the sequence of execution, and the execution sequence of each process should be determined by its functions and internal logic, and should not be dealt with in the embodiments of the present application. implementation constitutes any limitation.
  • FIG. 14 shows a schematic block diagram of an apparatus 1400 for accessing a local network according to an embodiment of the present application.
  • the apparatus 1400 may correspond to the terminal in the embodiment shown in FIG. 5 , and may have any function of the terminal in the method.
  • the apparatus 1400 includes a processing module 1410 and a transceiver module 1420.
  • the processing module 1410 is configured to acquire a first network access identifier, where the first network access identifier is used to indicate the first local network;
  • the transceiver module 1420 is configured to send a session establishment request to a session management function network element, where the session establishment request is used to request establishment of a first session, the first session is used for the terminal to access the first local network, and the The session establishment request includes the first network access identifier.
  • the transceiver module 1420 is further configured to acquire at least one service and at least one network access identifier corresponding to the at least one service;
  • the at least one service includes a first service
  • the processing module 1410 is specifically configured to: determine, according to the first service, the first network access identifier corresponding to the first service, the at least one The network access identifier includes the first network access identifier.
  • the transceiver module 1420 is specifically used for:
  • the registration accept message including the at least one service and at least one network access identity corresponding to the at least one service;
  • a configuration update command message is received from the access and mobility management function, the configuration update command message includes the at least one service and at least one network access identifier corresponding to the at least one service.
  • the transceiver module 1420 is further configured to acquire at least one network access identifier corresponding to at least one location of the terminal and at least one location; the at least one location of the terminal includes the first location, and the processing module 1410 specifically is used for: determining, according to the first location, the first network access identifier corresponding to the first location, where the at least one network access identifier includes the first network access identifier.
  • the processing module 1410 is further configured to determine the first network access identifier corresponding to the first location and the first service according to the first location and the first service
  • the transceiver module 1420 is further configured to receive at least one network access identifier corresponding to the first location of the terminal from the session management function network element;
  • processing module 1410 is specifically used for:
  • the first network access identity is determined from the at least one network access identity.
  • the processing module 1410 is specifically configured to: select the first network access identifier corresponding to the first service from the at least one network access identifier according to the first service.
  • the transceiver module 1420 is further configured to acquire at least one service and at least one network access identifier corresponding to the at least one service, where the at least one service includes the second service; the processing module 1410 specifically is used for: determining the network access identifier corresponding to the second service according to the second service; controlling the sending and receiving according to the relationship between the network access identifier corresponding to the second service and the first network access identifier Module 1420 sends the second service.
  • processing module 1410 is specifically used for:
  • the transceiver module 1420 If the network access identifier corresponding to the second service is the same as the first network access identifier, control the transceiver module 1420 to send the second service through the first session;
  • control the transceiver module 1420 to send the second service through a third session, and the third session is used for the terminal to access the network. the local network corresponding to the second service.
  • FIG. 15 shows an apparatus 1500 for accessing a local network provided by an embodiment of the present application, and the apparatus 1500 may be the terminal described in FIG. 5 .
  • the device may adopt the hardware architecture shown in FIG. 15 .
  • the apparatus may include a processor 1510 and a transceiver 1520, and optionally, the apparatus may further include a memory 1530, and the processor 1510, the transceiver 1520 and the memory 1530 communicate with each other through an internal connection path.
  • the related functions implemented by the processing module 1410 in FIG. 14 can be implemented by the processor 1510
  • the related functions implemented by the transceiver module 1420 can be implemented by the processor 1510 controlling the transceiver 1520 .
  • the processor 1510 may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), a special-purpose processor, or one or more An integrated circuit for implementing the technical solutions of the embodiments of the present application.
  • a processor may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).
  • it may be a baseband processor, or a central processing unit.
  • the baseband processor can be used to process communication protocols and communication data
  • the central processor can be used to control devices (such as base stations, terminals, or chips, etc.) that access the local network, execute software programs, and process data of software programs. .
  • the processor 1510 may include one or more processors, such as one or more central processing units (CPUs).
  • processors such as one or more central processing units (CPUs).
  • the processor may be a single Core CPU, can also be a multi-core CPU.
  • the transceiver 1520 is used to transmit and receive data and/or signals, and to receive data and/or signals.
  • the transceiver may include a transmitter for transmitting data and/or signals and a receiver for receiving data and/or signals.
  • the memory 1530 includes, but is not limited to, random access memory (RAM), read-only memory (ROM), erasable programmable memory (EPROM), and read-only memory (EPROM).
  • RAM random access memory
  • ROM read-only memory
  • EPROM erasable programmable memory
  • EPROM read-only memory
  • CD-ROM compact disc read-only memory
  • the memory 1530 is used to store program codes and data of the terminal, and may be a separate device or integrated in the processor 1510.
  • the processor 1510 is used to control the transceiver and the terminal to transmit information.
  • the processor 1510 is used to control the transceiver and the terminal to transmit information. For details, refer to the description in the method embodiment, which is not repeated here.
  • the apparatus 1500 may further include an output device and an input device.
  • the output device communicates with the processor 1510 and can display information in a variety of ways.
  • the output device may be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector (projector), etc.
  • the input device communicates with the processor 701 and can receive user input in a variety of ways.
  • the input device may be a mouse, a keyboard, a touch screen device, or a sensor device, or the like.
  • Figure 15 only shows a simplified design of a device for accessing a local network.
  • the device may also include other necessary components, including but not limited to any number of transceivers, processors, controllers, memories, etc., and all terminals that can implement the present application are within the protection scope of the present application within.
  • the apparatus 1500 may be a chip, for example, a communication chip that can be used in a terminal, for implementing the relevant functions of the processor 1510 in the terminal.
  • the chip can be a field programmable gate array, an application-specific integrated chip, a system chip, a central processing unit, a network processor, a digital signal processing circuit, a microcontroller, and a programmable controller or other integrated chips for realizing related functions.
  • the chip may optionally include one or more memories for storing program codes, and when the codes are executed, make the processor implement corresponding functions.
  • An embodiment of the present application further provides an apparatus, and the apparatus may be a terminal or a circuit.
  • the apparatus may be configured to perform the actions performed by the terminal in the foregoing method embodiments.
  • FIG. 16 shows a schematic block diagram of an apparatus 1600 for accessing a local network according to an embodiment of the present application.
  • the apparatus 1600 may correspond to the SMF in the embodiment shown in FIG. 7 , and may have any function of the SMF in the method.
  • the apparatus 1600 includes a transceiver module 1610 and a processing module 1620 .
  • the transceiver module 1610 is configured to send a trigger message to the terminal, where the trigger message is used to trigger the terminal to establish a session;
  • the transceiver module 1610 is further configured to receive a first session establishment request from the terminal, where the first session establishment request is used to request the establishment of a first session, and the first session is used by the terminal to access the local network;
  • the processing module 1620 is configured to determine a target network access identifier according to the first session establishment request, where the target network access identifier is used to indicate a target local network;
  • the processing module 1620 is further configured to determine the target UPF according to the target network access identifier.
  • the first session request includes a session identifier of a second session
  • the second session is used for the terminal to access the central network
  • the transceiver module 1610 is further configured to acquire the session identifier of at least one session and the session identifier associated with all sessions.
  • the processing module 1620 is specifically configured to: according to the second session identifier The session identifier of the session, and the target network access identifier corresponding to the session identifier of the second session is determined.
  • FIG. 17 shows an apparatus 1700 for accessing a local network provided by an embodiment of the present application, and the apparatus 1700 may be the SMF described in FIG. 7 or FIG. 8 .
  • the device may adopt the hardware architecture shown in FIG. 17 .
  • the apparatus may include a processor 1710 and a transceiver 1720, and optionally, the apparatus may further include a memory 1730, and the processor 1710, the transceiver 1720 and the memory 1730 communicate with each other through an internal connection path.
  • the related functions implemented by the processing module 1620 in FIG. 16 can be implemented by the processor 1710, and the related functions implemented by the transceiver module 1610 can be implemented by the processor 1710 controlling the transceiver 1720.
  • the processor 1710 may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), a special-purpose processor, or one or more An integrated circuit for implementing the technical solutions of the embodiments of the present application.
  • a processor may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).
  • it may be a baseband processor, or a central processing unit.
  • the baseband processor can be used to process communication protocols and communication data
  • the central processor can be used to control devices (such as base stations, terminals, or chips, etc.) that access the local network, execute software programs, and process data of software programs. .
  • the processor 1710 may include one or more processors, such as one or more central processing units (CPUs).
  • processors such as one or more central processing units (CPUs).
  • the processor may be a single Core CPU, can also be a multi-core CPU.
  • the transceiver 1720 is used to transmit and receive data and/or signals, and to receive data and/or signals.
  • the transceiver may include a transmitter for transmitting data and/or signals and a receiver for receiving data and/or signals.
  • the memory 1730 includes, but is not limited to, random access memory (RAM), read-only memory (ROM), erasable programmable memory (EPROM), read-only memory (EPROM).
  • RAM random access memory
  • ROM read-only memory
  • EPROM erasable programmable memory
  • EPROM read-only memory
  • CD-ROM compact disc read-only memory
  • the memory 1730 is used to store program codes and data of the terminal, and may be a separate device or integrated in the processor 1710 .
  • the processor 1710 is used to control the transceiver and the terminal to transmit information.
  • the processor 1710 is used to control the transceiver and the terminal to transmit information. For details, refer to the description in the method embodiment, which is not repeated here.
  • the apparatus 1700 may further include an output device and an input device.
  • the output device communicates with the processor 1710 and can display information in a variety of ways.
  • the output device may be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector (projector), etc.
  • the input device communicates with the processor 701 and can receive user input in a variety of ways.
  • the input device may be a mouse, a keyboard, a touch screen device, or a sensor device, or the like.
  • Figure 17 only shows a simplified design of a device for accessing a local network.
  • the device may also include other necessary components, including but not limited to any number of transceivers, processors, controllers, memories, etc., and all terminals that can implement the present application are within the protection scope of the present application within.
  • the device 1700 may be a chip, for example, a communication chip that can be used in a terminal, for implementing the relevant functions of the processor 1710 in the terminal.
  • the chip can be a field programmable gate array, an application-specific integrated chip, a system chip, a central processing unit, a network processor, a digital signal processing circuit, a microcontroller, and a programmable controller or other integrated chips for realizing related functions.
  • the chip may optionally include one or more memories for storing program codes, and when the codes are executed, make the processor implement corresponding functions.
  • An embodiment of the present application further provides a device, and the device may be an SMF or a circuit.
  • the apparatus may be configured to perform the actions performed by the terminal in the foregoing method embodiments.
  • FIG. 18 shows a schematic block diagram of an apparatus 1800 for accessing a local network according to an embodiment of the present application.
  • the apparatus 1800 may correspond to the terminal in the embodiment shown in FIG. 7 or FIG. 8, and may have any function of the terminal in the method.
  • the apparatus 1800 includes a transceiver module 1810 and a processing module 1820.
  • the transceiver module 1810 is configured to receive a trigger message, where the trigger message is used to trigger the terminal to establish a session;
  • the processing module 1820 is configured to send a first message through the transceiver module 1210 according to the trigger message, where the first message is used to request the establishment of a first session, and the first session is used for the terminal to access the local The internet.
  • the processing module 1820 is further configured to select a target session for the target service from the first session and the second session according to the first routing condition and the second routing condition, where the first routing condition corresponds to the a first session, the second routing condition corresponds to the second session;
  • the transceiver module 1810 is further configured to send the target service through the target session.
  • the first message includes a session identifier of a second session
  • the second session is used for the terminal to access the central network
  • the transceiver module 1810 is further configured to acquire the session identifier of at least one session and the session identifier associated with the terminal.
  • the processing module 1820 is specifically configured to: determine, according to the session identifier of the second session, a network access identifier corresponding to the session identifier of the second session the target network access identifier.
  • FIG. 19 shows an apparatus 1900 for accessing a local network provided by an embodiment of the present application, and the apparatus 1900 may be the terminal described in FIG. 5 .
  • the device can adopt the hardware architecture shown in FIG. 19 .
  • the apparatus may include a processor 1910 and a transceiver 1920, and optionally, the apparatus may further include a memory 1930, and the processor 1910, the transceiver 1920 and the memory 1930 communicate with each other through an internal connection path.
  • the related functions implemented by the processing module 1420 in FIG. 14 can be implemented by the processor 1910
  • the related functions implemented by the transceiver module 1410 can be implemented by the processor 1910 controlling the transceiver 1920 .
  • the processor 1910 may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), a special-purpose processor, or one or more An integrated circuit for implementing the technical solutions of the embodiments of the present application.
  • a processor may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).
  • it may be a baseband processor, or a central processing unit.
  • the baseband processor can be used to process communication protocols and communication data
  • the central processor can be used to control devices (such as base stations, terminals, or chips, etc.) that access the local network, execute software programs, and process data of software programs. .
  • the processor 1910 may include one or more processors, such as one or more central processing units (CPUs).
  • processors such as one or more central processing units (CPUs).
  • CPUs central processing units
  • the processor may be a single Core CPU, can also be a multi-core CPU.
  • the transceiver 1920 is used to transmit and receive data and/or signals, and to receive data and/or signals.
  • the transceiver may include a transmitter for transmitting data and/or signals and a receiver for receiving data and/or signals.
  • the memory 1930 includes, but is not limited to, random access memory (RAM), read-only memory (ROM), erasable programmable memory (EPROM), read-only memory (EPROM), and erasable programmable memory (EPROM).
  • RAM random access memory
  • ROM read-only memory
  • EPROM erasable programmable memory
  • EPROM read-only memory
  • EPROM erasable programmable memory
  • EPROM erasable programmable memory
  • EPROM erasable programmable memory
  • EPROM erasable programmable memory
  • EPROM erasable programmable memory
  • EPROM erasable programmable memory
  • EPROM erasable programmable memory
  • EPROM erasable programmable memory
  • EPROM erasable programmable memory
  • EPROM erasable programmable memory
  • CD-ROM compact disc read-only memory
  • the memory 1930 is used to store program codes and data of the terminal, and may be a separate device or integrated in the processor 1910 .
  • the processor 1910 is used to control the transceiver and the terminal to transmit information.
  • the processor 1910 is used to control the transceiver and the terminal to transmit information.
  • the description in the method embodiment which is not repeated here.
  • the apparatus 1900 may further include an output device and an input device.
  • the output device communicates with the processor 1910 and can display information in a variety of ways.
  • the output device may be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector (projector), etc.
  • the input device communicates with the processor 701 and can receive user input in a variety of ways.
  • the input device may be a mouse, a keyboard, a touch screen device, or a sensor device, or the like.
  • Figure 19 only shows a simplified design of a device for accessing a local network.
  • the device may also include other necessary components, including but not limited to any number of transceivers, processors, controllers, memories, etc., and all terminals that can implement the present application are within the protection scope of the present application within.
  • the apparatus 1900 may be a chip, for example, a communication chip that can be used in a terminal, for implementing the relevant functions of the processor 1910 in the terminal.
  • the chip can be a field programmable gate array, an application-specific integrated chip, a system chip, a central processing unit, a network processor, a digital signal processing circuit, a microcontroller, and a programmable controller or other integrated chips for realizing related functions.
  • the chip may optionally include one or more memories for storing program codes, and when the codes are executed, make the processor implement corresponding functions.
  • An embodiment of the present application further provides an apparatus, and the apparatus may be a terminal or a circuit.
  • the apparatus may be configured to perform the actions performed by the terminal in the foregoing method embodiments.
  • FIG. 20 shows a schematic block diagram of an apparatus 2000 for accessing a local network according to an embodiment of the present application.
  • the apparatus 2000 may correspond to the AMF in the embodiment shown in FIG. 5 , and may have any function of the AMF in the method.
  • the apparatus 2000 includes a transceiver module 2010 and a processing module 2020 .
  • the transceiver module 2010 is configured to send a trigger message to the terminal, where the trigger message is used to trigger the terminal to establish a session;
  • the transceiver module 2010 is further configured to receive the first message from the terminal, where the first message is used to request the establishment of a first session, and the first session is used for the terminal to access the target local network;
  • the processing module 2020 is configured to determine, according to the first message, a target network access identifier, where the target network access identifier is used to indicate a target local network;
  • the processing module 2020 is further configured to determine the first SMF according to the target network access identifier
  • the transceiver module 2010 is further configured to send the target network access identifier to the first SMF, where the target network access identifier is used by the first SMF to determine the target UPF.
  • the first message includes a session identifier of a second session, and the second session is used for the terminal to access the central network.
  • the transceiver module 2010 is further configured to receive the mapping relationship from a second SMF, where the second SMF is used by the terminal to establish the second session.
  • FIG. 21 shows an apparatus 2100 for accessing a local network provided by an embodiment of the present application, and the apparatus 2100 may be the AMF described in FIG. 7 .
  • the device may adopt the hardware architecture shown in FIG. 21 .
  • the apparatus may include a processor 2110 and a transceiver 2120, and optionally, the apparatus may further include a memory 2130, and the processor 2110, the transceiver 2120 and the memory 2130 communicate with each other through an internal connection path.
  • the related functions implemented by the processing module 2020 in FIG. 20 can be implemented by the processor 2110, and the related functions implemented by the transceiver module 2010 can be implemented by the processor 2110 controlling the transceiver 2120.
  • the processor 2110 may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), a special-purpose processor, or one or more An integrated circuit for implementing the technical solutions of the embodiments of the present application.
  • a processor may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).
  • it may be a baseband processor, or a central processing unit.
  • the baseband processor can be used to process communication protocols and communication data
  • the central processor can be used to control devices (such as base stations, terminals, or chips, etc.) that access the local network, execute software programs, and process data of software programs. .
  • the processor 2110 may include one or more processors, such as one or more central processing units (central processing units, CPUs).
  • processors such as one or more central processing units (central processing units, CPUs).
  • CPUs central processing units
  • the CPU may be a single Core CPU, can also be a multi-core CPU.
  • the transceiver 2120 is used to transmit and receive data and/or signals, and to receive data and/or signals.
  • the transceiver may include a transmitter for transmitting data and/or signals and a receiver for receiving data and/or signals.
  • the memory 2130 includes, but is not limited to, random access memory (RAM), read-only memory (ROM), erasable programmable memory (EPROM), read-only memory (EPROM).
  • RAM random access memory
  • ROM read-only memory
  • EPROM erasable programmable memory
  • EPROM read-only memory
  • CD-ROM compact disc read-only memory
  • the memory 2130 is used to store program codes and data of the terminal, and may be a separate device or integrated in the processor 2110 .
  • the processor 2110 is used to control the transceiver and the terminal to transmit information.
  • the processor 2110 is used to control the transceiver and the terminal to transmit information. For details, refer to the description in the method embodiment, which is not repeated here.
  • the apparatus 2100 may further include an output device and an input device.
  • the output device communicates with the processor 2110 and can display information in a variety of ways.
  • the output device may be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector (projector), etc.
  • the input device communicates with the processor 701 and can receive user input in a variety of ways.
  • the input device may be a mouse, a keyboard, a touch screen device, or a sensor device, or the like.
  • Figure 21 only shows a simplified design of a device for accessing a local network.
  • the device may also include other necessary components, including but not limited to any number of transceivers, processors, controllers, memories, etc., and all terminals that can implement the present application are within the protection scope of the present application within.
  • the device 2100 may be a chip, for example, a communication chip that can be used in a terminal, for implementing the relevant functions of the processor 2110 in the terminal.
  • the chip can be a field programmable gate array, an application-specific integrated chip, a system chip, a central processing unit, a network processor, a digital signal processing circuit, a microcontroller, and a programmable controller or other integrated chips for realizing related functions.
  • the chip may optionally include one or more memories for storing program codes, and when the codes are executed, make the processor implement corresponding functions.
  • An embodiment of the present application further provides a device, and the device may be an AMF or a circuit.
  • the apparatus may be configured to perform the actions performed by the terminal in the foregoing method embodiments.
  • the above-mentioned embodiments it may be implemented in whole or in part by software, hardware, firmware or any combination thereof.
  • software it can be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on a computer, all or part of the processes or functions described in the embodiments of the present application are generated.
  • the computer may be a general purpose computer, special purpose computer, computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server, or data center Transmission to another website site, computer, server, or data center by wire (eg, coaxial cable, optical fiber, digital subscriber line, DSL) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, a data center, or the like that includes an integration of one or more available media.
  • the available media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, high-density digital video discs (DVDs)), or semiconductor media (eg, solid state disks, SSD)) etc.
  • the processor may be an integrated circuit chip, which has signal processing capability.
  • each step of the above method embodiment may be completed by a hardware integrated logic circuit in a processor or an instruction in the form of software.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), an off-the-shelf programmable gate array (field programmable gate array, FPGA), or other possible solutions. Programming logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • Programming logic devices discrete gate or transistor logic devices, discrete hardware components.
  • a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the steps of the methods disclosed in conjunction with the embodiments of the present application may be directly embodied as executed by a hardware decoding processor, or executed by a combination of hardware and software modules in the decoding processor.
  • the software module may be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other storage media mature in the art.
  • the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware.
  • the memory in this embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically programmable Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory may be random access memory (RAM), which acts as an external cache.
  • RAM random access memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous DRAM
  • SDRAM double data rate synchronous dynamic random access memory
  • double data rate SDRAM double data rate SDRAM
  • DDR SDRAM enhanced synchronous dynamic random access memory
  • ESDRAM enhanced synchronous dynamic random access memory
  • synchronous link dynamic random access memory synchronous link DRAM, SLDRAM
  • direct memory bus random access memory direct rambus RAM, DR RAM
  • At least one means one or more, and “plurality” means two or more.
  • “And/or”, which describes the association relationship of the associated objects, means that there can be three kinds of relationships, for example, A and/or B, it can mean that A exists alone, A and B exist at the same time, and B exists alone, where A, B can be singular or plural.
  • the character "/” generally indicates that the related objects are an “or” relationship.
  • “At least one item(s) below” or similar expressions thereof refer to any combination of these items, including any combination of single item(s) or plural items(s).
  • at least one item (a) of a, b, or c can represent: a, b, c, ab, ac, bc, or abc, where a, b, and c can be single or multiple .
  • a component may be, but is not limited to, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
  • an application running on a computing device and the computing device may be components.
  • One or more components may reside within a process and/or thread of execution, and a component may be localized on one computer and/or distributed between 2 or more computers.
  • these components can execute from various computer readable media having various data structures stored thereon.
  • a component may, for example, be based on a signal having one or more data packets (eg, data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet interacting with other systems via signals) Communicate through local and/or remote processes.
  • data packets eg, data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet interacting with other systems via signals
  • the disclosed system, apparatus and method may be implemented in other manners.
  • the apparatus embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the functions, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium.
  • the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art or the part of the technical solution.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program codes .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供了访问本地网络的方法和装置。终端在获取到用于指示第一本地网络的第一网络接入标识,可以主动向会话管理功能网元发送会话建立请求以请求建立第一会话,该第一会话用于终端访问该第一本地网络,且该会话建立请求包括该第一网络接入标识。也就是说,本申请实施例能够接入本地网络,从而能够满足低时延业务的需求,提高了业务处理的性能。

Description

访问本地网络的方法和装置
本申请要求于2020年7月31日提交中国专利局、申请号为202010759371.3、发明名称为“访问本地网络的方法和装置”的中国专利申请的优先权,以及2021年4月2日提交中国专利局、申请号为202110363865.4、发明名称为“访问本地网络的方法和装置”的中国专利申请的优先权,以及2021年5月10日提交中国专利局、申请号为202110507770.5、发明名称为“访问本地网络的方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信领域,更具体地涉及一种访问本地网络的方法和装置。
背景技术
移动通信的飞速发展促进了各种新型业务的不断涌现,除了传统的移动带宽和物联网之外,移动通信催生了许多新的应用领域,例如,增强现实技术(augmented reality,AR)/虚拟现实(virtual reality,VR)、车联网、工业控制和物联网(internet of things,IOT)等,同时对网络带宽和时延等性能也提出了更高的需求。因此,在5G应用架构之外,为了有效满足移动互联网,物联网高速发展所需的高带宽、低时延的要求,并减轻网络负荷,提出了移动边缘计算(mobile edge computing,MEC)技术。
相对于5G应用架构中的数据网络(data network,DN)而言,MEC架构中的本地(local)DN可以在更靠近终端的边缘区域为用户提供服务。换句话说,通过将业务和业务处理、资源调度功能部署到靠近终端的边缘网络来提供低时延的业务体验。
在引入MEC架构之后,终端如何接入MEC架构中的local DN,以满足低时延业务的需求,亟待解决。
发明内容
本申请提供一种访问本地网络的方法和装置,能够接入local DN,从而能够满足低时延业务的需求,提高业务处理性能。
第一方面,提供了一种访问本地网络的方法,该方法包括:获取第一网络接入标识,所述第一网络接入标识用于指示第一本地网络;向会话管理功能网元发送会话建立请求,所述会话建立请求用于请求建立第一会话,所述第一会话用于终端访问所述第一本地网络,且所述会话建立请求包括所述第一网络接入标识。
终端在获取到用于指示第一本地网络的第一网络接入标识,可以主动向会话管理功能网元发送会话建立请求以请求建立第一会话,该第一会话用于终端访问该第一本地网络,且该会话建立请求包括该第一网络接入标识。也就是说,终端能够实现接入本地网络,从而能够满足低时延业务的需求,提高了业务处理的性能。
在一些可能的实现方式中,所述方法还包括:获取至少一种业务和与所述至少一种业务对应的至少一个网络接入标识;其中,所述至少一种业务包括第一业务,所述获取第一网络接入标识包括:根据所述第一业务,确定与所述第一业务对应的所述第一网络接入标识,所述至少一个网络接入标识包括所述第一网络接入标识。
终端获取到至少一种业务和与所述至少一种业务对应的至少一个网络接入标识之后,可以确定出任意一种业务对应的网络接入标识,从而使得终端能够实现为不同的业务接入本地网络,能够满足低时延业务的需求,提高了业务处理的性能。
在一些可能的实现方式中,所述获取至少一种业务和与所述至少一种业务对应的至少一个网络接入标识包括:接收来自接入和移动性管理功能的注册接受消息,所述注册接受消息包括所述至少一种业务和与所述至少一种业务对应的至少一个网络接入标识;或接收来自接入和移动性管理功能的配置更新命令消息,所述配置更新命令消息包括所述至少一种业务和与所述至少一种业务对应的至少一个网络接入标识。
终端可以通过不同的消息获取到该至少一种业务和与所述至少一种业务对应的至少一个网络接入标识,从而提高了获取到网络接入标识的灵活性。
在一些可能的实现方式中,所述方法还包括:获取所述终端的至少一个位置与至少一个位置对应的至少一个网络接入标识;其中,所述终端的至少一个位置包括第一位置,所述获取第一网络接入标识包括:根据所述第一位置,确定与所述第一位置对应的所述第一网络接入标识,所述至少一个网络接入标识包括所述第一网络接入标识。
终端在不同的位置可以对应不同的网络接入标识。这样,终端在获取到至少一个位置与至少一个位置对应的至少一个网络接入标识之后,可以得到在任意位置对应的网络接入标识,使得终端能够实现为处于不同的位置的终端接入本地网络,从而能够满足低时延业务的需求,提高了业务处理的性能。
在一些可能的实现方式中,该方法还包括:根据所述第一位置和第一业务,确定与所述第一位置和所述第一业务对应的所述第一网络接入标识。
终端可以结合终端所在的位置(即第一位置)和终端发起的第一业务,确定对应于第一位置和第一业务的网络接入标识,使得终端能够实现为处于不同的位置和发起不同业务的终端接入本地网络,从而能够更进一步在满足低时延业务的需求的同时,提高了业务处理的性能。
在一些可能的实现方式中,所述根据所述第一位置和第一业务,确定与所述第一位置和所述第一业务对应的所述第一网络接入标识包括:根据至少一种业务和与所述至少一种业务对应的至少一个网络接入标识、至少一个位置与至少一个位置对应的至少一个网络接入标识、所述第一位置和所述第一业务,确定所述第一网络接入标识。
这样终端可以根据该第一业务确定该第一业务对应的网络接入标识,再根据该第一位置确定该第一位置对应的网络接入标识。之后,终端可以将第一业务对应的网络接入标识和第一位置对应的网络接入标识中相同的网络接入标识作为该第一网络接入标识,使得终端能够实现为处于不同的位置的终端、以及不同的业务接入本地网络,从而能够满足低时延业务的需求,提高了业务处理的性能。
在一些可能的实现方式中,所述方法还包括:接收来自所述会话管理功能网元的所述终端的第一位置对应的至少一个网络接入标识;其中,所述获取第一网络接入标识包括: 从所述至少一个网络接入标识中确定所述第一网络接入标识。
终端可以先获取该终端的第一位置对应的至少一个网络接入标识,再进一步从该至少一个网络接入标识中选择该第一网络接入标识。这样从更小的范围选择该第一网络接入标识,从而更进一步选择合适的网络接入标识,进而更进一步提高业务处理的性能。
在一些可能的实现方式中,所述从所述至少一个网络接入标识中确定所述第一网络接入标识包括:根据第一业务,从所述至少一个网络接入标识中选择与所述第一业务对应的所述第一网络接入标识。
这样从更小的范围选择该第一网络接入标识,从而更进一步为不同的业务选择合适的网络接入标识,进而更进一步提高业务处理的性能。
在一些可能的实现方式中,所述方法还包括:获取至少一种业务和与所述至少一种业务对应的至少一个网络接入标识,所述至少一种业务包括第二业务;根据所述第二业务,确定所述第二业务对应的网络接入标识;根据所述第二业务对应的网络接入标识和所述第一网络接入标识的关系,发送所述第二业务。
终端可以根据第二业务对应的网络接入标识与第一网络接入标识是否相同,来确定发送该第二业务采用的会话,这样有助于终端选择合适的会话,从而提高业务处理效率。
在一些可能的实现方式中,所述根据所述第二业务对应的网络接入标识和所述第一网络接入标识的关系,发送所述目标业务包括:若所述第二业务对应的网络接入标识和所述第一网络接入标识相同,则通过所述第一会话发送所述第二业务;若所述第二业务对应的网络接入标识和所述第一网络接入标识不同,则通过第二会话发送所述第二业务,所述第二会话用于所述终端访问中心网络;或若第二业务对应的网络接入标识和所述第一网络接入标识不同,则通过第三会话发送所述第二业务,所述第三会话用于所述终端访问所述第二业务对应的本地网络。
终端可以在第二业务对应的网络接入标识与第一网络接入标识相同,确定发送该第二业务采用第一会话,从而节省重建会话的信令开销。
第二方面,提供了一种访问本地网络的方法,该方法包括:接收触发消息,所述触发消息用于触发终端建立会话;根据所述触发消息,发送第一消息,所述第一消息用于请求建立第一会话,所述第一会话用于所述终端访问本地网络。
会话管理功能网元可以主动触发终端发起用于访问本地网络的会话建立,从而实现了访问本地网络,进而满足了低时延业务的需求,提高了业务处理的性能。
在一些可能的实现方式中,该第一消息还包括第二会话的会话标识,该第二会话用于该终端访问中心网络。
在一些可能的实现方式中,所述方法还包括:根据第一路由条件和第二路由条件,从第一会话和第二会话中为目标业务选择目标会话,所述第一路由条件对应于所述第一会话,所述第二路由条件对应于第二会话;通过所述目标会话,发送所述目标业务。
该第一路由条件为终端选择第一会话的条件,该第二路由条件为终端选择第二会话的条件。这样终端在启动目标业务时,可以根据该第一路由条件和该第二路由条件确定是选择第一路由,还是选择第二路由。之后,终端通过选中的路由发送该目标业务,从而有助于选择合适的路由发送该目标业务,提高了业务处理效率。
在一些可能的实现方式中,该方法还包括:发送第一信息,该第一信息包括目标业务 的业务标识;接收第二信息,该第二信息包括该目标业务的业务标识对应的目标会话的会话标识;通过该目标会话,发送该目标业务。
第三方面,提供了一种访问本地网络的方法,该方法包括:向终端发送触发消息,所述触发消息用于触发所述终端建立会话;接收来自所述终端的第一会话建立请求,所述第一会话建立请求用于请求建立第一会话,所述第一会话用于终端访问本地网络;根据所述第一会话建立请求,确定目标网络接入标识,所述目标网络接入标识用于指示目标本地网络;根据所述目标网络接入标识,确定目标UPF。
会话管理功能网元可以主动触发终端发起用于访问本地网络的会话建立,从而实现了访问本地网络,进而满足了低时延业务的需求,提高了业务处理的性能。
在一些可能的实现方式中,所述第一会话请求包括第二会话的会话标识,所述第二会话用于所述终端访问中心网络,其中,所述根据所述第一会话建立请求,确定目标网络接入标识包括:根据所述第二会话的会话标识和映射关系,确定所述目标网络接入标识,所述映射关系为至少一个会话的会话标识与至少一个本地网络的网络接入标识的映射关系。
会话管理功能网元根据预设映射关系可以获知第二会话的会话标识对应的目标网络接入标识,使得终端通过该目标网络接入标识访问本地网络,从而满足了低时延业务的需求,提高了业务处理的性能。
在一些可能的实现方式中,该方法还包括:接收第一信息,该第一信息包括目标业务的业务标识;确定该目标业务的业务标识对应的目标会话的会话标识;发送第二信息,该第二信息包括该目标会话的会话标识。
第四方面,提供了一种访问本地网络的方法,该方法包括:向终端发送触发消息,所述触发消息用于触发所述终端建立会话;接收来自所述终端的所述第一消息,所述第一消息用于请求建立第一会话,所述第一会话用于终端访问目标本地网络;根据所述第一消息,确定目标网络接入标识,所述目标网络接入标识用于指示目标本地网络;根据所述目标网络接入标识,确定第一SMF;向所述第一SMF发送所述目标网络接入标识,所述目标网络接入标识用于所述第一SMF确定目标UPF。
在SMF具有有限的服务范围的情况下,会话管理功能网元可以主动触发终端发起用于访问本地网络的会话建立,并接收来终端的第一消息,进而根据该第一消息确定目标网络接入标识,再根据目标网络接入标识确定第一SMF,从而实现第一会话的建立。这样终端能够通过建立的第一会话实现访问本地网络,进而满足了低时延业务的需求,提高了业务处理的性能。
在一些可能的实现方式中,所述第一消息包括第二会话的会话标识,所述第二会话用于所述终端访问中心网络,所述方法还包括:获取至少一个会话的会话标识和与所述至少一个会话的会话标识对应的至少一个本地网络的网络接入标识;其中,所述根据所述第一消息,确定目标网络接入标识包括:根据所述第二会话的会话标识,确定与所述第二会话的会话标识对应的所述目标网络接入标识。
会话管理功能网元根据预设映射关系可以获知第二会话的会话标识对应的目标网络接入标识,使得终端通过该目标网络接入标识访问本地网络,从而满足了低时延业务的需求,提高了业务处理的性能。
在一些可能的实现方式中,该方法还包括:接收来自第二SMF的该映射关系,该第 二SMF用于终端建立该第二会话。
在一些可能的实现方式中,该方法还包括:接收第一请求,该第一请求包括目标网络接入标识;确定该目标网络接入标识对应的目标会话的会话标识;向第一网元发送第一响应,该第一响应包括该目标会话的会话标识,或者向第二网元发送第二信息,该第二信息包括该目标会话的会话标识。
在一些可能的实现方式中,上述第一网元包括SMF,上述第二网元包括终端。
在一些可能的实现方式中,在确定该目标网络接入标识对应的目标会话的会话标识之前,该方法还包括:获取该目标网络接入标识与该目标会话的会话标识的对应关系。
第五方面,提供了一种访问本地网络的方法,该方法包括:接收第一信息,该第一信息包括该目标业务的业务标识;确定该目标业务的业务标识对应的目标网络接入标识;发送第三信息,该第三信息包括该目标网络接入标识。
第六方面,提供了一种访问本地网络的方法,该方法包括:接收第一信息,该第一信息包括该目标业务的业务标识;确定该目标业务的业务标识对应的目标会话的会话标识;发送第二信息,该第二信息包括该目标会话的会话标识。
在一些可能的实现方式中,该方法还包括:获取第一对应关系,该第一对应关系包括该目标业务对应的目标网络接入标识与该目标会话的会话标识标识的对应关系;以及确定该目标业务的业务标识对应的目标会话的会话标识包括:根据该第一对应关系该目标业务的业务标识对应的目标会话的会话标识。
在一些可能的实现方式中,确定该目标业务的业务标识对应的目标会话的会话标识包括:确定该目标业务的业务标识对应的目标网络接入标识;发送第一请求,该第一请求用于请求该目标网络接入标识对应的该目标会话的会话标识;接收第一响应,该第一响应包括该目标会话的会话标识。
第七方面,提供了一种发现边缘应用服务器EAS的方法,该方法包括:接收来自第一设备的发现请求,所述发现请求用于请求发现EAS,且所述发现请求包括预设条件,所述第一设备为会话管理功能网元或终端;根据所述发现请求,确定满足所述预设条件的至少一个EAS;向所述第一设备发送发现响应消息,所述发现响应消息包括所述至少一个EAS的互联网协议IP地址。
AF接收包括预设条件的发现请求,并根据该发现请求确定满足预设条件的至少一个EAS,进而向AF反馈包括该至少一个EAS的IP地址的发现响应消息,这样避免了发现不符合需求的EAS,从而提高了发现EAS的有效性。
在一些可能的实现方式中,所述发现请求还包括应用标识、本地网络的网络接入标识列表和EAS需求中的至少一项。
在一些可能的实现方式中,所述响应消息还包括服务区域,所述服务区域用于终端确定是否重新发起发现请求。
终端根据该服务区域,可以在发生移动之后,确定是否需要重新发起EAS请求,从而提高了服务EAS的服务质量。
第八方面,提供了一种发现边缘应用服务器EAS的方法,该方法包括:发送发现请求,所述发现请求用于请求发现边缘应用服务器EAS,且所述发现请求包括预设条件;接收发现响应消息,所述发现响应消息包括满足所述预设条件的至少一个EAS的互联网协 议IP地址。
第一设备向AF发送包括预设条件的发现请求,使得AF根据该发现请求确定满足预设条件的至少一个EAS,进而向AF反馈包括该至少一个EAS的IP地址的发现响应消息,这样避免了发现不符合需求的EAS,从而提高了发现EAS的有效性。
在一些可能的实现方式中,所述发现请求还包括应用标识、本地网络的网络接入标识列表和EAS需求中的至少一项。
在一些可能的实现方式中,所述方法还包括:接收来自AMF的参数信息,所述参数信息用于指示终端的第一位置和所述终端请求的所述应用标识;根据所述参数信息和网络拓扑,确定所述终端在所述第一位置能够连接的本地网络的网络接入标识列表。
在一些可能的实现方式中,所述方法还包括:根据所述至少一个EAS的IP地址,确定目标DNAI;根据所述目标DNAI,确定分流节点,所述分流节点用于分流访问中心网络和访问本地网络的数据。
在一些可能的实现方式中,所述响应消息还包括服务区域,所述服务区域用于终端确定是否重新发起发现请求。
终端根据该服务区域,可以在发生移动之后,确定是否需要重新发起EAS请求,从而提高了服务EAS的服务质量。
第九方面,提供了一种访问本地网络的装置,该装置可以是终端,也可以是终端内的芯片。该装置具有实现上述第一方面,及各种可能的实现方式的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
在一种可能的设计中,该装置包括:收发模块和处理模块,所述收发模块例如可以是收发器、接收器、发射器中的至少一种,该收发模块可以包括接收模块和发送模块。收发模块可以包括射频电路或天线。该处理模块可以是处理器。可选地,所述装置还包括存储模块,该存储模块例如可以是存储器。当包括存储模块时,该存储模块用于存储指令。该处理模块与该存储模块连接,该处理模块可以执行该存储模块存储的指令或源自其他的指令,以使该装置执行上述第一方面,及各种可能的实现方式的通信方法。在本设计中,该装置可以为终端。
在另一种可能的设计中,当该装置为芯片时,该芯片包括:收发模块和处理模块,该收发模块可以包括接收模块和发送模块。该收发模块例如可以是该芯片上的输入/输出接口、管脚或电路等。处理模块例如可以是处理器。该处理模块可执行指令,以使该终端内的芯片执行上述第一方面,以及任意可能的实现的通信方法。可选地,该处理模块可以执行存储模块中的指令,该存储模块可以为芯片内的存储模块,如寄存器、缓存等。该存储模块还可以是位于通信设备内,但位于芯片外部,如只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)等。
其中,上述任一处提到的处理器,可以是一个通用中央处理器(CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制上述各方面通信方法的程序执行的集成电路。
第十方面,提供了一种访问本地网络的装置,该装置可以是SMF,也可以是SMF内 的芯片。该装置具有实现上述第二方面,及各种可能的实现方式的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
在一种可能的设计中,该装置包括:收发模块和处理模块,该收发模块可以包括接收模块和发送模块。该收发模块例如可以是收发器、接收器、发射器中的至少一种,该收发模块可以包括射频电路或天线。该处理模块可以是处理器。
可选地,所述装置还包括存储模块,该存储模块例如可以是存储器。当包括存储模块时,该存储模块用于存储指令。该处理模块与该存储模块连接,该处理模块可以执行该存储模块存储的指令或源自其他的指令,以使该装置执行上述第二方面,或其任意一项的方法。
在另一种可能的设计中,当该装置为芯片时,该芯片包括:收发模块和处理模块,该收发模块可以包括接收模块和发送模块。该收发模块例如可以是该芯片上的输入/输出接口、管脚或电路等。处理模块例如可以是处理器。该处理模块可执行指令,以使该SMF内的芯片执行上述第二方面,以及任意可能的实现的通信方法。
可选地,该处理模块可以执行存储模块中的指令,该存储模块可以为芯片内的存储模块,如寄存器、缓存等。该存储模块还可以是位于通信设备内,但位于芯片外部,如只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)等。
其中,上述任一处提到的处理器,可以是一个通用中央处理器(CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制上述各方面通信方法的程序执行的集成电路。
第十一方面,提供了一种访问本地网络的装置,该装置可以是SMF,也可以是SMF内的芯片。该装置具有实现上述第二方面、第三方面或第四方面,及各种可能的实现方式的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
在一种可能的设计中,该装置包括:收发模块和处理模块,该收发模块可以包括接收模块和发送模块。该收发模块例如可以是收发器、接收器、发射器中的至少一种,该收发模块可以包括射频电路或天线。该处理模块可以是处理器。
可选地,所述装置还包括存储模块,该存储模块例如可以是存储器。当包括存储模块时,该存储模块用于存储指令。该处理模块与该存储模块连接,该处理模块可以执行该存储模块存储的指令或源自其他的指令,以使该装置执行上述第二方面、第三方面或第四方面,或其任意一项的方法。
在另一种可能的设计中,当该装置为芯片时,该芯片包括:收发模块和处理模块,该收发模块可以包括接收模块和发送模块。该收发模块例如可以是该芯片上的输入/输出接口、管脚或电路等。处理模块例如可以是处理器。该处理模块可执行指令,以使该SMF内的芯片执行上述第二方面、第三方面或第四方面,以及任意可能的实现的通信方法。
可选地,该处理模块可以执行存储模块中的指令,该存储模块可以为芯片内的存储模块,如寄存器、缓存等。该存储模块还可以是位于通信设备内,但位于芯片外部,如只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备, 随机存取存储器(random access memory,RAM)等。
其中,上述任一处提到的处理器,可以是一个通用中央处理器(CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制上述第二方面、第三方面或第四方面的方法的程序执行的集成电路。
第十二方面,提供了一种访问本地网络的装置,该装置可以是AF,也可以是AF内的芯片。该装置具有实现上述第五方面,及各种可能的实现方式的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
在一种可能的设计中,该装置包括:收发模块和处理模块,该收发模块可以包括接收模块和发送模块。该收发模块例如可以是收发器、接收器、发射器中的至少一种,该收发模块可以包括射频电路或天线。该处理模块可以是处理器。
可选地,所述装置还包括存储模块,该存储模块例如可以是存储器。当包括存储模块时,该存储模块用于存储指令。该处理模块与该存储模块连接,该处理模块可以执行该存储模块存储的指令或源自其他的指令,以使该装置执行上述第五方面,或其任意一项的方法。
在另一种可能的设计中,当该装置为芯片时,该芯片包括:收发模块和处理模块,该收发模块可以包括接收模块和发送模块。该收发模块例如可以是该芯片上的输入/输出接口、管脚或电路等。处理模块例如可以是处理器。该处理模块可执行指令,以使该AF内的芯片执行上述第五方面,以及任意可能的实现的通信方法。
可选地,该处理模块可以执行存储模块中的指令,该存储模块可以为芯片内的存储模块,如寄存器、缓存等。该存储模块还可以是位于通信设备内,但位于芯片外部,如只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)等。
其中,上述任一处提到的处理器,可以是一个通用中央处理器(CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制上述第五方面的方法的程序执行的集成电路。
第十三方面,提供了一种访问本地网络的装置,该装置可以是终端或SMF,也可以是终端或SMF内的芯片。该装置具有实现上述第六方面,及各种可能的实现方式的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
在一种可能的设计中,该装置包括:收发模块和处理模块,该收发模块可以包括接收模块和发送模块。该收发模块例如可以是收发器、接收器、发射器中的至少一种,该收发模块可以包括射频电路或天线。该处理模块可以是处理器。
可选地,所述装置还包括存储模块,该存储模块例如可以是存储器。当包括存储模块时,该存储模块用于存储指令。该处理模块与该存储模块连接,该处理模块可以执行该存储模块存储的指令或源自其他的指令,以使该装置执行上述第六方面,或其任意一项的方法。
在另一种可能的设计中,当该装置为芯片时,该芯片包括:收发模块和处理模块,该收发模块可以包括接收模块和发送模块。该收发模块例如可以是该芯片上的输入/输出接 口、管脚或电路等。处理模块例如可以是处理器。该处理模块可执行指令,以使该终端或SMF内的芯片执行上述第六方面,以及任意可能的实现的通信方法。
可选地,该处理模块可以执行存储模块中的指令,该存储模块可以为芯片内的存储模块,如寄存器、缓存等。该存储模块还可以是位于通信设备内,但位于芯片外部,如只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)等。
其中,上述任一处提到的处理器,可以是一个通用中央处理器(CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制上述第六方面的方法的程序执行的集成电路。
第十四方面,提供了一种计算机存储介质,该计算机存储介质中存储有程序代码,该程序代码用于指示执行上述第一方面至第六方面中任一项,及其任意可能的实现方式中的方法的指令。
第十五方面,提供了一种包含指令的计算机程序产品,其在计算机上运行时,使得计算机执行上述第一方面至第六方面中任一项,或其任意可能的实现方式中的方法。
第十六方面,提供了一种通信系统,该通信系统包括具有实现上述第一方面的各方法及各种可能设计的功能的装置和会话管理功能网元。
第十七方面,提供了一种通信系统,该通信系统包括具有实现上述第二方面的各方法及各种可能设计的功能的装置和上述具有实现上述第四方面的各方法及各种可能设计的功能的装置。
第十八方面,提供了一种通信系统,该通信系统包括终端和上述具有实现上述第三方面的各方法及各种可能设计的功能的装置。
第十九方面,提供了一种通信系统,该通信系统包括具有实现上述第五方面的各方法及各种可能设计的功能的装置和上述具有实现上述第六方面的各方法及各种可能设计的功能的装置。
基于上述技术方案,终端在获取到用于指示第一本地网络的第一网络接入标识,可以主动向会话管理功能网元发送会话建立请求以请求建立第一会话,该第一会话用于终端访问该第一本地网络,且该会话建立请求包括该第一网络接入标识。也就是说,本申请实施例能够接入本地网络,从而能够满足低时延业务的需求,提高了业务处理的性能。
附图说明
图1是本申请实施例的一种可能的网络架构的示意图;
图2是本申请实施例的另一种可能的应用架构的示意图;
图3是5G应用架构与MEC架构的对比示意图;
图4是本申请实施例的业务处理模型的示意图;
图5是本申请一个实施例的访问本地网络的方法的示意性流程图;
图6是本申请另一个实施例的访问本地网络的方法的示意性流程图;
图7是本申请再一个实施例的访问本地网络的方法的示意性流程图;
图8是本申请又一个实施例的访问本地网络的方法的示意性流程图;
图9是本申请又一个实施例的访问本地网络的方法的示意性流程图;
图10是本申请又一个实施例的访问本地网络的方法的示意性流程图;
图11是本申请又一个实施例的访问本地网络的方法的示意性流程图;
图12是本申请一个实施例的发现边缘应用服务器EAS的方法的示意性流程图;
图13是本申请另一个实施例的发现边缘应用服务器EAS的方法的示意性流程图;
图14是本申请一个实施例的访问本地网络的装置的示意性框图;
图15是本申请一个实施例的访问本地网络的装置的示意性结构图;
图16是本申请另一个实施例的访问本地网络的装置的示意性框图;
图17是本申请另一个实施例的访问本地网络的装置的示意性结构图;
图18是本申请又一个实施例的访问本地网络的装置的示意性框图;
图19是本申请又一个实施例的访问本地网络的装置的示意性结构图;
图20是本申请又一个实施例的访问本地网络的装置的示意性框图;
图21是本申请又一个实施例的访问本地网络的装置的示意性结构图。
具体实施方式
下面将结合附图,对本申请中的技术方案进行描述。
本申请实施例中的终端可以指一种具有无线收发功能的设备,可以称为终端(terminal)、用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端设备(mobile terminal,MT)、车载终端、远方站、远程终端等。终端具体的形态可以是手机(mobile phone)、蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、可穿戴设备平板电脑(pad)、台式机、笔记本电脑、一体机、车载终端、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)等。终端可以应用于如下场景:虚拟现实(virtual reality,VR)、增强现实(augmented reality,AR)、工业控制(industrial control)、无人驾驶(self driving)、远程手术(remote medical surgery)、智能电网(smart grid)、运输安全(transportation safety)、智慧城市(smart city)、智慧家庭(smart home)等。终端可以是固定的或者移动的。需要说明的是,终端可以支持至少一种无线通信技术,例如LTE、NR、宽带码分多址(wideband code division multiple access,WCDMA)等。
在本申请实施例中,终端包括硬件层、运行在硬件层之上的操作系统层,以及运行在操作系统层上的应用层。该硬件层包括中央处理器(central processing unit,CPU)、内存管理单元(memory management unit,MMU)和内存(也称为主存)等硬件。该操作系统可以是任意一种或多种通过进程(process)实现业务处理的计算机操作系统,例如,Linux操作系统、Unix操作系统、Android操作系统、iOS操作系统或windows操作系统等。该应用层包含浏览器、通讯录、文字处理软件、即时通信软件等应用。并且,本申请实施例并未对本申请实施例提供的方法的执行主体的具体结构特别限定,只要能够通过运行记录有本申请实施例的提供的方法的代码的程序,以根据本申请实施例提供的方法进行通信即可,例如,本申请实施例提供的方法的执行主体可以是终端或接入网设备,或者,是终端或接入网设备中能够调用程序并执行程序的功能模块。
另外,本申请的各个方面或特征可以实现成方法、装置或使用标准编程和/或工程技术的制品。例如,计算机可读介质可以包括,但不限于:磁存储器件(例如,硬盘、软盘 或磁带等),光盘(例如,压缩盘(compact disc,CD)、数字通用盘(digital versatile disc,DVD)等),智能卡和闪存器件(例如,可擦写可编程只读存储器(erasable programmable read-only memory,EPROM)、卡、棒或钥匙驱动器等)。另外,本文描述的各种存储介质可代表用于存储信息的一个或多个设备和/或其它机器可读介质。术语“机器可读介质”可包括但不限于,无线信道和能够存储、包含和/或承载指令和/或数据的各种其它介质。
可以理解的是,接入网设备和终端可以部署在陆地上,包括室内或室外、手持或车载;也可以部署在水面上;还可以部署在空中的飞机、气球和卫星上。本申请的实施例对无线接入网设备和终端的应用场景不做限定。
图1是本申请实施例的一种可能的网络架构的示意图。以5G网络架构为例,该网络架构包括:终端101、(无线)接入网设备(radio access network,(R)AN)102、用户面功能(user plane function,UPF)网元103、DN网元104、认证服务器功能(authentication server function,AUSF)网元105、AMF网元106、会话管理功能(session management function,SMF)网元107、网络开放功能(network exposure function,NEF)网元108、网络功能库功能(network repository function,NRF)网元109、策略控制功能模块(policy control function,PCF)网元110、统一数据管理(unified data management,UDM)网元111、网络数据分析功能实体(network data analytics function,NWDAF)网元112和应用功能实体(application function,AF)网元113。下述将UPF网元103、DN网元104、AUSF网元105、AMF网元106、SMF网元107、NEF网元108、NRF网元109、策略控制功能(policy control function,PCF)网元110、UDM网元111、NSSF网元112简称为UPF103、DN104、AUSF105、AMF106、SMF107、NEF108、NRF109、PCF110、UDM111、NWDAF112、AF113。
其中,终端101,主要通过无线空口接入5G网络并获得服务,终端通过空口和RAN进行交互,通过非接入层信令(non-access stratum,NAS)和核心网的AMF进行交互。
RAN102负责终端接入网络的空口资源调度和空口的连接管理。
UPF103负责终端中用户数据的转发和接收。例如,UPF可以从数据网络接收用户数据,并通过接入网设备传输给终端,还可以通过接入网设备从终端接收用户数据,转发到数据网络。UPF103中为终端提供服务的传输资源和调度功能由SMF网元管理控制的。
DN104可以是因特网,也可以是企业专网。例如,运营商服务,互联网接入或者第三方服务。
AUSF105属于核心网控制面网元,主要负责对用户的鉴权、授权以保证用户是合法用户。
AMF106属于核心网网元,主要负责信令处理部分,例如:接入控制、移动性管理、附着与去附着以及网关选择等功能,且AMF106还可以在为终端中的会话提供服务的情况下,会为该会话提供控制面的存储资源,以存储会话标识、与会话标识关联的SMF网元标识等。
SMF107负责用户面网元选择,用户面网元重定向,因特网协议(internet protocol,IP)地址分配,承载的建立、修改和释放以及服务质量(quality of service,QoS)控制。
NEF108属于核心网控制面网元,用于负责移动网络能力的对外开放。
NRF109属于核心网控制面网元,用于负责网络功能的服务能力的动态注册以及网络 功能发现。
PCF110主要支持提供统一的策略框架来控制网络行为,提供策略规则给控制层网络功能,同时负责获取与策略决策相关的用户签约信息。
UDM111属于核心网控制面网元,归属用户服务器,可以用于统一数据管理,支持3GPP认证、用户身份操作、权限授予、注册和移动性管理等功能。
NWDAF112用于网络数据分析功能实体,提供基于大数据和人工智能等技术的网络数据采集和分析功能。
AF 113用于与3GPP核心网交互来提供服务,来影响业务流路由、接入网能力开放和策略控制等。
可以理解的是,在该网络架构中,Nausf为AUSF105展现的基于服务的接口,Namf为AMF106展现的基于服务的接口,Nsmf为SMF107展现的基于服务的接口,Nnef为NEF108展现的基于服务的接口,Nnrf为NRF109展现的基于服务的接口,Npcf为PCF110展现的基于服务的接口,Nudm为UDM111展现的基于服务的接口,Nnwdaf为NWDAF112展现的基于服务的接口,Naf为AF113展现的基于服务的接口。N1为UE101和AMF106之间的参考点,N2为(R)AN102和AMF106的参考点,用于非接入层(non-access stratum,NAS)消息的发送等;N3为(R)AN102和UPF103之间的参考点,用于传输用户面的数据等;N4为SMF107和UPF103之间的参考点,用于传输例如N3连接的隧道标识信息,数据缓存指示信息,以及下行数据通知消息等信息;N6接口为UPF103和DN104之间的参考点,用于传输用户面的数据等。
图2示出了本申请实施例的另一种可能的应用架构(移动边缘计算(mobile edge computing,MEC)架构)的示意图。如图2所示,该应用架构包括终端210、边缘数据网络(edge data network,EDN)220和边缘配置服务器(edge configuration server,ECS)230。其中,EDN220包括边缘应用221和边缘使能服务器(edge enabler server,EES)222。终端包括应用客户端(application client)211和边缘使能客户端(edge enabler client,EEC)212。
EDN 220:
一种通用理解为,EDN对应一个数据网络,是一个特别的本地数据网络(local DN),包含边缘使能功能,可以使用数据网络接入标识符(DN access identifier,DNAI)和数据网络名称(data network name,DNN)标识,是网络逻辑概念。另一种对于EDN的理解,是EDN是中心云的对等概念,可以理解为是一个本地的数据中心(即地理位置概念),可以使用DNAI来标识,且可以包含多个本地数据网络(local DN)。
边缘应用221:
边缘应用为部署在边缘数据网络中的应用。该边缘应用还可以称为“应用实例”。具体是指一个服务器应用程序(例如,社交媒体软件、增强现实(augmented reality,AR)、虚拟现实(virtual reality,VR))部署运行在EDN的实例(instance)。一个应用可在一个或多个EDN中部署一个或多个EAS,部署运行在不同的EDN中的EAS可以认为是一个应用的不同的EAS,它们可以共享一个域名,也可以与部署在云上的应用使用不同的域名,其中域名可以是全限定域名(fully qualified domain name,FQDN)。
可以理解的是,EAS也可以称为边缘应用(服务器)、应用实例、边缘应用实例、移 动边缘计算(mobile edge computing,MEC)应用(服务器)、EAS功能等。
应用客户端211:
应用客户端是边缘应用在UE侧的对等实体。应用客户端用于应用用户(user)从应用服务器获取应用业务。应用客户端是应用在终端侧的客户端程序,应用客户端可以连接到云上的应用服务器获取应用业务,也可以连接到部署运行在一个或多个EDN中的EAS以获取应用业务。
EES 222:
EES部署在EDN中,并可以为部署在EDN中的应用实例提供一些使能能力,可以更好的支持应用在MEC的部署情况,也可以支持边缘应用的注册、对UE的认证和鉴权,为UE提供应用实例的IP地址信息等,还可以进一步支持获取应用实例的标识和IP地址信息,并进一步将应用实例的标识和IP地址信息发送给边缘数据网络配置服务器。一般情况下,EAS注册到一个EES上,或者,通过管理系统将一个EAS的信息配置在一个EES上,该EES称为该EAS关联的EES,EES控制/管理注册/配置在该EES上的EAS。
可以理解的是,上述应用实例的标识可以包括FQDN。
EEC 212:
EEC是EES在UE侧的对等实体。EEC用于向EES注册EEC的信息及应用客户端的信息、执行安全认证和鉴权、从EES获取EAS的IP地址、向应用客户端提供边缘计算使能能力,如EAS发现服务器将EAS的IP地址返回给应用客户端。EEC可是实现在应用客户端(application client,AC)内部的一个子功能模块,或者是集成在操作系统中的模块,或者是一个独立的应用程序。
ECS 230:
ECS负责EDN的配置,如向UE提供EES的信息。ECS还可以直接向UE提供应用实例的信息,以及和应用的域名服务器(domain name server,DNS)交互获取应用实例的信息。还可以进一步从其他功能实体获取并保存应用实例和IP地址的信息。
图3示出了5G应用架构与MEC架构的对比示意图。相对于5G应用架构中的DN网络而言,MEC架构中的local DN可以在更靠近终端的边缘区域为用户提供服务。换句话说,通过将业务和业务处理、资源调度功能部署到靠近终端的边缘网络来提供低时延的业务体验。例如,如图3中,MEC部署在下沉的UPF(即本地UPF)处,DN网络部署在远端(remote)UPF处。与UE访问DN的路径相比,UE访问MEC平台的路径大大缩短。也就是说,MEC技术可以为用户提供低时延的服务。
图4示出了本申请实施例的业务处理模型的示意图。业务处理可以通过图4所示的3种连接模型进行。
连接模型1:
分布式锚点。业务分布式部署在边缘区域,通过位于边缘区域的锚点(PDU session anchor,PSA)访问业务。当UE发生移动时,可以通过更换锚点实现路径优化。例如,UE建立SSCmode为SSCmode2或SSC mode3的会话,当路径不优时,通过新建会话以更换锚点,实现路径的优化。
连接模型2:
分流。业务既部署在边缘区域,也部署在中心区域。通过分流的方式,即插入本地锚 点,将业务分流到边缘区域,实现边缘业务的访问。
可以理解的是,分流点,具体可以是上行分类器(uplink classifier,ULCL)或分支点(branching point,BP)。
连接模型3:
多会话。业务既部署在边缘区域,也部署在中心区域。通过多会话的方式,即建立访问边缘业务的会话,实现边缘业务的访问。
下面将本申请涉及到的术语进行简单描述。
1、会话:
在5G网络中,终端可以通过创建协议数据单元(protocol data units,PDU)会话来访问数据网络。例如,终端可以创建多个PDU会话来访问不同的数据网络。其中,会话类型可以包括IPv4,IPv6,IPv4IPv6,以太网(ethernet),或非结构(unstructured)等类型。
会话连续性模式可以包括会话和服务连续性(session and service continuity,SSC)模式(mode)1、SSC mode2或SSC mode3等。其中,SSC mode1可以是网络保持提供给终端的业务的连续性,SSC mode2可以是网络释放到终端的业务连接和对应的PDU会话,SSC mode3可以是在原连接终止之前,建立新的PDU会话连接。
2、UE路由选择策略(UE route selection policy,URSP):
URSP可以包括应用标识(app ID)与应用需求的对应关系。其中,应用可以是车联网应用,也可以是物联网应用,不进行限定。应用标识也可以用IP五元组、IP三元组等表示。此外,对应关系中的应用需求可以是终端设备的签约应用需求。应用需求可以是DNN、S-NSSAI、SSC mode等。
终端可以根据URSP确定应用数据流的路由路径,例如,确定路由到哪个PDU会话。当PDU会话的会话属性与应用的应用需求一致时,终端可以采用该PDU会话传输该应用的数据;当PDU会话的会话属性与应用的应用需求不一致时,终端可以发起新的PDU会话,以建立满足应用的应用需求的PDU会话。
具体地,URSP可以预置在终端,也可以由PCF通过AMF发送给终端。终端可以优先选择网络设备下发的URSP。
3、域名查询:
在上网过程中,首先终端需要确定待访问业务的域名对应的IP地址,以便发送待访问业务的数据包。这项操作需要终端通过查询域名系统(domain name system,DNS)服务器(server)才能完成。其中,DNS是一种主机信息数据库,提供域名和互联网协议地址之间的映射和转换。例如,UE可以通过DNS server将域名解析为对应的IP地址,从而实现UE对业务的访问。域名和IP地址的对应关系,可以称为DNS记录、或资源记录。
a、终端启动应用(application,APP),并发起会话建立流程或重用UE现有会话,以建立终端与UPF之间的用户面连接。此外,在会话建立过程中,SMF可以将DNS服务器地址发送至终端。
可以理解的是,不同的应用对应不同的业务。其中,本申请实施例的应用可以是QQ、微信、飞信、手机证券、手机浏览或文件下载,本申请对此不进行限定。
b、针对该APP,终端判断是否有该APP对应的域名的相关DNS记录。
例如,若终端存储该APP的DNS记录,则根据该DNS记录,终端可以确定该域名 对应的IP地址,并使用该IP地址作为该业务的目的IP。
若终端没有存储该APP的DNS记录,则终端可以发起DNS查询过程。终端向DNS服务器发送DNS请求(query)消息,该DNS query消息携带该业务的域名。
可以理解的是,该DNS query消息可以是UE通过与UPF之间的用户面连接发送至DNS服务器。
c、DNS服务器接收到DNS query消息,并查询数据库,得到该域名对应的IP地址,并向终端返回DNS响应消息,携带域名对应的IP地址、存留时间(time to live,TTL)。
可以理解的是,TTL表示DNS记录可以缓存的时间。例如,该留存时间通过4个字节表示,其中取值为“0”表示DNS记录不能被缓存。
在引入MEC架构之后,终端如何接入MEC架构中的local DN,以满足低时延业务的需求,亟待解决。
图5示出了本申请实施例的访问本地网络的方法的示意性流程图。
501,终端获取第一网络接入标识,所述第一网络接入标识用于指示第一本地网络。
具体地,系统中可以包括一个或多个本地网络,不同的本地网络通过不同的网络接入标识(DN access identifier,DNAI)进行标识。其中,本地网络可以是图3所示的MEC架构中的local DN。
可以理解的是,终端可以是主动获取该第一网络接入标识,也可以是被动接收该第一网络接入标识。例如,该主动获取可以是终端先向其他设备发送请求以请求获得该第一网络接入标识,进而在接收到该请求的响应消息中获得该第一网络接入标识。被动接收可以是终端直接接收到其他设备周期性的或者临时发送的第一网络接入标识。
还可以理解的是,终端在执行步骤501之前,终端上可以存在会话连接,也可以不存在会话连接。例如,终端在执行步骤501之前的会话连接可以是第二会话,该第二会话可以用于终端访问中心网络。需要说明的是,本申请假设访问中心网络的第二会话与访问本地网络的第一会话,会话属性是相同的。其中,会话属性可以是SSC mode、DNN、S-NSSAI等。例如,如图3所示,第一会话为从UE、RAN、UPF依次到MEC之间的会话连接,第二会话为从UE、RAN、UPF依次到DN之间的会话连接。此外,本申请实施例中的访问中心网络可以理解为业务需要通过中心网络进行处理,而访问本地网络可以理解为业务需要通过MEC进行处理。
还可以理解的是,本申请实施例中的会话连接可以是用户面连接,也可以是控制面连接,或者还可以是用户面连接和控制面连接,本申请对此不进行限定。
在一个实施例中,在步骤501之前,终端可以先获取第一映射关系,该第一映射关系为至少一种业务和至少一个网络接入标识的映射关系。这样,步骤501具体可以是终端根据该第一映射关系和第一业务,确定该第一业务对应的第一网络接入标识。
具体地,终端获取到该第一映射关系之后,可以根据该第一映射关系确定出任意一种业务对应的网络接入标识。例如,根据该第一映射关系和第一业务可以确定出该第一业务对应的网络接入标识。本申请实施例中,终端可以将该第一业务对应的网络接入标识作为该第一网络接入标识。
可以理解的是,至少一种业务与至少一个网络接入标识对应可以是一种业务对应一个或网络接入标识,也可以是一种业务对应多个网络接入标识,或者还可以是多种业务对应 一个网络接入标识,本申请对此不进行限定。
还可以理解的是,终端可以直接获取到至少一种业务和与该至少一种业务对应的至少一个网络接入标识。为方便描述,下述实施例以终端获取到第一映射关系为例进行说明,但本申请并不限于此。
例如,该至少一种业务和至少一个网络接入标识的映射关系可以如下表1所示。具体地,若终端访问业务1,则业务1对应的DNAI list={DNAI1,DNAI3},即DNAI list对应的网络为能够为终端提供业务1服务。其中业务1还可以写成EAS1。
表1第一映射关系形式1
业务1 DNAI 1,DNAI3
业务2 DNAI 2,DNAI3,DNAI4
可以理解的是,第一映射关系还可以以表2的形式体现。具体的,DNAI1对应的网络能够提供业务1、业务2、业务3;DNAI2对应的网络能够提供业务4、业务5;DNAI3对应的网络能够提供业务4、业务6;DNAI4对应的网络能够提供业务7、业务8。
表2第一映射关系形式2
DNAI1 EAS1,EAS2,EAS3
DNAI2 EAS4,EAS5
DNAI3 EAS4,EAS6
DNAI4 EAS7,EAS8
可以理解的是,一种业务对应的网络接入标识可以是一个,也可以是多个,本申请对此不进行限定。在该第一映射关系中,若第一业务对应的网络接入标识为多个的情况下,则第一网络接入标识可以是该第一业务对应的多个网络接入标识中的任意一个。
还可以理解是,终端可以在启动一个应用(APP)(即第一业务)时,才去确定该第一业务对应的网络接入标识。
可选地,终端获取该第一映射关系可以从接入和移动性管理功能的注册接受消息中获得的。例如,终端接收来自该接入和移动性管理功能的注册接受消息,该注册接受消息包括该第一映射关系。
可选地,终端获取该第一映射关系可以是从接入和移动性管理功能的配置更新命令消息中获得的。例如,终端接收来自该接入和移动性管理功能的配置更新命令消息,该配置更新命令消息包括该第一映射关系。
具体地,该配置更新命令消息可以是在注册流程之后的终端配置更新流程中,由移动性管理功能发送给终端的。例如,该配置更新命令消息为UE配置更新(UE configuration update,UCU)消息。
可选地,该第一映射关系还可以是终端自己配置的,即终端本地配置第一映射关系。
在另一个实施例中,在步骤501之前,终端可以先获取第二映射关系,该第二映射关系为该终端的至少一个位置与至少一个网络接入标识的映射关系。这样,步骤501具体可以是终端根据该第二映射关系和该终端的第一位置,确定该第一网络接入标识。
具体地,终端的位置可以与网络接入标识具有映射关系。也就是说,终端在不同的位 置可以对应不同的网络接入标识。这样,终端可以根据该第二映射关系可以得到在任意位置对应的网络接入标识。本申请实施例中,终端可以将在第一位置时对应的网络接入标识作为第一网络接入标识。也就是说,终端在第一位置时,建立的第一会话可以用于发送各种业务。
可以理解的是,至少一个位置与至少一个网络接入标识对应可以是一个位置对应一个或网络接入标识,也可以是一个位置对应多个网络接入标识,或者还可以是多个位置对应一个网络接入标识,本申请对此不进行限定。
还可以理解的是,终端可以直接获取到至少一个位置和与该至少一个位置对应的至少一个网络接入标识。为方便描述,下述实施例以终端获取到第二映射关系为例进行说明,但不申请并限于此。
例如,该至少一个位置和至少一个网络接入标识的第二映射关系可以如下表3所示。具体地,若终端当前位置在位置1,则该DNAI list={DNAI1,DNAI2},即DNAI list对应的网络为能够为终端提供服务的本地网络。
表3第二映射关系
位置1 DNAI 1,DNAI2
位置2 DNAI 1,DNAI3,DNAI4
可以理解的是,终端在一个位置对应的网络接入标识可以是一个,也可以是多个,本申请对此不进行限定。在该第二映射关系中,若第一位置对应的网络接入标识为多个的情况下,则第一网络接入标识可以是该第一位置对应的多个网络接入标识中的任意一个。
可以理解的是,该第二映射关系可以是终端自己生成的,也可以是在会话建立过程中从核心网获取的。
可选地,终端还可以根据EAS的负载情况,确定最终的DNAI。例如,若终端根据位置1对应的DNAI list={DNAI1,DNAI2},再结合EAS的负载情况可以选择DNAI1为最终的DNAI。也就是说,不同DNAI可以与EAS的负载具有关联关系,这样终端可以选择负载空闲的EAS对应的DNAI,也可以选择负载告警的EAS对应的DNAI。
可以理解的是,本申请对终端如何获得EAS的负载情况不进行限定。
可选地,终端还可以根据第一映射关系、第二映射关系、第一位置和第一业务,确定该第一网络接入标识。
具体地,该第一映射关系为至少一种业务和至少一个网络接入标识的映射关系,该第二映射关系为至少一个位置和至少一个网络接入标识的映射关系。这样终端可以根据该第一业务和该第一映射关系确定该第一业务对应的网络接入标识,再根据该第一位置和该第二映射关系确定该第一位置对应的网络接入标识。之后,终端可以将第一业务对应的网络接入标识和第一位置对应的网络接入标识中相同的网络接入标识作为该第一网络接入标识。也就是说,在该第一位置时,针对该第一业务,可以通过第一会话进行传输。
需要说明的是,终端也可以通过如下方式确定第一网络接入标识:终端根据第一业务和第一映射关系确定第一业务对应的网络接入标识,然后终端根据确定的第一业务对应的网络接入标识、第一位置和第二映射关系,确定第一网络接入标识。
需要说明的是,终端也可以通过如下方式确定第一网络接入标识:终端根据第一位置 和第二映射关系确定第一位置对应的网络接入标识,然后终端根据确定的第一位置对应的网络接入标识、第一业务和第一映射关系,确定第一网络接入标识。
在又一个实施例中,在步骤501之前,终端可以先获取该终端的第一位置对应的至少一个网络接入标识。这样步骤501具体可以是终端从该至少一个网络接入标识中选择该第一网络接入标识。
具体地,终端可以是主动获取,也可以是被动接收第一位置对应的至少一个网络接入标识。例如,终端可以从会话管理功能网元接收该第一位置对应的至少一个网络接入标识。
可以理解的是,该至少一个网络接入标识可以看作一个网络接入标识列表(DNAI list)。
可选地,终端还可以根据第一业务和第一映射关系,从该至少一个网络接入标识中选择第一网络接入标识。
具体地,终端还可以进一步根据该第一映射关系确定该第一业务对应的网络接入标识。这样终端将该第一业务对应的网络接入标识和该至少一个网络接入标识中相同的网络接入标识作为该第一网络接入标识。
502,该终端向会话管理功能网元发送会话建立请求,该会话建立请求用于请求建立第一会话,该第一会话用于该终端访问该第一本地网络,且该会话建立请求包括该第一网络接入标识。
具体地,终端在获取到第一网络接入标识后,可以主动向会话管理功能网元发送会话建立请求。
可以理解的是,该终端可以向接入网设备发送AS消息,该AS消息包含NAS消息,该NAS消息中携带会话标识、该会话建立请求;接入网设备向接入和移动性管理网元发送N2消息,该N2消息包含会话标识、会话建立请求;接入和移动性管理网元将该会话建立请求发送给会话管理功能网元。
需要说明的是,第一网络接入标识可以包含在NAS消息中。这种情况下,NAS消息包含会话标识、第一网络接入标识、会话建立请求。
还可以理解的是,本申请实施例中的会话管理功能网元可以是SMF,但并不限定于此。为方便描述,下述实施例以SMF为例进行说明。
可选地,在步骤502之后,终端在启动一个新的APP,即处理一个新业务(下述称为“第二业务”)时,可以先确定第二业务对应的网络接入标识。其中,终端确定第二业务对应的网络接入标识的方法,可以参考步骤501的描述,此处不再赘述。
假设第二业务与第一业务的应用需求相同,即按照现有技术,终端可以重用第一会话来传输第二业务。根据前面的描述,第一会话为访问本地网络的会话,其中该本地网络可以由第一网络接入标识表示。该本地网络可能仅能提供有限的业务,例如该本地网络仅部署了第一业务、第三业务。这种情况下,按照现有技术,终端重用第一会话来传输第二业务时,就会出现问题。本申请通过如下方式来解决该问题。
终端判断该第二业务对应的网络接入标识和所述第一网络接入标识的是否相同,发送该第二业务。
具体地,在该第二业务对应的网络接入标识和该第一网络接入标识相同和不同的情况下,终端发送该第二业务的方式可以不同。可以理解的是,终端发送第二业务,可以理解为终端传输第二业务的报文。
例如,若该第二业务对应的网络接入标识和该第一网络接入标识相同,则终端可以采用第一会话发送该第二业务。
再例如,若该第二业务对应的网络接入标识和该第一网络接入标识不同,则终端可以采用第二会话发送该第二业务。该第二会话用于该终端访问中心网络。
再例如,若该第二业务对应的网络接入标识和该第一网络接入标识不同,则终端可以采用第三会话发送该第二业务。该第三会话可以是终端重新为该第二业务建立的访问本地网络的会话连接。
需要说明的是,终端也可能无法确定第二业务对应的网络接入标识,例如第二业务部署在中心网络时,终端保存的第一映射关系就不会包含第二业务和相应的网络接入标识。这种情况下,终端可以采用第二会话传输第二业务的报文。其中,第二会话为访问中心网络的会话。其中,如前所述,第二会话是在第一会话之前建立的。当终端在建立第一会话之前,没有建立第二会话时,终端可以通过新建会话,以实现第二业务的报文传输。其中,该新建会话为访问中心网络的会话。
可选地,终端向本地网络发送业务具体可以是先接收该第一本地网络中的EAS的IP地址,并根据该EAS的IP地址向该第一本地网络中的EAS发送业务。
可以理解的是,该业务可以是上述第一业务,也可以是上述第二业务。
还可以理解的是,该EAS的IP地址可以携带在会话响应消息中,也可以是单独发送的,或者还可以携带在其他消息中,本申请对此不进行限定。
可选地,终端获取EAS的IP地址具体可以是终端向DNS服务器发送DNS请求消息,该DNS请求消息包括第一业务的域名。DNS服务器根据该第一业务的域名确定对应的EAS的IP地址,并向终端发送DNS响应消息,该DNS响应消息包括该EAS的IP地址。
具体地,终端可以在第一会话的用户面连接上向DNS服务器发起DNS query消息。该DNS query消息包括即将发送的业务的APP FQDN(例如,该APP FQDN为第一业务的域名)。DNS服务器接收该DNS query消息,并查询数据库,得到该APP FQDN对应的IP地址。DNS服务器将向终端返回DNS响应消息,该DNS响应消息包括该APP FQDN对应的IP地址。
类似地,终端也可以查询第二业务或者其他业务对应的EAS的IP地址。
可选地,终端获取EAS的IP地址还可以是从SMF获取的。
可以理解的是,本申请实施例中的DNS服务器可以是分布式部署的,也可以是集中式部署的。
可选地,终端还可以接收EAS的服务区域标识,并在该终端移动出该服务区域标识指示的服务区域的情况下,向该会话管理功能网元发送会话修改请求,以请求更改会话连接。
可以理解的是,终端接收EAS的服务区域标识可以携带在该会话响应消息中,也可以是单独发送的,或者还可以携带在其他消息中,本申请对此不进行限定。
在图5的实施例中,由终端触发主动新建会话流程,新建第一会话以访问本地网络,适用于图4中的多会话场景(即连接模型3)。可选地,也可以由终端主动触发对现有会话的修改流程,用修改后的会话访问本地网络,该实施例适用于图4中的分流场景(即连接模型2)。
接下来以现有会话为第三会话为例,结合图6对上述终端主动触发对现有会话的修改流程以访问本地网络的方法进行介绍。应理解,该第三会话可以用来进行EES和/或EAS和/或ECS的业务传输和处理。
需要说明的是,上述现有会话可以用于终端访问中心网络的现有会话,也可以是用于终端访问本地网络的现有会话,本申请在此不作限定。
S601,终端获取第二网络接入标识,所述第二网络接入标识用于指示第二本地网络。
应理解,系统中可以包括一个或多个本地网络,不同的本地网络通过不同的网络接入标识(DN access identifier,DNAI)进行标识,每个本地网络都有其对应的服务范围,该服务范围可以理解为EAS的服务范围,也可以理解为EES的服务范围或ECS的服务范围。其中,第二网络接入标识与终端当前所处位置相对应,或者说,当前终端处于第二本地网络的服务范围。
还应理解,终端可以是主动获取该第二网络接入标识,也可以是被动接收该第二网络接入标识,还可以是终端预配置了EES或ECS或EAS及其对应的服务范围的信息,其中EES或ECS或EAS对应的服务范围信息可以由至少一个DNAI来表示,该至少一个DNAI包括该第二网络接入标识。
在一种可能的实现方式中,终端主动获取该第二网络接入标识的方式可以是,终端先向其他设备发送请求以请求获得EES/ECS/EAS的相关信息,进而在接收到该请求的响应消息中获得EES或ECS或EAS及其对应的服务范围的信息,该对应的服务范围包括该第二网络接入标识对应的服务范围,也可以理解为上述EES或ECS或EAS的服务范围所对应的DNAI中包括该第二网络接入标识。
作为示例而非限定,终端(或者说EEC)向网络侧(例如ECS或者EES)发送请求以请求获得EES/ECS/EAS的相关信息与其对应的服务范围的信息,在终端接收到该请求的响应消息中包括该EES/ECS/EAS的相关信息与其对应的服务范围的信息,该EES或ECS或EAS对应的服务范围信息可以由至少一个DNAI来表示,该至少一个DNAI包括该第二网络接入标识。
在一种可能的实现方式中,终端被动接收可以是终端直接接收到其他设备周期性的或者临时发送的EES/ECS/EAS的相关信息与其对应的服务范围的信息。
需要说明的是,终端主动修改的现有会话(即第三会话)对应的网络接入标识(可称为第三网络接入标识)与上述第二网络接入标识的服务范围不同,可以理解为,第三网络接入标识对应的第三本地网络与第二网络接入标识对应的第二本地网络的服务范围不同,且终端当前处于第二本地网络的服务范围。可以理解的是,终端当前所处的位置可以是终端发生移动后的位置,则上述描述还可以理解为,终端移动前处于第三本地网络的服务范围,终端移动后处于第二本地网络的服务范围。
在一个实施例中,在步骤601之前,终端可以先获取第一映射关系,该第一映射关系为至少一种业务和至少一个网络接入标识的映射关系。这里关于第一映射关系的描述可以参考图5对应的实施例,在此不作过多赘述。
在另一个实施例中,在步骤601之前,终端可以先获取第二映射关系,该第二映射关系为该终端的至少一个位置与至少一个网络接入标识的映射关系。这里关于第二映射关系的描述也可以参考图5对应的实施例,在此不作过多赘述。
可选地,终端还以根据第一映射关系和第二业务,或者第二映射关系和第二位置,确定该第二网络接入标识,其中第二位置为终端当前所处的位置,第二业务为终端当前位置所对应的业务。可以理解的是,终端当前所处的位置可以是终端发生移动后的位置。
S602,终端向SMF发送信息#A,该信息#A用于请求对第三会话进行修改。
在一种可能的实现方式中,终端向SMF发送PDU会话修改请求(即信息#A),该请求信息用于请求对第三会话进行修改,或者说,该请求信息用于请求对第三会话进行本地分流,该请求信息中包括第三会话的会话标识(可记做会话3)和第二网络接入标识,其中第三会话的会话标识用于确定被修改的会话,第二网络接入标识用于确定第二本地网络对应的本地用户面锚点。需要说明的是,信息#A还可以是终端发送至AMF的NAS消息,包含第三会话的会话标识、第二网络接入标识和PDU会话修改请求。
可选地,上述信息#A中还包括业务信息,该业务信息用于指示需要进行本地分流的业务。
可选地,终端可以根据S601步骤中获取到的EES/ECS/EAS的相关信息以及UE的位置信息确定上述业务信息。示例性的,终端获取到了EAS1和EAS2的标识信息以及EAS1和EAS2对应的服务范围信息,终端根据自身的位置信息判断出该终端在移动前同时处于EAS1的服务范围和EAS2的服务范围,该终端在移动后仍处于EAS1的服务范围,但不在EAS2的服务范围内,此时信息#A中包括的业务信息可以为EAS2的业务信息,应理解,EES/ECS/EAS的业务信息可以为理解为EES/ECS/EAS的标识信息,例如IP五元组等等。
S603,SMF确定本地用户面锚点。
在一种可能的实现方式中,SMF接收到的信息#A中包括第二网络接入标识和会话标识,SMF根据会话标识确定需要修改的会话,SMF根据该第二网络接入标识确定与第二本地网络对应的本地用户面锚点。可选的,SMF还根据第二网络接入标识确定与第二网络对应的分流点。
可选地,当上述信息#A中包括业务信息时,SMF还可以根据业务信息对该业务信息对应的业务进行本地分流。
在上述实施例中,由终端主动触发对现有会话的修改流程,在另一个实施例中,还可以由网络侧触发对现有会话的修改流程,例如由SMF触发对现有会话的修改流程。示例性的,SMF触发对现有会话的修改流程的过程可以是,SMF从EAS(也可以为EES或ECS)获取到信息#B,SMF根据获取到的信息#B确定终端当前所在位置对应的网络接入标识以及终端的现有会话的会话标识,SMF根据会话标识确定需要修改的会话,SMF根据该网络接入标识确定与该网络接入标识对应的分流点和本地用户面锚点。
需要说明的是,上述信息#B可以包括终端的位置信息、对应的本地网络接入标识、业务信息、终端的现有会话信息等等,应理解,只要SMF能够根据该信息#B确定出定终端当前所在位置对应的网络接入标识以及终端的现有会话的会话标识即可,在此本申请不作限定。
可选地,SMF还可以从EAS(也可以为EES或ECS)获取到终端的业务信息,根据业务信息对该业务信息对应的业务进行本地分流。上述实施例中由终端主动发起新建会话的流程,在另一种可能的实现方式中,也可以由SMF触发终端新建会话,接下该结合图 7对该实现方式进行说明。
图7示出了本申请实施例的访问本地网络的方法的示意性流程图。
701,终端接收来自会话管理功能网元发送的触发消息,该触发消息用于触发该终端建立会话。相应地,会话管理功能网元向终端发送该触发消息。
具体地,会话管理功能网元向终端发送触发消息用于触发终端建立会话。
可以理解的是,在步骤701之前,终端可以与网络之间存在会话连接。例如,终端在执行步骤701之前的会话连接可以是第二会话,该第二会话可以用于终端访问中心网络。需要说明的是,本申请假设访问中心网络的第二会话与访问本地网络的第一会话,会话属性是相同的。其中,会话属性可以是SSC mode、DNN、S-NSSAI等。
还可以理解的是,本申请实施例中的会话管理功能网元可以是SMF,但并不限定于此。为方便描述,下述实施例以SMF为例进行说明。
还可以理解的是,图7所示的实施例中的SMF可以管理所有UPF,即SMF服务范围(service area,SA)为整个PLMN。
可选地,终端在步骤701之前可以建立第二会话的会话连接。
具体地,终端启动第一业务,并向RAN发起DNS查询消息以获得第一业务对应的EAS IP地址。该DNS查询消息包括该第一业务的域名(例如,FQDN2)。RAN将该DNS查询消息发送给PSA,PSA检测DNS查询消息,并发送至SMF。其中PSA检测DNS查询消息具体可以是根据该DNS查询消息中的域名识别业务类型。例如,PSA仅处理一些属于预先设定的域名列表的域名,或者业务类型。若该DNS查询消息中的域名不属于预先设定的域名列表,则不向SMF发送。SMF根据存储的域名与DNAI的映射关系,可以得到查询消息中的域名对应的目标DNAI(target DNAI)。
可以理解的是,SMF存储的域名与DNAI的映射关系包含该第一业务的标识和该目标DNAI的对应关系。其中,该对应关系可以是看作是一个列表或者表格,本申请对此不进行限定。第一业务的标识可以由第一业务的域名表示。
还可以理解的是,本申请提到的DNS查询消息也可以是业务的首个上行报文。例如,PSA检测DNS查询消息可以是PSA检测业务的首个上行报文。
可选地,该触发消息还包括指示信息,该指示信息用于指示终端当前的会话连接为第二会话。
具体地,该指示信息可以指示一个原因值。终端接收到该触发消息可以获知该终端当前的会话连接用于访问中心网络。这样可以有助于后续发送新业务的会话选择。
可选地,该触发消息还包括指示信息,该指示信息用于指示终端在建立第一会话时,携带当前会话的标识,即携带第二会话的标识,或者说,该指示信息用于指示终端在新建会话时,携带已有会话的会话标识。
702,该终端根据该触发消息,向该SMF发送第一消息,该第一消息用于请求建立第一会话,该第一会话用于该终端访问该第一本地网络。
可以理解的是,该终端向AMF发送NAS消息,该NAS消息包括该第二会话的会话标识和第一会话建立请求。该AMF向该SMF发送第一消息,该第一消息包括该第一会话建立请求,该第一会话建立请求可以包括该第二会话的会话标识。其中,第一会话建立请求包括第二会话的会话标识,也可以理解为第一消息包括第二会话的会话标识。
703,SMF根据该第一消息,确定目标网络接入标识。
可选地,若在步骤701之前,终端与网络之间存在第二会话,则该第一消息可以包括该第二会话的会话标识和该第一会话的会话标识,这样SMF以根据该第二会话的会话标识和映射关系确定该第二会话的会话标识对应的目标网络接入标识。此外,SMF可以将处于第一消息中的第二会话的会话标识对应的目标网络接入标识作为该第一会话的会话标识对应的网络接入标识。该映射关系为至少一个会话标识和至少一个网络接入标识的映射关系。且该映射关系包括第二会话的标识与目标网络接入标识的对应关系。
可以理解的是,该SMF可以预先存储至少一个会话标识和至少一个网络接入标识的应关系,其中至少一个会话标识包含第二会话标识。或者该SMF在建立第二会话的过程中,存储了该第二会话的会话标识和目标网络接入标识的对应关系。这样SMF就可以根据该第一会话建立请求包括的第二会话标识确定出对应的目标网络接入标识。
还可以理解的是,SMF在接收到该第一消息之后,可以保存第一会话的会话标识与该目标网络接入标识的对应关系。或者说,SMF可以保存第一会话的会话标识、第二会话的会话标识以及该目标网络接入标识的对应关系。SMF还可以保存其他会话与网络接入标识的对应关系,本申请对此不进行限定。
需要说明的是,上述描述中以SMF保存会话标识与目标网络接入标识的对应关系为例进行说明。可选的,SMF也可以保存目标网络接入标识。当SMF接收到第一消息之后,根据保存的目标网络接入标识为第一会话确定目标UPF。可选的,对于SSC mode为SSC mode3的会话,SMF根据保存的目标网络接入标识为第一会话确定目标UPF。具体的,当SMF接收到第一消息之后,判断第一会话是否为SSC mode3,如果是,则根据保存的目标网络接入标识为第一会话确定目标UPF;如果不是,则SMF选择目标UPF时不考虑保存的目标网络接入标识。同理,上述逻辑也适用于SMF保存会话标识与目标网络接入标识的对应关系。
还需要说明的是,可选的,SMF删除目标网络接入标识,或者会话标识与目标网络接入标识的对应关系的方式包括:当SMF为第一会话确定目标UPF之后,SMF删除目标网络接入标识或对应关系;和/或,SMF在一段时间后,删除目标网络接入标识或对应关系;和/或,SMF在第二会话释放时,删除目标网络接入标识或对应关系。
还需要说明的是,可选的,在UE新建会话1的过程中,UE可以向SMF发送UE能力,用于表示UE支持携带旧会话标识。可以理解的是,UE能力还可以描述为UE支持携带多个会话标识,还可以描述为UE为R17UE。可选的,SMF根据UE能力,确定对目标网络接入标识的处理方式:(1)当UE支持携带旧会话标识时,SMF保存目标网络接入标识与会话标识的对应关系;在UE发起的新会话建立过程中,SMF根据UE携带的旧会话标识、以及对应关系,确定目标网络接入标识,并根据该目标网络接入标识选择目标UPF。(2)当UE不支持携带旧会话标识时,SMF保存目标网络接入标识,并启动定时器,当定时器超时时,SMF删除目标网络接入标识。在UE发起的新会话建立过程中,SMF根据保存的目标网络接入标识选择目标UPF。
704,SMF根据该目标网络接入标识,确定目标UPF。
具体地,SMF选中目标UPF之后,终端可以通过接入网设备和该目标UPF连接到目标本地网络,即完成该第一会话连接的建立。这样终端可以通过该第一会话进行业务传输 和处理。
其中,目标本地网络指的是步骤701中的第一业务所在的本地网络;目标UPF指的是终端访问目标本地网络时所经过的用户面功能网元。
可选地,终端向本地网络发送第一业务具体可以是先接收该第一本地网络中的EAS的IP地址,并根据该EAS的IP地址向该第一本地网络中的EAS发送业务。
具体地,终端获取传输第一业务的EAS的IP地址具体可以是终端向DNS服务器发送DNS查询请求消息,该DNS查询请求消息包括第一业务的域名(例如,FQDN1)。DNS服务器根据该第一业务的域名确定对应的EAS的IP地址,并向终端发送DNS响应消息,该DNS响应消息包括该EAS的IP地址。
在一种可能的实现方式中,终端可以在该第一会话的用户面连接上为该第一业务发起该DNS查询。
在另一种可能的实现方式中,终端可以在第二会话的用户面连接上为该第一业务发起该DNS查询。其中,第二会话的用户面连接包括目标UPF。
在又一种可能的实现方式中,终端可以不重新发起DNS查询,SMF在接收到第一业务对应的DNS查询请求消息时,存储第一业务对应的DNS查询请求消息。在SMF确定第一会话建立完成的情况下,将存储的DNS查询请求消息通过第一会话对应的目标UPF转发到DNS服务器,从DNS服务器获取第一业务对应的EAS IP,然后目标UPF将EAS IP发送至终端,从而为该第一业务完成DNS查询。
在又一种可能的实现方式中,终端不重新发起DNS查询,SMF在接收到第一业务对应的DNS查询请求消息时,存储第一业务对应的DNS查询请求消息。并且,SMF向DNS服务器转发该DNS查询请求消息,从DNS服务器获取第一业务对应的EAS IP,然后SMF将EAS IP发送至UE。可以理解的是,SMF在转发DNS查询消息时可以携带终端的当前位置。
可以理解的是,本申请实施例中,DNS服务器可以是集中DNS服务器,也可以是本地DNS服务器。其中,相对来说,集中DNS服务器的部署位置较高,本地DNS服务器的部署位置较低。例如,本地DNS服务器靠近终端或者靠近UPF。
可选地,在步骤704之后,终端在启动新的APP(下述称为“目标业务”)的情况下,还可以根据第一路由条件和第二路由条件从该第一会话和该第二会话进行选择一个会话作为目标会话,进而通过该目标会话进行业务传输和处理。其中,第一路由条件为第一会话建立过程中,SMF发送至终端的;第二路由条件为第二会话建立过程中,SMF发送至终端的。
具体地,该第一路由条件为终端选择第一会话的条件,该第二路由条件为终端选择第二会话的条件。这样终端在启动目标业务时,可以根据该第一路由条件和该第二路由条件确定是选择第一路由,还是选择第二路由。之后,终端通过选中的路由发送该目标业务。
可以理解的是,该路由条件也可以称为“转发规则”。
还可以理解的是,终端在启动新的APP(下述称为“目标业务”)时可以直接获取到该目标业务对应的域名。当上述第一路由条件和第二路由条件以业务的域名表示时,终端可以直接根据该目标业务对应的域名选择会话,但当上述第一路由条件和第二路由条件不以业务的域名表示时(比如由目标IP地址段表示时),终端在启动目标业务时未能获取 到目标业务对应的IP,也就无法根据该第一路由条件和第二路由条件选择会话。
可选地,在步骤704之后,终端在启动新的APP(下述称为“目标业务”)的情况下,若终端未获取第一路由条件和第二路由条件,或者终端不能通过提供获取到的第一路由条件和第二路由条件从该第一会话和该第二会话中选择会话时,终端可以采取以下方式选择会话。
需要说明的是,在步骤704之后,终端已经建立了第一会话和第二会话,其中,该第一会话用于访问本地网络,该第一会话由PSA1提供服务,该第二会话用于访问中心网络,该第二会话由PSA2提供服务,其中,PSA1和PSA2由SMF管理,换句话说,SMF可以管理所有UPF,即SMF服务范围(service area,SA)为整个PLMN,应理解,PSA为UPF的一种。
还需要说明的是,在建立第一会话和第二会话的过程中,AMF中保存了会话标识和网络接入标识的对应关系,例如,该网络接入标识和会话标识的对应关系可以是在会话建立过程中SMF发送给AMF的。表4示出了一种可能的对应关系。
表4
会话标识 网络接入标识
会话1 DNAI-a
会话2 \
在一种可能的实现方式中,AMF保存会话标识和网络接入标识的过程可以是,终端从现有会话中任选一个会话(这里以会话2举例)发起目标业务的DNS查询,SMF根据接收到该DNS查询中携带的目标业务的业务标识(例如目标业务的业务域名)以及存储的业务标识与网络接入标识的对应关系确定该目标业务的业务标识对应的目标网络接入标识(这里记做DNAI-a),SMF向AMF发送该目标网络接入标识,若AMF未查询到该目标网络接入标识对应的目标会话的会话标识,AMF会暂时保存该该目标网络接入标识与终端当前所在会话的会话标识的对应关系(即会话2与DNAI-a的对应关系),之后终端会新建一个与该目标业务对应的会话(这里记做会话1),在新建该会话的过程中,AMF会将原来保存的目标网络接入标识与会话标识的对应关系(即会话2与DNAI-a的对应关系)更新为目标网络接入标识与新建会话的会话标识的对应关系(即会话1与DNAI-a的对应关系)。
可以理解的是,AMF还可以保存其他会话的会话标识和对应的DNAI,或者还可以保存上述会话1和会话2对应的其他DNAI。
需要说明的是,上述描述以AMF更新目标网络接入标识与会话标识的对应关系为例进行说明。可选的,AMF还可以删除目标网络接入标识与会话标识的对应关系。具体的,在新建该会话(即会话1)的过程中,AMF根据保存的目标网络接入标识与会话标识的对应关系(即会话2与DNAI-a的对应关系)中的DNAI选择目标SMF,并删除保存的所述对应关系。可以理解的是,AMF删除目标网络接入标识与会话标识的对应关系的方法还可以是:AMF在一段时间后,删除保存的网络接入标识和会话属性的对应关系;和/或,AMF在会话2释放时,再删除保存的网络接入标识和会话属性的对应关系。
需要说明的是,上述描述以AMF保存目标网络接入标识与会话标识的对应关系为例 进行说明。可选的,AMF也可以保存目标网络接入标识。此时,在UE新建会话1的过程中,AMF根据保存的目标网络接入标识选择目标SMF。可以理解的是,AMF删除保存的目标网络接入标识的方法包括:当AMF为会话1确定目标SMF之后,即AMF根据保存的目标网络接入标识确定目标SMF之后,AMF删除目标网络接入标识;和/或,AMF在一段时间后删除目标网络接入标识;和/或,AMF在会话2或会话1释放时,删除目标网络接入标识。
可选的,对于SSC mode为SSC mode3的会话,SMF向AMF发送目标网络接入标识,或者目标网络接入标识与会话标识的对应关系。具体的,如步骤701所描述的,当SMF确定目标网络接入标识时,SMF判断该会话是否为SSC mode3,如果是,则SMF向AMF发送目标网络接入标识,或者目标网络接入标识与会话标识的对应关系;如果不是,则SMF不向AMF发送目标网络接入标识。也就是说,根据目标接入网络确定目标SMF或目标UPF仅适用于SSC mode3的会话。
需要说明的是,可选的,在UE新建会话1的过程中,UE可以向AMF发送UE能力,用于表示UE支持携带旧会话标识。可以理解的是,UE能力还可以描述为UE支持携带多个会话标识,还可以描述为UE为R17UE。可选的,AMF根据UE能力,确定对目标网络接入标识的处理方式:(1)当UE支持携带旧会话标识时,AMF保存目标网络接入标识与会话标识的对应关系;在UE发起的新会话建立过程中,AMF根据UE携带的旧会话标识、以及对应关系,确定目标网络接入标识,并根据该目标网络接入标识选择目标SMF。(2)当UE不支持携带旧会话标识时,AMF保存目标网络接入标识,并启动定时器,当定时器超时时,AMF删除目标网络接入标识。在UE发起的新会话建立过程中,AMF根据保存的目标网络接入标识选择目标SMF。
上述表4描述了在建立第一会话和第二会话的过程中,AMF中保存会话标识和网络接入标识的对应关系。需要说明的是,在另外一种可能的实现方式中,在建立第一会话和第二会话的过程中,AMF中保存的是会话属性和网络接入标识的对应关系。例如,该网络接入标识和会话属性的对应关系可以是在会话建立过程中SMF发送给AMF的。再例如,该网络接入标识和部分会话属性的对应关系可以是在会话建立过程中SMF发送给AMF的,另一部分会话属性则可以是在会话建立过程中UE发送给AMF的。其中,会话属性指的是会话对应的DNN、S-NSSAI、PDU session type、SSC mode等。表5示出了一种可能的对应关系。
表5
会话标识 网络接入标识
会话1的部分或全部会话属性 DNAI-a
会话2的部分或全部会话属性 \
在一种可能的实现方式中,AMF保存会话的会话属性和网络接入标识的过程可以是,终端发起会话建立过程(这里以会话2举例),包括UE向AMF发送NAS消息,携带会话建立请求、以及DNN、S-NSSAI、会话标识;AMF保存会话标识、DNN、S-NSSAI,其中DNN、S-NSSAI、会话标识作为部分会话属性保存在AMF上。终端在该会话2上发起目标业务的DNS查询,SMF根据接收到该DNS查询中携带的目标业务的业务标识(例 如目标业务的业务域名)、以及存储的业务标识与网络接入标识的对应关系确定该目标业务的业务标识对应的目标网络接入标识(这里记做DNAI-a),SMF向AMF发送该目标网络接入标识和部分/全部会话属性,其中,部分/全部会话属性包括:DNN、S-NSSAI、SSC mode、会话标识等,AMF保存该目标网络接入标识和部分/全部会话属性的对应关系。至此,AMF根据从UE接收到的部分会话属性和从SMF接收到的部分/全部会话属性,AMF可以保存目标网络接入标识与会话属性的对应关系。
可以理解的是,此时步骤701中触发消息中包括的指示信息,用于指示终端在建立第一会话时携带会话属性,该会话属性由UE发送至AMF。
进一步的,当AMF收到步骤702中终端发送的第一消息时,第一消息携带会话属性。AMF根据第一消息中的会话属性、以及保存的网络接入标识和会话属性的对应关系,确定第一消息中的会话属性对应的网络接入标识,并根据该网络接入标识选择新SMF。
可选的,在AMF选择新SMF之后,AMF删除保存的网络接入标识和会话属性的对应关系。可选的,AMF可以在一段时间后,删除保存的网络接入标识和会话属性的对应关系。可选的,AMF可以在会话2释放时,再删除保存的网络接入标识和会话属性的对应关系。
方式A
在该方式中,终端在查询该目标业务对应的IP地址的过程中,由SMF确定是否需要新建会话,若不需要新建会话则需要进一步确定重用的会话,并将对应的会话标识发送至终端,若需要新建会话则可由SMF触发终端新建会话。需要说明的是,该描述还可以替换为SMF确定是否可以重用已有会话,若可以,则将重用会话对应的标识发送至终端;若不可以,则触发终端新建会话。
需要说明的是,若终端根据策略判断存在多个会话满足目标业务的要求,终端可以从中任选一个会话传输该目标业务对应的域名查询请求。
接下来以终端选择第一会话传输该目标业务对应的域名查询请求为例,结合图8对该方式A进行详细说明,其中,其中该第一会话对应的PSA记做PSA1。
S801,终端向SMF发送信息#a1(即第一信息),该信息#a1用于确定发送该目标业务对应的域名查询请求所使用的会话,该信息#a1包括该目标业务的域名。
需要说明的是,信息#a1还可以描述为用于确定该目标业务的域名对应的IP地址,换句话说,该信息#a1可以为DNS查询。
在一种可能的实现方式中,终端通过RAN和PSA1向SMF发送信息#a1,该信息#a1用于确定发送该目标业务对应的域名查询请求所使用的会话,该信息#a1包括该目标业务的域名,例如该目标业务的域名为FQDN3。
需要说明的是,PSA1向SMF发送信息#a1还可以描述为PSA1向SMF发送信息#a1中包含的域名。
示例性的,终端通过RAN和PSA1向SMF1发送信息#a1的过程可以是:终端向RAN发送该信息#a1,该信息#a1包括该目标业务的域名,RAN将该信息#a1发送给PSA1,当PSA1检测到该信息#a1时向SMF上报该信息#a1。其中PSA1检测该信息#a1的过程具体可以是根据该信息#a1中的目标业务的域名识别业务类型。例如,PSA1仅处理一些属于预先设定的域名列表的域名,或者业务类型。若该信息#a1中的域名不属于预先设定的域 名列表,则不向SMF发送。SMF根据存储的域名与DNAI的映射关系,可以得到请求信息中的域名对应的目标DNAI(target DNAI)。
需要说明的是,该信息#a1可以是域名查询请求(DNS query),上述检测信息#a1和上报信息#a1也可由除了PSA1以外的其他网元实现,比如边缘应用服务器发现功能网元(edge application server discovery function,EASDF),其中EASDF用于处理域名相关的消息,例如DDNS query、DNS response,可以部署在PSA1后面。
需要说明的是,上述UE向SMF发送信息#a1的方式可以是,UE通过AMF向SMF发送信息#a1,这里具体的发送方式可参考现有技术,本申请在此不作过多赘述。
S802,SMF确定是否存在该目标业务对应的会话标识。
在一种可能的实现方式中,SMF存储的业务的域名中包括信息#a1中该目标业务的域名,则SMF确定有该目标业务的域名对应的会话标识,进一步地,SMF确定出该目标业务的域名对应的会话标识。
在一种可能的实现方式中,SMF确定该目标业务的域名对应的会话标识的方式可以是,SMF根据业务的域名与网络接入标识的对应关系和网络接入标识与会话标识的对应关系确定。示例性的,SMF先根据存储的业务的域名与网络接入标识的对应关系确定该目标业务对应的网络接入标识DNAI,可记做DNAI-b;SMF再根据存储的网络接入标识与会话标识的对应关系确定DNAI-b对应的会话标识,该重用的会话对应的会话标识可记作会话x。
在一种可能的实现方式中,SMF确定该目标业务的域名对应的会话标识的方式可以是,SMF根据业务的域名与会话标识的对应关系确定。示例性的,SMF根据存储的业务的域名与网络接入标识的对应关系和存储的网络接入标识与会话标识的对应关系确定业务的域名与会话标识的对应关系,再根据业务的域名与会话标识的对应关系确定该目标业务的域名对应的会话标识,该重用的会话对应的会话标识可记作会话x。
可以理解的是,以上实现方式中,SMF存储的业务的域名与DNAI的对应关系(或者称为映射关系)包含该目标业务的标识和该目标DNAI的对应关系,SMF存储的网络接入标识与会话标识的对应关系包含该目标网络接入标识与目标会话标识的对应关系。其中,该对应关系可以是看作是一个列表或者表格,本申请对此不进行限定。其中,目标业务的标识可以由目标业务的域名表示。
在一种可能的实现方式中,SMF存储的业务的域名中不包括信息#a1中该目标业务的域名,则SMF确定没有该目标业务的域名对应的会话标识。
S803,SMF向UE发送信息#a2,该信息#a2用于确定传输该目标业务的会话。
需要说明的是,确定出的传输该目标业务的会话可以是已有会话中的某一个会话(即重用会话),也可以是新建的会话。
在一种可能的实现方式中,若SMF确定有该目标业务的域名对应的会话标识,SMF向UE发送信息#a2,该信息#a2包括该目标业务的域名对应的会话标识,即会话x,用于指示终端采用会话x传输业务。
在一种可能的实现方式中,若SMF确定没有该目标业务的域名对应的会话,SMF向SMF1发送信息#a2,用于指示终端发起新会话。可选的,该信息#a2为空,即不包含重用会话的标识,或者重用会话的标识为空。
可选地,上述信息#a2中还可以包括指示信息,该指示信息用于指示终端采用会话x传该目标业务,或者用于指示已有会话中没有与该目标业务的域名对应的会话标识。
需要说明的是,上述SMF向终端发送信息#a2的方式可以是,SMF通过AMF向终端发送信息#a2,这里具体的发送方式可参考现有技术,本申请在此不作过多赘述。
S804,终端确定用于传输该目标业务的会话。
在一种可能的实现方式中,终端接收到上述信息#a2,若该信息#a2中包括该目标业务对应的会话标识-会话x,终端确定通过该会话x传输目标业务。
可选地,终端可以在该会话x上发起域名查询请求(即DNS query),以获取该目标业务对应的IP地址。
在一种可能的实现方式中,终端接收到上述信息#a2,若该信息#a2为空,或者该信息#a2中的指示信息指示已有会话中没有与该目标业务的域名对应的会话标识,则终端可以建立新的会话以使终端可以在新建的会话上传输业务。可选的,终端在新建的会话上发起域名查询请求(即DNS query),以获取该目标业务对应的IP地址。这里新建会话的方式可参考本申请中第一会话建立的方式,在此不作过多赘述。
需要说明的是,上述以会话1、会话2或会话x表示会话标识仅仅作为一种示例,应理解,会话标识也可以以其他形式标识,本申请在此不作限定。
还需要说明的是,本实施例描述的方法不仅适用于终端已建立访问中心网络的第二会话和访问本地网络的第一会话的情况,还可以适用于终端只建立了访问中心网络的第二会话的情况,此时本实施例描述的方法还可以用于触发第二会话的建立过程,类似的,本实施例描述的方法还可以适用于终端建立了访问中心网络的第二会话和访问其他本地网络的其他会话(比如第三会话)的情况,在此不对终端已建立的访问本地网络类型的会话数量作任何限定。
上述实施例中由终端主动发起新建会话的流程或者SMF触发终端新建会话,在另一种可能的实现方式中,也可以由AMF触发终端新建会话,接下该结合图9对该实现方式进行说明。
图9示出了本申请实施例的访问本地网络的方法的示意性流程图。
需要说明的是,在不作特别说明的情况下,图9所示的实施例与图7所示的实施例中的相同术语表示的含义相同。
还需要说明的是,在不存在逻辑矛盾的情况下,图9所示的实施例可以与上述各个实施例任意结合。
901,AMF向终端发送触发消息,该触发消息用于触发终端建立会话。
可选地,终端在步骤901之前可以建立第二会话的会话连接。
具体地,终端启动第一业务,并向RAN发起DNS查询消息以获得第一业务对应的EAS IP地址。该DNS查询消息包括该第一业务的域名(例如,FQDN2)。RAN将该DNS查询消息发送给PSA,PSA检测DNS查询消息,并发送至SMF2。其中PSA检测查询消息具体可以是根据该DNS查询消息中的域名识别业务类型。例如,PSA仅处理一些属于预先设定的域名列表的域名,或者业务类型。若该DNS查询消息中的域名不属于预先设定的域名列表,则不向SMF2发送。SMF2根据存储的域名与DNAI的映射关系,可以得到查询消息中的域名对应的目标DNAI(target DNAI)。
可以理解的是,SMF2存储的域名与DNAI的映射关系包括该第一业务的标识和该目标DNAI的对应关系。其中,该对应关系可以是看作是一个列表或者表格,本申请对此不进行限定。
可以理解的是,AMF向终端发送的触发消息,指的是AMF接收SMF2发送的触发消息,并发送至终端。可选的,SMF还向AMF发送第二会话的会话标识和target DNAI。相应的,AMF保存第二会话的会话标识和target DNAI。
可以理解的是,AMF还可以保存其他会话的会话标识和对应的DNAI。
还可以理解的是,本申请提到的DNS查询消息也可以是业务的首个上行报文。例如,PSA检测DNS查询消息可以是PSA检测业务的首个上行报文。
可选地,该触发消息还包括指示信息,该指示信息用于指示终端当前的会话连接为第二会话。
具体地,该指示信息可以指示一个原因值。终端接收到该触发消息可以获知该终端当前的会话连接用于访问中心网络。这样可以有助于后续发送新业务的会话选择。
可选地,该触发消息还包括指示信息,该指示信息用于指示终端在建立第一会话时,携带当前会话的标识,即携带第二会话的标识,或者说,该指示信息用于指示终端在新建会话时,携带已有会话的会话标识。
902,终端根据该触发消息,发送第一消息,该第一消息用于请求建立第一会话,该第一会话用于该终端访问本地网络。
可以理解的是,该终端向AMF发送NAS消息,该NAS消息包括第二会话的会话标识和该第一会话建立请求。
903,AMF根据该第一会话建立请求,确定目标网络接入标识。
可选地,若在步骤901之前,终端与网络之间存在第二会话,则该NAS消息可以包括该第二会话的会话标识,这样AMF可以根据该第二会话的会话标识和映射关系确定该第二会话的会话标识对应的目标网络接入标识。该映射关系为至少一个会话标识和至少一个网络接入标识的映射关系。
可以理解的是,该AMF可以预先存储至少一个会话标识和至少一个网络接入标识的对应关系,即步骤901中提到的AMF保存会话标识和对应的DNAI,其中至少一个会话标识包含第二会话标识。这样AMF就可以根据该第一会话建立请求包括的第二会话标识确定出对应的目标网络接入标识。
可选地,以映射关系为第二会话标识和对应的网络接入标识为例,该映射关系可以是第二SMF(即SMF2)在第二会话建立过程中发送给该AMF的。其中,第二SMF为第二会话提供会话管理服务。
具体地,该第二SMF(下述可以称为“SMF2”)可以用于为终端建立第二会话。该第二SMF生成该至少一个会话标识和至少一个网络接入标识的映射关系,并发送给AMF。这样AMF可以根据该映射关系确定出第二会话的会话标识对应的目标网络接入标识。
904,AMF根据该目标网络接入标识,确定第一SMF。
具体地,本申请实施例中的SMF具有有限的服务范围。因此,AMF可以根据目标网络接入标识选择能够提供服务的第一SMF(下述可以称为“SMF1”)。
905,AMF向第一SMF发送该目标网络接入标识。
906,第一SMF根据该目标网络接入标识,确定目标UPF。
具体地,SMF1选中目标UPF之后,终端可以通过接入网设备和该目标UPF连接到目标本地网络,即完成该第一会话连接的建立。这样终端可以通过该第一会话进行业务传输和处理。
可选地,终端向本地网络发送第一业务具体可以是先接收该第一本地网络中的EAS的IP地址,并根据该EAS的IP地址向该第一本地网络中的EAS发送业务。
在一种可能的实现方式中,终端可以在该第一会话的用户面连接上为该第一业务发起该DNS查询。
在另一种可能的实现方式中,终端可以在第二会话的用户面连接上为该第一业务发起该DNS查询。其中,第二会话的用户面连接包括目标UPF。
具体地,终端通过之前的第二会话的用户面连接进行DNS查询的情况下,PSA1将DNS查询消息发送至SMF2,SMF2将DNS query通过AMF发送至SMF1,SMF1在DNS query中添加UE的当前位置(location),并将DNS query发送至DNS服务器。
在又一种可能的实现方式中,终端可以不重新发起DNS查询,SMF2在接收到第一业务对应的DNS查询消息时,存储第一业务对应的DNS查询请求。SMF2将存储的DNS查询通过AMF、SMF1转发到DNS服务器,从DNS服务器获取第一业务对应的EAS IP,然后SMF2或SMF1将EAS IP发送至UE,从而为该第一业务完成DNS查询。
具体地,SMF2将第二会话的DNS query缓存下来,直到第一会话完成建立,SMF2将缓存的DNS query通过AMF发送至SMF1,SMF1发送至DNS服务器。
可以理解的是,上述提到的SMF2缓存DNS查询请求,也可以替换为AMF缓存DNS查询请求。
可以理解的是,SMF在转发DNS query消息时可以携带终端的当前位置。
在又一种可能的实现方式中,终端不重新发起DNS查询,SMF2在接收到第一业务对应的DNS查询消息时,存储第一业务对应的DNS查询消息。并且,在SMF2确定第一会话完成建立的情况下,将存储的DNS查询通过AMF、SMF1、步骤706中的目标UPF转发到DNS服务器,从DNS服务器获取第一业务对应的EAS IP,目标UPF将EAS IP发送至终端。
可以理解的是,本申请实施例中,DNS服务器可以是集中DNS服务器,也可以是本地DNS服务器。其中,相对来说,集中DNS服务器的部署位置较高,本地DNS服务器的部署位置较低。例如,本地DNS服务器靠近终端或者靠近UPF。
还可以理解的是,终端在启动新的APP(下述称为“目标业务”)时可以直接获取到该目标业务对应的域名。当上述第一路由条件和第二路由条件以业务的域名表示时,终端可以直接根据该目标业务对应的域名选择会话,但当上述第一路由条件和第二路由条件不以业务的域名表示时(比如由目标IP地址段表示时),终端在启动目标业务时未能获取到目标业务对应的IP,也就无法根据该第一路由条件和第二路由条件选择会话。
可选地,在步骤906之后,终端在启动新的APP(下述称为“目标业务”)的情况下,若终端未获取第一路由条件和第二路由条件,或者终端不能通过提供获取到的第一路由条件和第二路由条件从该第一会话和该第二会话中选择会话时,终端可以采取以下方式选择会话。
需要说明的是,在步骤906之后,终端已经建立了第一会话和第二会话,其中,该第一会话用于访问本地网络,该第一会话由PSA1和SMF1(即第一SMF)提供服务,该第二会话用于访问中心网络,该第二会话由PSA2和SMF2(即第二SMF)提供服务。应理解,在该实施例中,每个UPF都由其对应的SMF管理,比如PSA1由SMF1管理,应理解,PSA为UPF的一种。
还需要说明的是,在建立第一会话和第二会话的过程中,AMF中保存了会话标识、网络接入标识和SMF标识的对应关系,其中,该网络接入标识和会话标识的对应关系可以是在会话建立过程中对应的SMF发送给该AMF的。作为示例,表6示出了一种可能的对应关系。
表6
会话标识 网络接入标识 SMF标识
会话1 DNAI-a SMF1
会话2 \ SMF2
在一种可能的实现方式中,AMF保存会话标识和网络接入标识的过程可以是,终端从现有会话中任选一个会话(这里以会话2举例)发起目标业务的DNS查询,当SMF接收到该DNS查询后会根据该DNS查询中携带的目标业务的业务标识(例如目标业务的业务域名)以及存储的业务标识与网络接入标识的对应关系确定该目标业务的业务标识对应的目标网络接入标识(这里记做DNAI-a),SMF向AMF发送该目标网络接入标识,若AMF未查询到该目标网络接入标识对应的目标会话的会话标识,AMF会暂时保存该该目标网络接入标识与终端当前所在会话的会话标识的对应关系(即会话2与DNAI-a的对应关系),之后终端会新建一个与该目标业务对应的会话(这里记做会话1),在新建该会话的过程中,AMF会将原来保存的目标网络接入标识与会话标识的对应关系(即会话2与DNAI-a的对应关系)更新为目标网络接入标识与新建会话的会话标识的对应关系(即会话1与DNAI-a的对应关系)。
可以理解的是,AMF还可以保存其他会话的会话标识和对应的DNAI以及相应的SMF标识,或者还可以保存上述会话1和会话2对应的其他DNAI。
需要说明的是,上述描述以AMF更新目标网络接入标识与会话标识的对应关系为例进行说明。可选的,AMF还可以删除目标网络接入标识与会话标识的对应关系。具体的,在新建该会话(即会话1)的过程中,AMF根据保存的目标网络接入标识与会话标识的对应关系(即会话2与DNAI-a的对应关系)中的DNAI选择目标SMF,并删除保存的所述对应关系。可以理解的是,AMF删除目标网络接入标识与会话标识的对应关系对应关系的方法还可以是:AMF在一段时间后,删除保存的网络接入标识和会话属性的对应关系;和/或,AMF在会话2释放时,再删除保存的网络接入标识和会话属性的对应关系。
需要说明的是,可选的,上述描述以AMF保存目标网络接入标识与会话标识的对应关系为例进行说明。可选的,AMF也可以保存目标网络接入标识。此时,在UE新建会话1的过程中,AMF根据保存的目标网络接入标识选择目标SMF。可以理解的是,AMF删除保存的目标网络接入标识的方法包括:当AMF为会话1确定目标SMF之后,即AMF根据保存的目标网络接入标识确定目标SMF之后,AMF删除目标网络接入标识;和/或, AMF在一段时间后删除目标网络接入标识;和/或,AMF在会话2或会话1释放时,删除目标网络接入标识。
可选的,对于SSC mode为SSC mode3的会话,SMF向AMF发送目标网络接入标识,或者目标网络接入标识与会话标识的对应关系。具体的,如步骤701所描述的,当SMF确定目标网络接入标识时,SMF判断该会话是否为SSC mode3,如果是,则SMF向AMF发送目标网络接入标识,或者目标网络接入标识与会话标识的对应关系;如果不是,则SMF不向AMF发送目标网络接入标识。也就是说,根据目标接入网络确定目标SMF或目标UPF仅适用于SSC mode3的会话。
需要说明的是,可选的,在UE新建会话1的过程中,UE可以向AMF发送UE能力,用于表示UE支持携带旧会话标识。可以理解的是,UE能力还可以描述为UE支持携带多个会话标识,还可以描述为UE为R17UE。可选的,AMF根据UE能力,确定对目标网络接入标识的处理方式:(1)当UE支持携带旧会话标识时,AMF保存目标网络接入标识与会话标识的对应关系;在UE发起的新会话建立过程中,AMF根据UE携带的旧会话标识、以及对应关系,确定目标网络接入标识,并根据该目标网络接入标识选择目标SMF。(2)当UE不支持携带旧会话标识时,AMF保存目标网络接入标识,并启动定时器,当定时器超时时,AMF删除目标网络接入标识。在UE发起的新会话建立过程中,AMF根据保存的目标网络接入标识选择目标SMF。
方式B
在该方式中,终端在查询该目标业务对应的IP地址的过程中,由SMF通过向AMF查询确定是否需要新建会话,或者由AMF确定是否需要新建会话,若不需要新建会话则需要进一步确定重用的会话,并将对应的会话标识发送至终端,若需要新建会话则可由网络侧(如AMF或SMF)触发终端新建会话。需要说明的是,该描述可以替换为SMF或者AMF确定是否可以重用已有会话,若可以,则将重用会话对应的标识发送至终端;若不可以,则触发终端新建会话。
需要说明的是,若存在多个会话满足目标业务的要求,终端可以从中任选一个会话传输该目标业务对应的域名查询请求,终端通过该会话对应的SMF向AMF查询以确定是否需要新建会话。
接下来以终端选择第一会话传输该目标业务对应的域名查询请求为例,结合图10对该方式B进行详细说明,其中,该第一会话对应的SMF记做SMF1,其中该第一会话对应的PSA记做PSA1。
S1001,终端向SMF1发送信息#b1,该信息#b1用于确定发送该目标业务对应的域名查询请求所使用的会话,该信息#b1包括该目标业务的域名。
需要说明的是,信息#b1还可以描述为用于确定该目标业务的域名对应的IP地址,换句话说,该信息#b1可以为DNS查询。
在一种可能的实现方式中,终端通过RAN和PSA1向SMF1发送信息#b1,该信息#b1用于确定发送该目标业务对应的域名查询请求所使用的会话,该信息#b1包括该目标业务的域名,例如该目标业务的域名为FQDN3。
需要说明的是,PSA1向SMF发送信息#b1还可以描述为PSA1向SMF发送信息#b1中包含的域名。
示例性的,终端通过RAN和PSA1向SMF1发送信息#b1的过程可以是:终端向RAN发送该信息#b1,该信息#b1包括该目标业务的域名,RAN将该信息#b1发送给PSA1,当PSA1检测到该信息#b1时向SMF1上报该信息#b1。其中PSA1检测该信息#b1的过程具体可以是根据该信息#b1中的目标业务的域名识别业务类型。例如,PSA1仅处理一些属于预先设定的域名列表的域名,或者业务类型。若该信息#b1中的域名不属于预先设定的域名列表,则不向SMF1发送。SMF1根据存储的域名与DNAI的映射关系,可以得到请求信息中的域名对应的目标DNAI(target DNAI)。
需要说明的是,该信息#b1可以是域名查询请求(DNS query),上述检测信息#b1和上报信息#b1也可由除了PSA1以外的其他网元实现,比如边缘应用服务器发现功能网元(edge application server discovery function,EASDF),其中EASDF用于处理域名相关的消息,例如DDNS query、DNS response,可以部署在PSA1后面。
需要说明的是,上述UE向SMF1发送信息#a1的方式可以是,UE通过AMF向SMF1发送信息#a1,这里具体的发送方式可参考现有技术,本申请在此不作过多赘述。
S1002,SMF1确定该目标业务对应的目标网络接入标识,该目标网络接入标识可记做DNAI-b。
在一种可能的实现方式中,SMF1确定信息#b1中该目标业务的域名对应的目标网络接入标识,该目标网络接入标识可记做DNAI-b。
需要说明的是,在步骤S1001之前,SMF1会保存业务的域名与网络接入标识的对应关系,当SMF1接收到上述信息#b1后,可以根据业务的域名与网络接入标识的对应关系确定该目标业务的域名对应的网络接入标识为DNAI-b。
S1003,SMF1向AMF发送请求#c,该请求#c包括该目标网络接入标识,该请求#c用于请求查询该目标网络接入标识对应的会话标识。
可选的,请求#c还可以包括当前会话的标识,即第一会话的标识。
在一种可能的实现方式中,SMF1向AMF发送会话查询请求(即请求#c),该会话查询请求包括该目标网络接入标识DNAI-b,该会话查询请求用于请求查询该DNAI-b对应的会话标识。
在另一种可能的实现方式中,SMF1向AMF发送Namf接口上的N1N2传输消息(Namf_Communication_N1N2Message Transfer)(即请求#c),该Namf_Communication_N1N2Message Transfer包括该目标网络接入标识DNAI-b,该Namf接口上的N1N2传输消息用于查询该DNAI-b对应的会话标识。
S1004,AMF确定是否有该目标网络接入标识对应的会话标识。
在一种可能的实现方式中,AMF保存的网络接入标识中包括信息#b1中的DNAI-b,则AMF确定有该目标网络接入标识对应的会话标识,进一步地,AMF根据保存的网络接入标识与会话标识的对应关系确定该DNAI-b对应的会话标识,将该重用的会话的标识记做会话x。
在一种可能的实现方式中,AMF保存的网络接入标识中不包括信息#b1中的DNAI-b,则AMF确定没有该目标网络接入标识对应的会话标识。可选地,此时AMF可以触发终端新建一个与该目标业务对应的会话,这里新建会话的流程可参考之前的实施例,在此不作过多赘述。
可以理解的是,该AMF可以预先存储至少一个会话标识和至少一个网络接入标识的对应关系,其中至少一个网络接入标识包含目标网络接入标识。这样AMF就可以根据该请求#c包括的目标网络接入标识确定出对应的会话标识。需要理解的是,AMF可以在会话建立过程中存储会话标识和网络接入标识的对应关系。
在一种可能的实现方式中,若该请求#c为会话查询请求,可执行下述步骤S1005-S1007。
S1005,AMF向SMF1发送响应#c,该响应#c与上述请求#c相对应。
在一种可能的实现方式中,若AMF确定有该目标网络接入标识对应的会话标识,AMF向SMF1发送会话查询响应(即响应#c),该会话查询响应包括该DNAI-b对应的会话标识,即会话x。
在一种可能的实现方式中,若AMF确定没有该目标网络接入标识对应的会话标识,AMF向SMF1发送会话查询响应(即响应#c),该会话查询响应为空,即AMF不包含重用会话的标识,或者重用会话的标识为空。
可选地,上述响应#c中还可以包括指示信息,该指示信息用于指示终端采用会话x传该目标业务,或者用于指示已有会话中没有与该目标网络接入标识对应的会话标识。
S1006,SMF1确定用于传输该目标业务的会话。
在一种可能的实现方式中,SMF1接收到上述响应#c,若该响应#c中包括该目标网络接入标识对应的会话标识会话x,SMF1确定通过该会话x传输目标业务,也即SMF1确定对于该目标业务,会话x可以重用。
在一种可能的实现方式中,SMF1接收到上述响应#c,若该响应#c为空,或者该信息#a2中的指示信息指示已有会话中没有与该目标网络接入标识对应的会话标识。可选地,此时SMF可以触发终端新建一个与该目标业务对应的会话,这里新建会话的流程可参考之前的实施例,在此不作过多赘述。
S1007,SMF1向终端发送信息#b2,该信息#b2用于确定传输该目标业务的会话。
在一种可能的实现方式中,若SMF1确定有该目标网络接入标识对应的会话标识,SMF1向终端发送信息#b2,该信息#b2包括该DNAI-b对应的会话标识,即会话x。
在一种可能的实现方式中,若SMF1确定没有该目标网络接入标识对应的会话,SMF1向终端发送信息#b2,该信息#b2用于触发终端建立新会话。可选的,该信息#b2为空,即不包含重用会话的标识,或者重用会话的标识为空。
可选地,上述信息#b2中还可以包括指示信息,该指示信息用于指示终端采用会话x传该目标业务,或者用于指示已有会话中没有与该目标网络接入标识对应的会话标识。
需要说明的是,上述SMF向终端发送信息#a2的方式可以是,SMF通过AMF向终端发送信息#a2,这里具体的发送方式可参考现有技术,本申请在此不作过多赘述。
在另一种可能的实现方式中,若该请求#c为Namf接口上的N1N2传输消息(Namf_Communication_N1N2Message Transfer),可执行下述步骤S1008。
S1008,AMF向终端发送信息#b3,该信息#b3用于确定传输该目标业务的会话。
在一种可能的实现方式中,若AMF确定有该目标网络接入标识对应的会话标识,SMF1向终端发送下行NAS消息(即信息#b3),该NAS消息包括该DNAI-b对应的会话标识,即会话x。
在一种可能的实现方式中,若AMF确定没有该目标网络接入标识对应的会话标识, AMF向终端发送下行NAS消息(即信息#b3),该NAS消息用于触发终端建立新会话。可选的,该NAS消息为空,即不包含重用会话的标识,或者重用会话的标识为空。
可选地,上述信息#b3中还可以包括指示信息,该指示信息用于指示终端采用会话x传该目标业务,或者用于指示已有会话中没有与该目标网络接入标识对应的会话标识。
S1009,终端确定用于传输该目标业务的会话。
在一种可能的实现方式中,终端接收到上述信息#b2或者上述信息#b3,若该信息#b2或者该信息#b3中包括该目标业务对应的会话标识-会话x,终端确定通过该会话x传输目标业务。
可选地,终端可以在该会话x上发起域名查询请求(即DNS query),以获取该目标业务对应的IP地址。
在一种可能的实现方式中,终端接收到上述信息#b2或者上述信息#b3,若该信息#b2或者该信息#b3为空,或者该信息#b2或者该信息#b3中的指示信息指示已有会话中没有与该目标网络接入标识对应的会话标识,则终端可以建立新的会话以使终端可以在新建的会话上传输业务。可选的,终端在新建的会话上发起域名查询请求(即DNS query),以获取该目标业务对应的IP地址。这里新建会话的方式可参考本申请中第一会话建立的方式,在此不作过多赘述。
需要说明的是,上述以会话1、会话2或会话x表示会话标识仅仅作为一种示例,应理解,会话标识也可以以其他形式标识,本申请在此不作限定。
方式C
在该方式中,终端在查询该目标业务对应的IP地址的过程中,由SMF通过获取网络接入标识与会话标识的对应关系确定是否需要新建会话,若不需要新建会话则需要进一步确定重用的会话,并将对应的会话标识发送至终端,若需要新建会话则可由SMF触发终端新建会话。需要说明的是,该描述也可以替换为SMF确定是否可以重用已有会话,若可以,则将重用会话对应的标识发送至终端;若不可以,则触发终端新建会话。
需要说明的是,若终端根据策略判断存在多个会话满足目标业务的要求,终端可以从中任选一个会话传输该目标业务对应的域名查询请求。
接下来以终端选择第二会话(即终端用于访问中心网络的会话)传输该目标业务对应的域名查询请求为例,结合图11对该方式C进行详细说明。
S1101,第二SMF(即SMF2)获取网络接入标识与会话标识的对应关系。
在一种可能的实现方式中,第二SMF向AMF获取网络接入标识与会话标识的对应关系。
需要说明的是,若选择出用于访问中心网络的会话(即第二会话)传输该目标业务对应的域名查询请求,那么该第二会话对应的SMF2可以通过向AMF订阅以获取网络接入标识与会话标识的对应关系。通过这种方式,可以使得SMF2获取到终端所有访问本地网络的已有会话的信息。
作为示例而非限定,该第二SMF向AMF获取网络接入标识与会话标识的对应关系的方式可以是,在建立会话的过程中向AMF获取。接下来以第一会话和第二会话的建立过程为例,对第二SMF向AMF获取网络接入标识与会话标识的对应关系的方式进行示例性说明。
在建立第二会话的过程中,在SMF2确定该业务对应的网络接入标识(可记做DNAI-a)后,可以携带该DNAI-a向AMF发送订阅请求,该订阅请求用于订阅该DNAI-a对应的会话标识。之后,在建立第一会话的过程中,AMF会向SMF2发送该DNAI-a与该第一会话的标识的对应关系,SMF2存储该对应关系。
需要说明的是,若选择出的用于传输该目标业务对应的域名查询请求的会话为本地网络对应的会话(即第一会话),那么该第一会话对应的SMF1可以向AMF请求网络接入标识与会话标识的对应关系。通过这种方式,SMF1也能获取到保存在AMF的终端所有访问本地网络的已有会话的信息。
应理解,在该实施例中,每个会话都由其对应的SMF管理,例如,第一会话由SMF1管理,第二会话由SMF2管理。
S1102,终端向第二SMF发送信息#d1,该信息#d1用于确定发送该目标业务对应的域名查询请求所使用的会话,该信息#d1包括该目标业务的域名。
该步骤S1102可参考图7中步骤S701的描述,本申请在此不作过多赘述。
S1103,第二SMF确定是否存在该目标业务对应的会话标识。
在一种可能的实现方式中,SMF2存储的业务的域名中包括信息#a1中该目标业务的域名,则SMF2确定有该目标业务的域名对应的会话标识,进一步地,SMF2确定出该目标业务的域名对应的会话标识。需要理解的是,该描述还可以替换为,则SMF2确定该目标业务的域名对应的会话标识。
作为示例而非限定,SMF2确定该目标业务的域名对应的会话标识的方式可以是,SMF2根据业务的域名与网络接入标识的对应关系和网络接入标识与会话标识的对应关系确定。示例性的,SMF2先根据存储的业务的域名与网络接入标识的对应关系确定该目标业务对应的网络接入标识DNAI,可记做DNAI-b;SMF2再根据步骤S1101中获取到的网络接入标识与会话标识的对应关系确定DNAI-b对应的会话标识,该重用的会话对应的会话标识可记作会话x。
作为示例而非限定,SMF2确定该目标业务的域名对应的会话标识的方式还可以是,SMF2根据业务的域名与会话标识的对应关系确定。示例性的,SMF2根据存储的业务的域名与网络接入标识的对应关系和步骤S1101中获取到的网络接入标识与会话标识的对应关系确定业务的域名与会话标识的对应关系,再根据业务的域名与会话标识的对应关系确定该目标业务的域名对应的会话标识,该重用的会话对应的会话标识可记作会话x。
可以理解的是,以上实现方式中,SMF2存储的业务的域名与DNAI的对应关系(或者称为映射关系)包含该目标业务的标识和该目标DNAI的对应关系,SMF2获取到的网络接入标识与会话标识的对应关系包含该目标网络接入标识与目标会话标识的对应关系。其中,该对应关系可以是看作是一个列表或者表格,本申请对此不进行限定。其中,目标业务的标识可以由目标业务的域名表示。
在一种可能的实现方式中,SMF1存储的业务的域名中不包括信息#d1中该目标业务的域名,则SMF1确定没有该目标业务的域名对应的会话标识。
S1104,第二SMF向终端发送信息#d2,该信息#d2用于确定传输该目标业务的会话。
需要说明的是,确定出的传输该目标业务的会话可以是已有会话中的某一个会话(即重用会话),也可以是新建的会话。
该步骤S1104可参考图8中步骤S803的描述,本申请在此不作过多赘述。
S1105,终端确定用于传输该目标业务的会话。
该步骤S1105可参考图8中步骤S804的描述,本申请在此不作过多赘述。
需要说明的是,本实施例描述的方法不仅适用于终端已建立访问中心网络的第二会话和访问本地网络的第一会话的情况,还可以适用于终端只建立了访问中心网络的第二会话的情况,此时本实施例描述的方法还可以用于触发第二会话的建立过程,类似的,本实施例描述的方法还可以适用于终端建立了访问中心网络的第二会话和访问其他本地网络的其他会话(比如第三会话)的情况,在此不对终端已建立的访问本地网络类型的会话数量作任何限定。
图12示出了本申请实施例的发现边缘应用服务器EAS的方法的示意性流程图。
1101,AF接收来自第一设备的发现请求(discovery information request),该发现请求用于请求发现EAS,且该发现请求包括预设条件。相应地,第一设备向AF发送该发现请求。
可选地,图12所示实施例中的AF可以是图2所示的MEC架构中的EES222或者ECS230。
在一个实施例中,该第一设备为SMF。
具体地,终端通过向AMF发送会话建立请求以发起协议数据单元(protocol data units,PDU)会话建立流程。该会话建立请求可以包括PDU会话标识、单网络切片选择辅助信息(single network slice selection assistance information,S-NSSAI)和数据网络名称(data network name,DNN),EAS发现消息(discovery information),过滤条件(filter)等参数中的至少一项。其中,EAS discovery information中可以携带用于标识某个应用的域名或者应用标识,也可以携带终端的位置信息。域名或者应用标识用于标识该终端请求的应用,具体可以用FQDN标识;filter用于指示该终端请求的应用实例满足什么样的条件。例如,filter可以用来表示UE请求的应用实例可以支持多人游戏,或者用来表示终端请求的应用实例满足什么的服务质量(quality of service,QoS)需求。可以理解的是,终端可以根据本地配置确定该filter。
AMF根据该S-NSSAI和DNN选择SMF,并向SMF发送AMF的标识,该终端的永久标识,该终端的位置信息,该PDU会话标识,该EAS discovery information,S-NSSAI和DNN等参数。
在会话建立过程中,SMF调用PCF的服务化操作策略建立控制请求(Npcf_SMPolicy Control_Create Request)以请求从PCF获取该PDU会话相关的测量信息。在该过程中,SMF可以向PCF发送终端的位置信息(location)以及EAS discovery information中的域名或者应用标识。PCF将该应用标识、应用服务器的部署位置、域名之间的对应关系生成策略计费控制规则(policy and charging control rule,PCC rule),并通过服务化操作策略建立控制响应消息(Npcf_SMPolicyControl_Create Response)下发至SMF,SMF保存该PCC rule,其中包含应用标识、应用服务器的部署位置、域名之间的对应关系。可选地,PCF可以根据该域名或应用标识确定对应的AF ID或者AF地址,并发送给SMF。其中,该AF可以支持UE请求的域名或者应用标识对应的应用地址解析。
SMF为该PDU会话选择锚点UPF,并向AF发送该发现请求,该发现请求包括该filter。
可以理解的是,终端的位置信息可以包括终端的跟踪区域标识(tracking area identity,TAI)。
在另一个实施例中,该第一设备为终端。
具体地,终端建立会话连接的过程与上述实施例相同,为避免重复在此不进行限定。SMF在为会话选择锚点UPF之后,可以向终端发送会话建立接受消息,该会话建立接受消息包括该EAS discovery information对应的DNAI list。终端在接收到DNAI list之后,执行步骤1201。
可选地,该发现请求还包括应用标识、本地网络的网络接入标识列表和EAS需求中的至少一项。
具体地,应用标识可以是终端请求的应用的标识。本地网络的网络接入标识列表可以包括多个网络接入标识DNAI,该多个DNAI可以分别用于标识终端能够连接的MEC平台的位置。EAS需求可以是终端需求的EAS。
可选地,SMF可以根据终端的位置信息、网络拓扑和发现消息确定该本地网络的网络接入标识列表。
具体地,SMF可以根据终端当前所在的位置,发现消息中终端所请求的应用标识和网络拓扑确定终端在当前位置能够连接的MEC平台。其中,该MEC平台的位置通过DNAI标识,即本地网络的网络接入标识列表(DNAI list)包括该终端在当前位置能够连接的多个MEC平台的DNAI标识。
可以理解的是,该终端能够连接的MEC平台均部署了终端需求的应用,即EAS discovery information中的域名或者应用标识对应的应用。
1202,AF根据该发现请求,确定满足该预设条件的至少一个EAS。
具体地,AF可以将每个应用标识(APP ID)、每个应用支持的域名、每个应用所在的MEC平台的位置,以及在每个MEC平台下所部署的应用实例信息的对应关系存储在UDR中,如下述表7所示。
表7
Figure PCTCN2021107254-appb-000001
其中,应用实例也可以理解为应用服务器,应用实例信息包括该应用的应用实例对应的IP地址,该应用实例的服务范围,以及负载信息。
这样AF可以根据FQDN、filter和DNAI list选择至少一个EAS。例如,如果该DNAI list包括多个DNAI,则AF可以根据再结合FQDN,filter和上述表3进行选择EAS。
可以理解的是,SMF也可以配置上述表3的对应关系。
可选地,AF还可以根据FQDN、filter和DNAI list,以及EAS的负载情况选择目标EAS。
1203,AF向该第一设备发送发现响应消息,该发现响应消息包括该至少一个EAS的IP地址。相应地,该第一设备接收来自AF的发现响应消息。
具体地,SMF根据该发现响应消息中的至少一个EAS的IP地址,确定目标DNAI。
可选地,若该第一设备为SMF,则SMF可以根据该目标DNAI,确定分流节点(ULCL/BP网元)。该分流节点用于分流访问中心网络和访问本地网络的数据。此外,SMF可以向终端发送会话接受消息,并在该会话接受消息中携带目标EAS的IP地址。这样终端就可以根据该目标EAS的IP地址发起业务数据的传输。
可选地,该发现响应消息还包括该至少一个EAS中每个EAS的服务区域(serving area)。
可以理解的是,若该发现响应消息包括每个EAS的服务区域,则会话接受消息中也可以包括目标EAS的服务区域。其中,终端根据该服务区域,可以在发生移动之后,确定是否需要重新发起EAS请求。例如,终端发起PDU会话的修改流程时,携带发现请求。
可以理解的是,若该第一设备为终端,则SMF在检测到终端发生移动之后,还可以实时向终端发送新的DNAI list。
图13示出了本申请实施例的发现边缘应用服务器EAS的方法的示意性流程图。
需要说明的是,在不作特别说明的情况下,图13所示的实施例与图12所示的实施例中的相同术语表示的含义相同。
还需要说明的是,图13所示的实施例中在不存在逻辑矛盾的情况下,可以与图12所示的实施例的任意实现方式结合。
1301,SMF向PCF发送发现请求,该发现请求用于请求发现EAS,该发现请求包括预设条件。相应地,PCF接收来自SMF的该发现请求。
可以理解的是,该发现请求可以是终端发起的。即终端发送给SMF,由SMF转发给PCF。
1302,PCF根据该发现请求,确定满足预设条件的至少一个EAS。
1303,PCF向SMF发送该发现响应消息,该发现响应消息包括该至少一个EAS的IP地址。
本文中描述的各个实施例可以为独立的方案,也可以根据内在逻辑进行组合,这些方案都落入本申请的保护范围中。
可以理解的是,上述各个方法实施例中,由各个设备实现的方法和操作,也可以由对应设备的部件(例如芯片或者电路)实现。
上述主要从各个交互的角度对本申请实施例提供的方案进行了介绍。可以理解的是,各个网元,例如发射端设备或者接收端设备,为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例可以根据上述方法示例对发射端设备或者接收端设备进行功能模块的 划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以使用硬件的形式实现,也可以使用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。下面以使用对应各个功能划分各个功能模块为例进行说明。
应理解,本申请实施例中的具体的例子只是为了帮助本领域技术人员更好地理解本申请实施例,而非限制本申请实施例的范围。
应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
以上,结合图5至图13详细说明了本申请实施例提供的方法。以下,结合图14至图21详细说明本申请实施例提供的装置。应理解,装置实施例的描述与方法实施例的描述相互对应,因此,未详细描述的内容可以参见上文方法实施例,为了简洁,这里不再赘述。
图14示出了本申请实施例的访问本地网络的装置1400的示意性框图。
应理解,该装置1400可以对应于图5所示的实施例中的终端,可以具有方法中的终端的任意功能。该装置1400,包括处理模块1410和收发模块1420。
该处理模块1410,用于获取第一网络接入标识,所述第一网络接入标识用于指示第一本地网络;
该收发模块1420,用于向会话管理功能网元发送会话建立请求,所述会话建立请求用于请求建立第一会话,所述第一会话用于终端访问所述第一本地网络,且所述会话建立请求包括所述第一网络接入标识。
可选地,该收发模块1420,还用于获取至少一种业务和与所述至少一种业务对应的至少一个网络接入标识;
其中,所述至少一种业务包括第一业务,该处理模块1410具体用于:根据所述第一业务,确定与所述第一业务对应的所述第一网络接入标识,所述至少一个网络接入标识包括所述第一网络接入标识。
可选地,该收发模块1420具体用于:
接收来自接入和移动性管理功能的注册接受消息,所述注册接受消息包括所述至少一种业务和与所述至少一种业务对应的至少一个网络接入标识;或
接收来自接入和移动性管理功能的配置更新命令消息,所述配置更新命令消息包括所述至少一种业务和与所述至少一种业务对应的至少一个网络接入标识。
可选地,该收发模块1420,还用于获取所述终端的至少一个位置与至少一个位置对应的至少一个网络接入标识;所述终端的至少一个位置包括第一位置,该处理模块1410具体用于:根据所述第一位置,确定与所述第一位置对应的所述第一网络接入标识,所述至少一个网络接入标识包括所述第一网络接入标识。
可选地,该处理模块1410,还用于根据所述第一位置和第一业务,确定与所述第一位置和所述第一业务对应的所述第一网络接入标识
可选地,该收发模块1420,还用于通过接收来自所述会话管理功能网元的所述终端的第一位置对应的至少一个网络接入标识;
其中,该处理模块1410具体用于:
从所述至少一个网络接入标识中确定所述第一网络接入标识。
可选地,该处理模块1410具体用于:根据第一业务,从所述至少一个网络接入标识中选择与所述第一业务对应的所述第一网络接入标识。
可选地,该收发模块1420,还用于获取至少一种业务和与所述至少一种业务对应的至少一个网络接入标识,所述至少一种业务包括第二业务;该处理模块1410具体用于:根据所述第二业务,确定所述第二业务对应的网络接入标识;根据所述第二业务对应的网络接入标识和所述第一网络接入标识的关系,控制该收发模块1420发送所述第二业务。
可选地,该处理模块1410具体用于:
若所述第二业务对应的网络接入标识和所述第一网络接入标识相同,则控制该收发模块1420通过所述第一会话发送所述第二业务;
若所述第二业务对应的网络接入标识和所述第一网络接入标识不同,则控制该收发模块1420通过第二会话发送所述第二业务,所述第二会话用于所述终端访问中心网络;或
若第二业务对应的网络接入标识和所述第一网络接入标识不同,则控制该收发模块1420通过第三会话发送所述第二业务,所述第三会话用于所述终端访问所述第二业务对应的本地网络。
图15示出了本申请实施例提供的访问本地网络的装置1500,该装置1500可以为图5中所述的终端。该装置可以采用如图15所示的硬件架构。该装置可以包括处理器1510和收发器1520,可选地,该装置还可以包括存储器1530,该处理器1510、收发器1520和存储器1530通过内部连接通路互相通信。图14中的处理模块1410所实现的相关功能可以由处理器1510来实现,收发模块1420所实现的相关功能可以由处理器1510控制收发器1520来实现。
可选地,处理器1510可以是一个通用中央处理器(central processing unit,CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),专用处理器,或一个或多个用于执行本申请实施例技术方案的集成电路。或者,处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。例如可以是基带处理器、或中央处理器。基带处理器可以用于对通信协议以及通信数据进行处理,中央处理器可以用于对访问本地网络的装置(如,基站、终端、或芯片等)进行控制,执行软件程序,处理软件程序的数据。
可选地,该处理器1510可以包括是一个或多个处理器,例如包括一个或多个中央处理单元(central processing unit,CPU),在处理器是一个CPU的情况下,该CPU可以是单核CPU,也可以是多核CPU。
该收发器1520用于发送和接收数据和/或信号,以及接收数据和/或信号。该收发器可以包括发射器和接收器,发射器用于发送数据和/或信号,接收器用于接收数据和/或信号。
该存储器1530包括但不限于是随机存取存储器(random access memory,RAM)、只读存储器(read-only memory,ROM)、可擦除可编程存储器(erasable programmable read only memory,EPROM)、只读光盘(compact disc read-only memory,CD-ROM),该存储器1530用于存储相关指令及数据。
存储器1530用于存储终端的程序代码和数据,可以为单独的器件或集成在处理器 1510中。
具体地,所述处理器1510用于控制收发器与终端进行信息传输。具体可参见方法实施例中的描述,在此不再赘述。
在具体实现中,作为一种实施例,装置1500还可以包括输出设备和输入设备。输出设备和处理器1510通信,可以以多种方式来显示信息。例如,输出设备可以是液晶显示器(liquid crystal display,LCD),发光二级管(light emitting diode,LED)显示设备,阴极射线管(cathode ray tube,CRT)显示设备,或投影仪(projector)等。输入设备和处理器701通信,可以以多种方式接收用户的输入。例如,输入设备可以是鼠标、键盘、触摸屏设备或传感设备等。
可以理解的是,图15仅仅示出了访问本地网络的装置的简化设计。在实际应用中,该装置还可以分别包含必要的其他元件,包含但不限于任意数量的收发器、处理器、控制器、存储器等,而所有可以实现本申请的终端都在本申请的保护范围之内。
在一种可能的设计中,该装置1500可以是芯片,例如可以为可用于终端中的通信芯片,用于实现终端中处理器1510的相关功能。该芯片可以为实现相关功能的现场可编程门阵列,专用集成芯片,系统芯片,中央处理器,网络处理器,数字信号处理电路,微控制器,还可以采用可编程控制器或其他集成芯片。该芯片中,可选的可以包括一个或多个存储器,用于存储程序代码,当所述代码被执行时,使得处理器实现相应的功能。
本申请实施例还提供一种装置,该装置可以是终端也可以是电路。该装置可以用于执行上述方法实施例中由终端所执行的动作。
图16示出了本申请实施例的访问本地网络的装置1600的示意性框图。
应理解,该装置1600可以对应于图7所示的实施例中的SMF,可以具有方法中的SMF的任意功能。该装置1600,包括收发模块1610和处理模块1620。
该收发模块1610,用于向终端发送触发消息,所述触发消息用于触发所述终端建立会话;
该收发模块1610,还用于接收来自所述终端的第一会话建立请求,所述第一会话建立请求用于请求建立第一会话,所述第一会话用于终端访问本地网络;
该处理模块1620,用于根据所述第一会话建立请求,确定目标网络接入标识,所述目标网络接入标识用于指示目标本地网络;
该处理模块1620,还用于根据所述目标网络接入标识,确定目标UPF。
可选地,所述第一会话请求包括第二会话的会话标识,所述第二会话用于所述终端访问中心网络,该收发模块1610,还用于获取至少一个会话的会话标识和与所述至少一个会话的会话标识对应的至少一个本地网络的网络接入标识,所述至少一个会话的会话标识包括所述第二会话的会话标识;该处理模块1620具体用于:根据所述第二会话的会话标识,确定与所述第二会话的会话标识对应的所述目标网络接入标识。
图17示出了本申请实施例提供的访问本地网络的装置1700,该装置1700可以为图7或图8中所述的SMF。该装置可以采用如图17所示的硬件架构。该装置可以包括处理器1710和收发器1720,可选地,该装置还可以包括存储器1730,该处理器1710、收发器1720和存储器1730通过内部连接通路互相通信。图16中的处理模块1620所实现的相关功能可以由处理器1710来实现,收发模块1610所实现的相关功能可以由处理器1710控 制收发器1720来实现。
可选地,处理器1710可以是一个通用中央处理器(central processing unit,CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),专用处理器,或一个或多个用于执行本申请实施例技术方案的集成电路。或者,处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。例如可以是基带处理器、或中央处理器。基带处理器可以用于对通信协议以及通信数据进行处理,中央处理器可以用于对访问本地网络的装置(如,基站、终端、或芯片等)进行控制,执行软件程序,处理软件程序的数据。
可选地,该处理器1710可以包括是一个或多个处理器,例如包括一个或多个中央处理单元(central processing unit,CPU),在处理器是一个CPU的情况下,该CPU可以是单核CPU,也可以是多核CPU。
该收发器1720用于发送和接收数据和/或信号,以及接收数据和/或信号。该收发器可以包括发射器和接收器,发射器用于发送数据和/或信号,接收器用于接收数据和/或信号。
该存储器1730包括但不限于是随机存取存储器(random access memory,RAM)、只读存储器(read-only memory,ROM)、可擦除可编程存储器(erasable programmable read only memory,EPROM)、只读光盘(compact disc read-only memory,CD-ROM),该存储器1730用于存储相关指令及数据。
存储器1730用于存储终端的程序代码和数据,可以为单独的器件或集成在处理器1710中。
具体地,所述处理器1710用于控制收发器与终端进行信息传输。具体可参见方法实施例中的描述,在此不再赘述。
在具体实现中,作为一种实施例,装置1700还可以包括输出设备和输入设备。输出设备和处理器1710通信,可以以多种方式来显示信息。例如,输出设备可以是液晶显示器(liquid crystal display,LCD),发光二级管(light emitting diode,LED)显示设备,阴极射线管(cathode ray tube,CRT)显示设备,或投影仪(projector)等。输入设备和处理器701通信,可以以多种方式接收用户的输入。例如,输入设备可以是鼠标、键盘、触摸屏设备或传感设备等。
可以理解的是,图17仅仅示出了访问本地网络的装置的简化设计。在实际应用中,该装置还可以分别包含必要的其他元件,包含但不限于任意数量的收发器、处理器、控制器、存储器等,而所有可以实现本申请的终端都在本申请的保护范围之内。
在一种可能的设计中,该装置1700可以是芯片,例如可以为可用于终端中的通信芯片,用于实现终端中处理器1710的相关功能。该芯片可以为实现相关功能的现场可编程门阵列,专用集成芯片,系统芯片,中央处理器,网络处理器,数字信号处理电路,微控制器,还可以采用可编程控制器或其他集成芯片。该芯片中,可选的可以包括一个或多个存储器,用于存储程序代码,当所述代码被执行时,使得处理器实现相应的功能。
本申请实施例还提供一种装置,该装置可以是SMF,也可以是电路。该装置可以用于执行上述方法实施例中由终端所执行的动作。
图18示出了本申请实施例的访问本地网络的装置1800的示意性框图。
应理解,该装置1800可以对应于图7或图8所示的实施例中的终端,可以具有方法 中的终端的任意功能。该装置1800,包括收发模块1810和处理模块1820。
所述收发模块1810,用于接收触发消息,所述触发消息用于触发终端建立会话;
所述处理模块1820,用于根据所述触发消息,通过所述收发模块1210发送第一消息,所述第一消息用于请求建立第一会话,所述第一会话用于所述终端访问本地网络。
可选地,所述处理模块1820,还用于根据第一路由条件和第二路由条件,从第一会话和第二会话中为目标业务选择目标会话,所述第一路由条件对应于所述第一会话,所述第二路由条件对应于第二会话;
所述收发模块1810,还用于通过所述目标会话,发送所述目标业务。
可选地,所述第一消息包括第二会话的会话标识,所述第二会话用于所述终端访问中心网络,所述收发模块1810,还用于获取至少一个会话的会话标识和与所述至少一个会话的会话标识对应的至少一个本地网络的网络接入标识;所述处理模块1820具体用于:根据所述第二会话的会话标识,确定与所述第二会话的会话标识对应的所述目标网络接入标识。
图19示出了本申请实施例提供的访问本地网络的装置1900,该装置1900可以为图5中所述的终端。该装置可以采用如图19所示的硬件架构。该装置可以包括处理器1910和收发器1920,可选地,该装置还可以包括存储器1930,该处理器1910、收发器1920和存储器1930通过内部连接通路互相通信。图14中的处理模块1420所实现的相关功能可以由处理器1910来实现,收发模块1410所实现的相关功能可以由处理器1910控制收发器1920来实现。
可选地,处理器1910可以是一个通用中央处理器(central processing unit,CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),专用处理器,或一个或多个用于执行本申请实施例技术方案的集成电路。或者,处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。例如可以是基带处理器、或中央处理器。基带处理器可以用于对通信协议以及通信数据进行处理,中央处理器可以用于对访问本地网络的装置(如,基站、终端、或芯片等)进行控制,执行软件程序,处理软件程序的数据。
可选地,该处理器1910可以包括是一个或多个处理器,例如包括一个或多个中央处理单元(central processing unit,CPU),在处理器是一个CPU的情况下,该CPU可以是单核CPU,也可以是多核CPU。
该收发器1920用于发送和接收数据和/或信号,以及接收数据和/或信号。该收发器可以包括发射器和接收器,发射器用于发送数据和/或信号,接收器用于接收数据和/或信号。
该存储器1930包括但不限于是随机存取存储器(random access memory,RAM)、只读存储器(read-only memory,ROM)、可擦除可编程存储器(erasable programmable read only memory,EPROM)、只读光盘(compact disc read-only memory,CD-ROM),该存储器1930用于存储相关指令及数据。
存储器1930用于存储终端的程序代码和数据,可以为单独的器件或集成在处理器1910中。
具体地,所述处理器1910用于控制收发器与终端进行信息传输。具体可参见方法实施例中的描述,在此不再赘述。
在具体实现中,作为一种实施例,装置1900还可以包括输出设备和输入设备。输出设备和处理器1910通信,可以以多种方式来显示信息。例如,输出设备可以是液晶显示器(liquid crystal display,LCD),发光二级管(light emitting diode,LED)显示设备,阴极射线管(cathode ray tube,CRT)显示设备,或投影仪(projector)等。输入设备和处理器701通信,可以以多种方式接收用户的输入。例如,输入设备可以是鼠标、键盘、触摸屏设备或传感设备等。
可以理解的是,图19仅仅示出了访问本地网络的装置的简化设计。在实际应用中,该装置还可以分别包含必要的其他元件,包含但不限于任意数量的收发器、处理器、控制器、存储器等,而所有可以实现本申请的终端都在本申请的保护范围之内。
在一种可能的设计中,该装置1900可以是芯片,例如可以为可用于终端中的通信芯片,用于实现终端中处理器1910的相关功能。该芯片可以为实现相关功能的现场可编程门阵列,专用集成芯片,系统芯片,中央处理器,网络处理器,数字信号处理电路,微控制器,还可以采用可编程控制器或其他集成芯片。该芯片中,可选的可以包括一个或多个存储器,用于存储程序代码,当所述代码被执行时,使得处理器实现相应的功能。
本申请实施例还提供一种装置,该装置可以是终端,也可以是电路。该装置可以用于执行上述方法实施例中由终端所执行的动作。
图20示出了本申请实施例的访问本地网络的装置2000的示意性框图。
应理解,该装置2000可以对应于图5所示的实施例中的AMF,可以具有方法中的AMF的任意功能。该装置2000,包括收发模块2010和处理模块2020。
该收发模块2010,用于向终端发送触发消息,所述触发消息用于触发所述终端建立会话;
该收发模块2010,还用于接收来自所述终端的所述第一消息,所述第一消息用于请求建立第一会话,所述第一会话用于终端访问目标本地网络;
该处理模块2020,用于根据所述第一消息,确定目标网络接入标识,所述目标网络接入标识用于指示目标本地网络;
该处理模块2020,还用于根据所述目标网络接入标识,确定第一SMF;
该收发模块2010,还用于向所述第一SMF发送所述目标网络接入标识,所述目标网络接入标识用于所述第一SMF确定目标UPF。
可选地,所述第一消息包括第二会话的会话标识,所述第二会话用于所述终端访问中心网络,该收发模块2010,还用于获取至少一个会话的会话标识和与所述至少一个会话的会话标识对应的至少一个本地网络的网络接入标识;其中,所述处理模块2020具体用于:根据所述第二会话的会话标识和映射关系,确定与所述第二会话的会话标识对应的所述目标网络接入标识。
可选地,该收发模块2010,还用于接收来自第二SMF的所述映射关系,所述第二SMF用于终端建立所述第二会话。
图21示出了本申请实施例提供的访问本地网络的装置2100,该装置2100可以为图7中所述的AMF。该装置可以采用如图21所示的硬件架构。该装置可以包括处理器2110和收发器2120,可选地,该装置还可以包括存储器2130,该处理器2110、收发器2120和存储器2130通过内部连接通路互相通信。图20中的处理模块2020所实现的相关功能 可以由处理器2110来实现,收发模块2010所实现的相关功能可以由处理器2110控制收发器2120来实现。
可选地,处理器2110可以是一个通用中央处理器(central processing unit,CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),专用处理器,或一个或多个用于执行本申请实施例技术方案的集成电路。或者,处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。例如可以是基带处理器、或中央处理器。基带处理器可以用于对通信协议以及通信数据进行处理,中央处理器可以用于对访问本地网络的装置(如,基站、终端、或芯片等)进行控制,执行软件程序,处理软件程序的数据。
可选地,该处理器2110可以包括是一个或多个处理器,例如包括一个或多个中央处理单元(central processing unit,CPU),在处理器是一个CPU的情况下,该CPU可以是单核CPU,也可以是多核CPU。
该收发器2120用于发送和接收数据和/或信号,以及接收数据和/或信号。该收发器可以包括发射器和接收器,发射器用于发送数据和/或信号,接收器用于接收数据和/或信号。
该存储器2130包括但不限于是随机存取存储器(random access memory,RAM)、只读存储器(read-only memory,ROM)、可擦除可编程存储器(erasable programmable read only memory,EPROM)、只读光盘(compact disc read-only memory,CD-ROM),该存储器2130用于存储相关指令及数据。
存储器2130用于存储终端的程序代码和数据,可以为单独的器件或集成在处理器2110中。
具体地,所述处理器2110用于控制收发器与终端进行信息传输。具体可参见方法实施例中的描述,在此不再赘述。
在具体实现中,作为一种实施例,装置2100还可以包括输出设备和输入设备。输出设备和处理器2110通信,可以以多种方式来显示信息。例如,输出设备可以是液晶显示器(liquid crystal display,LCD),发光二级管(light emitting diode,LED)显示设备,阴极射线管(cathode ray tube,CRT)显示设备,或投影仪(projector)等。输入设备和处理器701通信,可以以多种方式接收用户的输入。例如,输入设备可以是鼠标、键盘、触摸屏设备或传感设备等。
可以理解的是,图21仅仅示出了访问本地网络的装置的简化设计。在实际应用中,该装置还可以分别包含必要的其他元件,包含但不限于任意数量的收发器、处理器、控制器、存储器等,而所有可以实现本申请的终端都在本申请的保护范围之内。
在一种可能的设计中,该装置2100可以是芯片,例如可以为可用于终端中的通信芯片,用于实现终端中处理器2110的相关功能。该芯片可以为实现相关功能的现场可编程门阵列,专用集成芯片,系统芯片,中央处理器,网络处理器,数字信号处理电路,微控制器,还可以采用可编程控制器或其他集成芯片。该芯片中,可选的可以包括一个或多个存储器,用于存储程序代码,当所述代码被执行时,使得处理器实现相应的功能。
本申请实施例还提供一种装置,该装置可以是AMF,也可以是电路。该装置可以用于执行上述方法实施例中由终端所执行的动作。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。 当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。
应理解,处理器可以是集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchronous link DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。
本申请中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少 一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。
应理解,说明书通篇中提到的“一个实施例”或“一实施例”意味着与实施例有关的特定特征、结构或特性包括在本申请的至少一个实施例中。因此,在整个说明书各处出现的“在一个实施例中”或“在一实施例中”未必一定指相同的实施例。此外,这些特定的特征、结构或特性可以任意适合的方式结合在一个或多个实施例中。应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
在本说明书中使用的术语“部件”、“模块”、“系统”等用于表示计算机相关的实体、硬件、固件、硬件和软件的组合、软件、或执行中的软件。例如,部件可以是但不限于,在处理器上运行的进程、处理器、对象、可执行文件、执行线程、程序和/或计算机。通过图示,在计算设备上运行的应用和计算设备都可以是部件。一个或多个部件可驻留在进程和/或执行线程中,部件可位于一个计算机上和/或分布在2个或更多个计算机之间。此外,这些部件可从在上面存储有各种数据结构的各种计算机可读介质执行。部件可例如根据具有一个或多个数据分组(例如来自与本地系统、分布式系统和/或网络间的另一部件交互的二个部件的数据,例如通过信号与其它系统交互的互联网)的信号通过本地和/或远程进程来通信。
还应理解,本文中涉及的第一、第二以及各种数字编号仅为描述方便进行的区分,并不用来限制本申请实施例的范围。
应理解,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。其中,单独存在A或B,并不限定A或B的数量。以单独存在A为例,可以理解为具有一个或多个A。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (31)

  1. 一种访问本地网络的方法,其特征在于,包括:
    获取第一网络接入标识,所述第一网络接入标识用于指示第一本地网络;
    向会话管理功能网元发送会话建立请求,所述会话建立请求用于请求建立第一会话,所述第一会话用于终端访问所述第一本地网络,且所述会话建立请求包括所述第一网络接入标识。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    获取至少一种业务和与所述至少一种业务对应的至少一个网络接入标识;
    其中,所述至少一种业务包括第一业务,所述获取第一网络接入标识包括:
    根据所述第一业务,确定与所述第一业务对应的所述第一网络接入标识,所述至少一个网络接入标识包括所述第一网络接入标识。
  3. 根据权利要求2所述的方法,其特征在于,所述获取至少一种业务和与所述至少一种业务对应的至少一个网络接入标识包括:
    接收来自接入和移动性管理功能的注册接受消息,所述注册接受消息包括所述至少一种业务和与所述至少一种业务对应的至少一个网络接入标识;或
    接收来自接入和移动性管理功能的配置更新命令消息,所述配置更新命令消息包括所述至少一种业务和与所述至少一种业务对应的至少一个网络接入标识。
  4. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    获取所述终端的至少一个位置与至少一个位置对应的至少一个网络接入标识;
    其中,所述终端的至少一个位置包括第一位置,所述获取第一网络接入标识包括:
    根据所述第一位置,确定与所述第一位置对应的所述第一网络接入标识,所述至少一个网络接入标识包括所述第一网络接入标识。
  5. 根据权利要求1至4中任一项所述的方法,其特征在于,所述方法还包括:
    根据所述第一位置和第一业务,确定与所述第一位置和所述第一业务对应的所述第一网络接入标识。
  6. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    接收来自所述会话管理功能网元的所述终端的第一位置对应的至少一个网络接入标识;
    其中,所述获取第一网络接入标识包括:
    从所述至少一个网络接入标识中确定所述第一网络接入标识。
  7. 根据权利要求6所述的方法,其特征在于,所述从所述至少一个网络接入标识中确定所述第一网络接入标识包括:
    根据第一业务,从所述至少一个网络接入标识中选择与所述第一业务对应的所述第一网络接入标识。
  8. 根据权利要求1至7中任一项所述的方法,其特征在于,所述方法还包括:
    获取至少一种业务和与所述至少一种业务对应的至少一个网络接入标识,所述至少一种业务包括第二业务;
    根据所述第二业务,确定所述第二业务对应的网络接入标识;
    根据所述第二业务对应的网络接入标识和所述第一网络接入标识的关系,发送所述第二业务。
  9. 根据权利要求8所述的方法,其特征在于,所述根据所述第二业务对应的网络接入标识和所述第一网络接入标识的关系,发送所述目标业务包括:
    若所述第二业务对应的网络接入标识和所述第一网络接入标识相同,则通过所述第一会话发送所述第二业务;
    若所述第二业务对应的网络接入标识和所述第一网络接入标识不同,则通过第二会话发送所述第二业务,所述第二会话用于所述终端访问中心网络;或
    若第二业务对应的网络接入标识和所述第一网络接入标识不同,则通过第三会话发送所述第二业务,所述第三会话用于所述终端访问所述第二业务对应的本地网络。
  10. 一种访问本地网络的方法,其特征在于,所述方法还包括:
    接收触发消息,所述触发消息用于触发终端建立会话;
    根据所述触发消息,发送第一消息,所述第一消息用于请求建立第一会话,所述第一会话用于所述终端访问本地网络。
  11. 根据权利要求10所述的方法,其特征在于,所述第一消息还包括第二会话的会话标识,所述第二会话用于所述终端访问中心网络。
  12. 根据权利要求10或11所述的方法,其特征在于,所述方法还包括:
    根据第一路由条件和第二路由条件,从所述第一会话和第二会话中为目标业务选择目标会话,所述第一路由条件对应于所述第一会话,所述第二路由条件对应于所述第二会话,所述第二会话用于所述终端访问中心网络;
    通过所述目标会话,发送所述目标业务。
  13. 根据权利要求10或11所述的方法,其特征在于,所述方法还包括:
    发送第一信息,所述第一信息包括目标业务的业务标识;
    接收第二信息,所述第二信息包括所述目标业务的业务标识对应的目标会话的会话标识;
    通过所述目标会话,发送所述目标业务。
  14. 一种访问本地网络的方法,其特征在于,包括:
    向终端发送触发消息,所述触发消息用于触发所述终端建立会话;
    接收来自所述终端的第一会话建立请求,所述第一会话建立请求用于请求建立第一会话,所述第一会话用于终端访问本地网络;
    根据所述第一会话建立请求,确定目标网络接入标识,所述目标网络接入标识用于指示目标本地网络;
    根据所述目标网络接入标识,确定目标用户面功能网元。
  15. 根据权利要求14所述的方法,其特征在于,所述第一会话请求包括第二会话的会话标识,所述第二会话用于所述终端访问中心网络,所述方法还包括:
    获取至少一个会话的会话标识和与所述至少一个会话的会话标识对应的至少一个本地网络的网络接入标识,所述至少一个会话的会话标识包括所述第二会话的会话标识;
    其中,所述根据所述第一会话建立请求,确定目标网络接入标识包括:
    根据所述第二会话的会话标识,确定与所述第二会话的会话标识对应的所述目标网络接入标识。
  16. 根据权利要求14或15所述的方法,其特征在于,所述方法还包括:
    删除所述目标网络接入标识。
  17. 根据权利要求14至16中任一项所述的方法,其特征在于,所述方法还包括:
    接收第一信息,所述第一信息包括目标业务的业务标识;
    确定所述目标业务的业务标识对应的目标会话的会话标识;
    发送第二信息,所述第二信息包括所述目标会话的会话标识。
  18. 一种访问本地网络的方法,其特征在于,包括:
    向终端发送触发消息,所述触发消息用于触发所述终端建立会话;
    接收来自所述终端的所述第一消息,所述第一消息用于请求建立第一会话,所述第一会话用于终端访问目标本地网络;
    根据所述第一消息,确定目标网络接入标识,所述目标网络接入标识用于指示目标本地网络;
    根据所述目标网络接入标识,确定第一会话管理功能网元;
    向所述第一会话管理功能网元发送所述目标网络接入标识,所述目标网络接入标识用于所述第一会话管理功能网元确定目标用户面功能网元。
  19. 根据权利要求18所述的方法,其特征在于,所述第一消息包括第二会话的会话标识,所述第二会话用于所述终端访问中心网络,所述方法还包括:
    获取至少一个会话的会话标识和与所述至少一个会话的会话标识对应的至少一个本地网络的网络接入标识;
    其中,所述根据所述第一消息,确定目标网络接入标识包括:
    根据所述第二会话的会话标识,确定与所述第二会话的会话标识对应的所述目标网络接入标识。
  20. 根据权利要求19所述的方法,其特征在于,所述获取至少一个会话的会话标识和与所述至少一个会话的会话标识对应的至少一个本地网络的网络接入标识包括:
    接收来自第二会话管理功能网元的所述至少一个会话的会话标识和与所述至少一个会话的会话标识对应的至少一个本地网络的网络接入标识,所述第二会话管理功能网元用于终端建立所述第二会话。
  21. 根据权利要求18至20中任一项所述的方法,其特征在于,所述方法还包括:
    在所述第一会话的建立过程中,删除所述目标网络接入标识。
  22. 根据权利要求18至21中任一项所述的方法,其特征在于,所述方法还包括:
    接收第一请求,所述第一请求包括目标网络接入标识;
    确定所述目标网络接入标识对应的目标会话的会话标识;
    向第一网元发送第一响应,所述第一响应包括所述目标会话的会话标识,或者
    向第二网元发送第二信息,所述第二信息包括所述目标会话的会话标识。
  23. 根据权利要求22所述的方法,其特征在于,在确定所述目标网络接入标识对应的目标会话的会话标识之前,所述方法还包括:
    获取所述目标网络接入标识与所述目标会话的会话标识的对应关系。
  24. 一种访问本地网络的方法,其特征在于,包括:
    接收第一信息,所述第一信息包括所述目标业务的业务标识;
    确定所述目标业务的业务标识对应的目标网络接入标识;
    发送第三信息,所述第三信息包括所述目标网络接入标识。
  25. 一种访问本地网络的方法,其特征在于,包括:
    接收第一信息,所述第一信息包括所述目标业务的业务标识;
    确定所述目标业务的业务标识对应的目标会话的会话标识;
    发送第二信息,所述第二信息包括所述目标会话的会话标识。
  26. 根据权利要求25所述的方法,其特征在于,所述方法还包括:
    获取第一对应关系,所述第一对应关系包括所述目标业务对应的目标网络接入标识与所述目标会话的会话标识标识的对应关系;以及
    确定所述目标业务的业务标识对应的目标会话的会话标识包括:
    根据所述第一对应关系所述目标业务的业务标识对应的目标会话的会话标识。
  27. 根据权利要求25所述的方法,其特征在于,确定所述目标业务的业务标识对应的目标会话的会话标识包括:
    确定所述目标业务的业务标识对应的目标网络接入标识;
    发送第一请求,所述第一请求用于请求所述目标网络接入标识对应的所述目标会话的会话标识;
    接收第一响应,所述第一响应包括所述目标会话的会话标识。
  28. 一种装置,其特征在于,包括处理器,用于调用存储器中存储的程序,以执行如权利要求1至27中任一项所述的方法。
  29. 一种装置,包括:处理器和接口电路,所述处理器用于通过所述接口电路与其它装置通信,并执行如权利要求1至27中任一项所述的方法。
  30. 一种计算机存储介质,其特征在于,所述计算机存储介质存储有指令,当所述指令运行时,实现如权利要求1至27中任一项所述的方法。
  31. 一种计算机程序产品,当其在处理器上运行时,使得处理器执行权利要求1至27中任一项所述的方法。
PCT/CN2021/107254 2020-07-31 2021-07-20 访问本地网络的方法和装置 WO2022022322A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP21850412.4A EP4185010A4 (en) 2020-07-31 2021-07-20 METHOD AND DEVICE FOR ACCESSING A LOCAL NETWORK
US18/161,885 US20230269794A1 (en) 2020-07-31 2023-01-30 Local network accessing method and apparatus

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
CN202010759371 2020-07-31
CN202010759371.3 2020-07-31
CN202110363865.4 2021-04-02
CN202110363865 2021-04-02
CN202110507770.5 2021-05-10
CN202110507770.5A CN114071649B (zh) 2020-07-31 2021-05-10 访问本地网络的方法和装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/161,885 Continuation US20230269794A1 (en) 2020-07-31 2023-01-30 Local network accessing method and apparatus

Publications (1)

Publication Number Publication Date
WO2022022322A1 true WO2022022322A1 (zh) 2022-02-03

Family

ID=80037531

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/107254 WO2022022322A1 (zh) 2020-07-31 2021-07-20 访问本地网络的方法和装置

Country Status (3)

Country Link
US (1) US20230269794A1 (zh)
EP (1) EP4185010A4 (zh)
WO (1) WO2022022322A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116528397A (zh) * 2023-06-29 2023-08-01 新华三技术有限公司 5g双域专网的实现方法及装置、5g双域专网系统
WO2023185836A1 (zh) * 2022-03-28 2023-10-05 维沃移动通信有限公司 边缘应用服务器选择的指示方法、终端及网络侧设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190053104A1 (en) * 2017-08-11 2019-02-14 Comcast Cable Communications, Llc Application-Initiated Network Slices in a Wireless Network
CN110167003A (zh) * 2018-01-12 2019-08-23 华为技术有限公司 会话管理方法、设备及系统
CN110166414A (zh) * 2018-02-14 2019-08-23 华为技术有限公司 一种通信方法、装置及系统
CN110650504A (zh) * 2018-06-26 2020-01-03 华为技术有限公司 一种会话处理方法及装置
CN111436160A (zh) * 2019-01-15 2020-07-21 华为技术有限公司 一种局域网通信方法、装置及系统

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10779254B2 (en) * 2017-08-16 2020-09-15 Electronics And Telecommunications Research Institute Service request method for 5G local service
CN117544941A (zh) * 2018-01-12 2024-02-09 华为技术有限公司 会话管理方法、设备及系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190053104A1 (en) * 2017-08-11 2019-02-14 Comcast Cable Communications, Llc Application-Initiated Network Slices in a Wireless Network
CN110167003A (zh) * 2018-01-12 2019-08-23 华为技术有限公司 会话管理方法、设备及系统
CN110166414A (zh) * 2018-02-14 2019-08-23 华为技术有限公司 一种通信方法、装置及系统
CN110650504A (zh) * 2018-06-26 2020-01-03 华为技术有限公司 一种会话处理方法及装置
CN111436160A (zh) * 2019-01-15 2020-07-21 华为技术有限公司 一种局域网通信方法、装置及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4185010A4

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023185836A1 (zh) * 2022-03-28 2023-10-05 维沃移动通信有限公司 边缘应用服务器选择的指示方法、终端及网络侧设备
CN116528397A (zh) * 2023-06-29 2023-08-01 新华三技术有限公司 5g双域专网的实现方法及装置、5g双域专网系统
CN116528397B (zh) * 2023-06-29 2023-09-19 新华三技术有限公司 5g双域专网的实现方法及装置、5g双域专网系统

Also Published As

Publication number Publication date
EP4185010A1 (en) 2023-05-24
EP4185010A4 (en) 2024-02-07
US20230269794A1 (en) 2023-08-24

Similar Documents

Publication Publication Date Title
US11432366B2 (en) Session management method, device, and system
US20230093339A1 (en) Session Management Method, Apparatus, and System
WO2022012310A1 (zh) 一种通信方法及装置
WO2019137207A1 (zh) 事件通知方法及相关设备
US12004264B2 (en) Session management method, device, and system
KR20210127827A (ko) 데이터 전송 방법, 장치, 및 시스템
WO2021135663A1 (zh) 应用实例确定的方法、装置及系统
CN114270789B (zh) 一种获取信息的方法及装置
WO2023280121A1 (zh) 一种获取边缘服务的方法和装置
US20230254364A1 (en) Method and apparatus for transferring an edge computing application
EP4024956A1 (en) Communication method, apparatus, and system
WO2020015634A1 (zh) 一种mec信息获取方法及装置
WO2017113130A1 (zh) 一种资源请求方法、设备、网络侧节点及系统
WO2021051420A1 (zh) 一种dns缓存记录的确定方法及装置
WO2023011217A1 (zh) 一种通信方法及装置
US11082893B2 (en) Session migration method and device applied to a UE tracking area update
US20230269794A1 (en) Local network accessing method and apparatus
WO2021197155A1 (zh) 一种通信方法及装置
US20220272577A1 (en) Communication method and communication apparatus
KR20210144490A (ko) 무선 통신 시스템에서 단말로 지역 데이터 네트워크 정보를 제공하기 위한 방법 및 장치
WO2022001298A1 (zh) 通信方法和通信装置
WO2023087965A1 (zh) 一种通信方法及装置
CN114071649B (zh) 访问本地网络的方法和装置
WO2022213824A1 (zh) 一种用于传输上下文的方法和通信装置
US20230137283A1 (en) Systems and methods to optimize registration and session establishment in a wireless network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21850412

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2021850412

Country of ref document: EP

Effective date: 20230216

NENP Non-entry into the national phase

Ref country code: DE