WO2022170798A1 - Procédé de détermination de stratégie et appareil de communication - Google Patents

Procédé de détermination de stratégie et appareil de communication Download PDF

Info

Publication number
WO2022170798A1
WO2022170798A1 PCT/CN2021/129713 CN2021129713W WO2022170798A1 WO 2022170798 A1 WO2022170798 A1 WO 2022170798A1 CN 2021129713 W CN2021129713 W CN 2021129713W WO 2022170798 A1 WO2022170798 A1 WO 2022170798A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
network element
information
service
service chain
Prior art date
Application number
PCT/CN2021/129713
Other languages
English (en)
Chinese (zh)
Inventor
周晓云
朱奋勤
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022170798A1 publication Critical patent/WO2022170798A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/50Service provisioning or reconfiguring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/66Policy and charging system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/68Payment of value-added services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing

Definitions

  • the present application relates to the field of communication technologies, and in particular, to a method and a communication device for determining a strategy.
  • a protocol data unit (PDU) session (PDU session) is established, and the user accesses the external data network through the PDU session to communicate with Interaction with application servers deployed in the data network.
  • PDU session protocol data unit
  • QoE quality of experience
  • the present application provides a method and a communication device for determining a strategy, so as to quickly respond to the rapidly changing requirements of the business chain.
  • a method for determining a policy is provided, and the method may be executed by a network device, or may also be executed by a chip, a chip system, or a circuit used for the network device, which is not limited in this application.
  • the following description is performed by taking the execution by the first network element as an example.
  • the method may include: the first network element receives a first request message from the second network element, where the first request message includes information of a service chain required by the application; the first network element sends the service chain corresponding to the application to the third network element Strategy, the business chain strategy corresponding to the application is formulated according to the information of the business chain required by the application.
  • the first network element may be, for example, a policy control function (policy control function, PCF) network element, or a visited-policy control function (visited-policy control function, V-PCF) network element, or the like.
  • policy control function policy control function
  • V-PCF visited-policy control function
  • the second network element may be, for example, an application function (application function, AF) network element, or a capability exposure function (network exposure function, NEF) network element, or the like.
  • application function application function
  • NEF network exposure function
  • the third network element can be, for example, a session management function (session management function, SMF) network element, or other network devices that can implement the function of the network element.
  • SMF session management function
  • the first request message may be a data-oriented message, or may also be a quality of service request message.
  • the method may further include: formulating a service chain policy corresponding to the application according to the service chain information required by the application.
  • Formulate the business chain policy corresponding to the application for example, it can be understood as formulating a traffic steering policy (TSP) for the application accessed by the user.
  • TSP traffic steering policy
  • the information of the service chain required by the application can be carried when requesting to formulate a service chain policy. Therefore, the first network element can determine whether to authorize according to the information of the service chain required by the application carried in the request, or the first network element can directly formulate a service chain policy according to the information of the service chain required by the application carried in the request. Therefore, it is possible to quickly respond to the rapidly changing demands of the application on the business chain.
  • the information of the service chain required by the application is the service chain identifier required by the application.
  • the first network element may formulate a service chain policy corresponding to the application based on the service chain identifier required by the application.
  • the information of the service chain required by the application is information of one or more service functions required by the application.
  • the first network element may formulate a service chain policy corresponding to the application based on the information of one or more service functions required by the application.
  • the method further includes: the first network element, according to the information of one or more service functions required by the application, determines information of one or more service functions that support the application , and send information supporting one or more service functions of the application to the second network element.
  • the first network element may determine the information of one or more service functions of the supported application based on the information of one or more service functions required by the application, for example, the one or more service functions of the supported application, A business function that is part of one or more business functions required by an application. Therefore, the second network element can flexibly adjust and process based on the information of one or more service functions supported by the first network element.
  • the information of one or more service functions is an identifier or type of one or more service functions.
  • the service function can be identified by an identifier or a type.
  • the first network element receives a first request message from the second network element, where the first request message includes information about a service chain required by the application, including: a first The network element receives the first request message from the second network element, where the first request message includes the correspondence between the information of the service chain required by the application and the data network access identifier.
  • the information of the service chain required by the application included in the first request message is specifically the correspondence between the information of the service chain required by the application and the data network access identifier.
  • the first request message specifically includes the correspondence between the service chain identifier required by the application and the data network access identifier.
  • the first request message specifically includes the correspondence between one or more service functions required by the application and the data network access identifier.
  • the first request message can carry the correspondence between the information of the service chain required by the application and the data network access identifier, so that the service chain corresponding to the application can be determined according to the information of the service chain required by the application strategy, and then the corresponding relationship between the service chain strategy and the data network access identifier can be obtained.
  • the first network element sends to the third network element the correspondence between the service chain policy corresponding to the application and the data network access identifier.
  • the correspondence between the service chain policy corresponding to the application and the data network access identifier is determined according to the correspondence between the service chain information required by the application and the data network access identifier.
  • the method further includes: the first network element sends a second request message to the fourth network element, where the second request message includes the service chain policy corresponding to the application and the information for accessing the application.
  • the identifier of the user, and the second request message is used to request authorization for the service chain policy corresponding to the application accessed by the user.
  • the first network element formulates the service chain policy according to the request, it can send the service chain policy to the fourth network element for further authorization by the fourth network element.
  • the method further includes: before the first network element sends the second request message to the fourth network element, the method further includes: the first network element receives the third network element The first data network access identifier sent, the first network element determines the service chain policy corresponding to the user access application according to the first data network access identifier; or, the first network element receives the user access application sent by the third network element. business chain strategy.
  • the service chain policy corresponding to the application there is a correspondence between the service chain policy corresponding to the application and the data network access identifier, where the data network access identifier includes the first data network access identifier.
  • the method further includes: the first network element sends a third request message to the fourth network element, where the third request message includes information about one or more supported service functions and the identity of the user accessing the application, the third request message is used to request authorization for information on one or more service functions supported by the accessed application.
  • the first network element determines the supported service function according to the request, it can send the information of the service function to the fourth network element, so as to further perform further operations on the fourth network element. authorized.
  • the method before the first network element sends the third request message to the fourth network element, the method further includes: the first network element receives the first network element sent by the third network element A data network access identifier, one or more service functions of applications that support user access are determined according to the first data network access identifier; or, the first network element receives a service chain policy corresponding to the user access application sent by the third network element, One or more service functions of the application that supports the user's access are determined according to the service chain policy corresponding to the user-accessed application.
  • the service chain policy corresponding to the application there is a correspondence between the service chain policy corresponding to the application and the data network access identifier, where the data network access identifier includes the first data network access identifier.
  • a method for determining a policy is provided, and the method may be executed by a network device, or may also be executed by a chip, a chip system, or a circuit used for the network device, which is not limited in this application.
  • the following description is performed by taking the execution by the second network element as an example.
  • the method may include: sending a first request message to a first network element, where the first request message includes service chain information required by the application; and receiving indication information from the first network element, where the indication information is used to indicate acceptance of the service chain required by the application business chain request.
  • the second network element may be, for example, an AF network element, a NEF network element, or the like.
  • the information of the service chain required by the application can be carried when requesting to formulate a service chain policy. Therefore, the first network element can be made to determine whether to authorize according to the information of the service chain required by the application carried in the request, or directly formulate a service chain policy according to the information of the service chain required by the application carried in the request.
  • the solution provided by the embodiments of the present application can quickly respond to the rapidly changing requirements of the application on the service chain.
  • the information of the service chain required by the application is any one of the following: the service chain identifier required by the application, the external service chain identifier required by the application, the service chain identifier required by the application.
  • the method further includes: the second network element receives information from the first network element that supports one or more service functions of the application.
  • the information of the service chain required by the application is the information of one or more service functions required by the application.
  • the method further includes: the second network element receiving information from the first network element that supports one or more external service functions of the application.
  • the information of the service chain required by the application is the information of one or more external service functions required by the application.
  • the information of one or more service functions is the identification or type of one or more service functions.
  • the method before sending the first request message to the first network element, the method further includes: the second network element sends a second request message to the fifth network element, the second The request message includes the information of the queried service chain; the second network element receives one or more of the following information of the queried service chain from the fifth network element: service function identifier, service chain identifier, service function identifier and data network connection.
  • service function identifier the information of the queried service chain
  • service function identifier includes the information of the queried service chain
  • service function identifier includes the information of the queried service chain
  • service function identifier includes the information of the queried service chain
  • service function identifier includes the information of the queried service chain
  • service function identifier includes the information of the queried service chain
  • service function identifier includes the information of the queried service chain
  • data network connection includes the access identifier, service chain identifier, service function identifier and data network connection.
  • the information of the queried business chain includes the type of the queried business function.
  • the second network element can dynamically request the service chain. For example, the second network element can obtain the corresponding service function or service chain through query.
  • a method for determining a policy is provided, and the method may be executed by a network device, or may also be executed by a chip, a chip system or a circuit used for the network device, which is not limited in this application.
  • the execution by the fifth network element is taken as an example for description below.
  • the method may include: the fifth network element receives a request message from the second network element, where the request message includes the information of the service chain required by the application; the fifth network element processes the information of the service chain required by the application, and sends the request message to the third network element.
  • a network element sends the information of the processed service chain.
  • the fifth network element can be, for example, an NEF network element, or other network devices that can implement the function of the network element.
  • the requested information can carry the information of the service chain required by the application, and then the fifth network element can first perform the processing of the service chain required by the application.
  • the information of the service chain required by the application is processed, and then the processed information is sent to the first network element.
  • the first network element can determine the corresponding service chain policy based on the request of the second network element, or perform authorization. Therefore, it is possible to quickly respond to the rapidly changing demands of the application on the business chain.
  • the information of the service chain required by the application is an external service chain identifier required by the application
  • the fifth network element processes the information of the service chain required by the application, Including: the fifth network element maps the external service chain identifier to the internal service chain identifier; the fifth network element sends the processed service chain information to the first network element, including: the fifth network element sends the internal service chain to the first network element.
  • Business chain logo is an external service chain identifier required by the application
  • the fifth network element processes the information of the service chain required by the application, Including: the fifth network element maps the external service chain identifier to the internal service chain identifier; the fifth network element sends the processed service chain information to the first network element, including: the fifth network element sends the internal service chain to the first network element.
  • the information of the service chain required by the application is the information of the external service function required by the application
  • the fifth network element processes the information of the service chain required by the application , including: the fifth network element maps the external service function to the internal service function; the fifth network element sends the information of the processed service chain to the first network element, including: the fifth network element sends the internal service to the first network element function information.
  • the method further includes: a fifth network element determining one or more external service functions that support the application according to information of one or more external service functions required by the application information, and send information supporting one or more external service functions of the application to the second network element.
  • the information of the one or more external service functions is the identification or type of the one or more external service functions.
  • the information of the service chain required by the application is the correspondence between the external service chain identifier required by the application and the data network access identifier, or, the information required by the application
  • the information of the service chain is the correspondence between one or more external service functions required by the application and the data network access identifier.
  • the information of the service chain required by the application is the correspondence between the external service chain identifier required by the application and the data network access identifier, and the fifth network element pairs
  • the processing of the information of the service chain required by the application includes: the fifth network element maps the external service chain identifier to the internal service chain identifier; the fifth network element sends the processed service chain information to the first network element, including: The fifth network element sends the first network element the correspondence between the internal service chain identifier required by the application and the data network access identifier.
  • the information of the service chain required by the application is the correspondence between the external service function required by the application and the data network access identifier
  • the fifth network element is used for the application. Processing the required service chain information, including: the fifth network element maps external service functions to internal service functions; the fifth network element sends the processed service chain information to the first network element, including: the fifth network element The element sends the corresponding relationship between the internal service function required by the application and the data network access identifier to the first network element.
  • the method further includes: the fifth network element receives a registration request message from the service chain management device, where the registration request message includes one of the following items of the registered service chain or Multiple pieces of information: correspondence between business function types and business function identifiers, correspondence between business function types and external business chain identifiers, business function types, correspondence between business function identifiers and data network access identifiers, business function identifiers, external business The correspondence between the chain identifier and the correspondence between the data network access identifier.
  • a method for determining a policy is provided, and the method may be executed by a network device, or may also be executed by a chip, a chip system, or a circuit used for the network device, which is not limited in this application.
  • the following description is performed by taking the execution by the third network element as an example.
  • the method may include: the third network element receiving information on the correspondence between the service chain policy corresponding to the application of the first network element and the data network access identifier, wherein the data network access identifier includes the first data network access identifier identifier; the third network element selects the user plane network element according to the first data network access identifier, and instructs the user plane network element to execute the first service chain policy, where the first service chain policy is the service chain corresponding to the first data network access identifier Strategy.
  • the third network element can be, for example, an SMF network element, or other network devices that can implement the function of the network element.
  • the method further includes: the third network element sends the first data network access identifier to the first network element; or the third network element sends the first network element The first business chain strategy.
  • a method for determining a policy is provided, and the method may be executed by a network device, or may also be executed by a chip, a chip system, or a circuit used for the network device, which is not limited in this application.
  • the following description is performed by taking the execution by the first network element as an example.
  • the method may include: the first network element sends a request message to the fourth network element, where the request message is used to request authorization of one or more service functions, or the request message is used to request authorization of a service chain policy corresponding to the application; The first network element receives a response message to the request message from the fourth network element.
  • the first network element may be, for example, a V-PCF network element, etc., or other network devices that can implement the function of the network element;
  • the fourth network element may be, for example, a home-policy control function (home-policy control function, H-PCF) network element, etc., or other network devices that can implement the function of the network element.
  • H-PCF home-policy control function
  • a method for determining a policy is provided, and the method may be executed by a network device, or may also be executed by a chip, a chip system, or a circuit used for the network device, which is not limited in this application.
  • the following description is given by taking the execution by the fourth network element as an example.
  • the method may include: the fourth network element receives a request message from the first network element, where the request message is used to request authorization of one or more service functions, or the request message is used to request authorization of a service chain policy corresponding to the application ; the fourth network element sends a response message to the request message to the first network element.
  • the fourth network element After the fourth network element performs authorization, it sends confirmation information indicating acceptance.
  • the first network element after the first network element formulates the service chain policy according to the request, it can send the service chain policy to the fourth network element for further authorization by the fourth network element. Or, after determining the supported service function according to the request, the first network element may send the information of the service function to the fourth network element, so as to perform further authorization of the fourth network element.
  • the first network element sends a request message to the fourth network element, where the request message includes the service chain policy corresponding to the application and the identifier of the user accessing the application, the request message It is used to request authorization for the business chain policy corresponding to the application accessed by the user.
  • the first network element sends a request message to the fourth network element, where the request message includes information of one or more service functions and an identifier of a user accessing the application, the request The message is used to request authorization of information for one or more business functions of the application accessed by the user.
  • a seventh aspect provides a service chain management method, which can be executed by a network device, or can also be executed by a chip, a chip system, or a circuit used for the network device, which is not limited in this application, for the convenience of description , which is described below by taking the execution by the fifth network element as an example.
  • the method may include: the fifth network element receives a request message from the second network element, where the request message includes information of the queried service chain; the fifth network element sends a response message to the second network element, where the response message is used to indicate the supported business chain information.
  • the method may further include: the fifth network element receives a registration request message from a service chain manager (service chain manager), where the registration request message includes one or more of the following information of the registered service chain: service function type Correspondence between business function identifiers, business function types and external business chain identifiers, business function types, business function identifiers and data network access identifiers, business function identifiers, external business chain identifiers and data network access identifiers The corresponding relationship of the corresponding relationship of the identification.
  • service chain manager service chain manager
  • a service chain management method is provided.
  • the method can be executed by a network device, or can also be executed by a chip, a chip system or a circuit used for the network device, which is not limited in this application, for the convenience of description , which is described below by taking the execution by the second network element as an example.
  • the method may include: the second network element sends a request message to the fifth network element, where the request message includes information of the queried service chain; the second network element receives a response message from the fifth network element, where the response message is used to indicate the supported business chain information.
  • the second network element can dynamically request the service chain. For example, the second network element can obtain the corresponding service function or service chain through query.
  • the information of the queried service chain carried in the request message includes: the type of the required service function (service function) and the data network access identification information.
  • the fifth network element may return, according to the data network access identifier information, the service function or service chain identifier supported by the data network access identifier and the included service function type.
  • the fifth network element may return the corresponding service function identifier or service chain identifier and the included service function type according to the type of the service function.
  • a communication device is provided, and the device is configured to perform the methods provided in the above-mentioned first to eighth aspects.
  • the apparatus may include units and/or modules for executing the methods provided in the first to eighth aspects, such as a processing unit and/or a communication unit.
  • the apparatus is a network device.
  • the communication unit may be a transceiver, or an input/output interface;
  • the processing unit may be a processor.
  • the apparatus is a chip, a system of chips, or a circuit used in a network device.
  • the communication unit may be an input/output interface, interface circuit, output circuit, input circuit, pin or related circuit on the chip, chip system or circuit etc.
  • the processing unit may be a processor, a processing circuit or a logic circuit, or the like.
  • the device is the first network element or a chip, a chip system or a circuit in the first network element.
  • the apparatus may include units and/or modules for performing the methods provided in the first and fifth aspects, such as a processing unit and/or a communication unit.
  • the device is the second network element or a chip, a chip system or a circuit in the second network element.
  • the apparatus may include units and/or modules for performing the methods provided in the second aspect and the eighth aspect, such as a processing unit and/or a communication unit.
  • the device is a third network element or a chip, a chip system or a circuit in the third network element.
  • the apparatus may comprise units and/or modules for performing the method provided by the fourth aspect, such as a processing unit and/or a communication unit.
  • the device is a fourth network element or a chip, a chip system or a circuit in the fourth network element.
  • the apparatus may comprise units and/or modules for performing the method provided by the sixth aspect, such as a processing unit and/or a communication unit.
  • the apparatus is a fifth network element or a chip, a chip system or a circuit in the fifth network element.
  • the apparatus may include units and/or modules for performing the methods provided in the third and seventh aspects, such as a processing unit and/or a communication unit.
  • the above transceiver may be a transceiver circuit.
  • the above-mentioned input/output interface may be an input/output circuit.
  • a communication device comprising: a memory for storing a program; a processor for executing a program stored in the memory, and when the program stored in the memory is executed, the processor is configured to execute the above-mentioned first aspect to The method provided by the eighth aspect.
  • the apparatus is a network device (such as each of the above network elements).
  • the apparatus is a chip, a chip system or a circuit used in a network device (eg, each of the above network elements).
  • the present application provides a processor for executing the methods provided by the above aspects.
  • the process of sending the above-mentioned information and obtaining/receiving the above-mentioned information in the above-mentioned methods can be understood as the process of outputting the above-mentioned information by the processor and the process of receiving the above-mentioned input information by the processor.
  • the processor When outputting the above-mentioned information, the processor outputs the above-mentioned information to the transceiver for transmission by the transceiver. After the above information is output by the processor, other processing may be required before reaching the transceiver.
  • the transceiver obtains/receives the above-mentioned information, and inputs it into the processor. Furthermore, after the transceiver receives the above-mentioned information, the above-mentioned information may need to perform other processing before being input to the processor.
  • the receiving request message mentioned in the foregoing method can be understood as the processor receiving the input information.
  • the above-mentioned processor may be a processor specially used to execute these methods, or may be a processor that executes computer instructions in a memory to execute these methods, such as a general-purpose processor.
  • the above-mentioned memory can be a non-transitory (non-transitory) memory, such as a read-only memory (Read Only Memory, ROM), which can be integrated with the processor on the same chip, or can be set on different chips respectively.
  • ROM read-only memory
  • the embodiment does not limit the type of the memory and the setting manner of the memory and the processor.
  • a twelfth aspect provides a computer-readable storage medium, where the computer-readable medium stores program codes for device execution, the program codes including methods for executing the above-mentioned first to eighth aspects.
  • a thirteenth aspect provides a computer program product comprising instructions, which, when the computer program product runs on a computer, causes the computer to execute the methods provided in the first to eighth aspects above.
  • a fourteenth aspect provides a chip, the chip includes a processor and a communication interface, the processor reads an instruction stored in a memory through the communication interface, and executes the methods provided in the first to eighth aspects.
  • the chip may further include a memory, in which instructions are stored, the processor is configured to execute the instructions stored in the memory, and when the instructions are executed, the The processor is configured to execute the methods provided in the first to eighth aspects above.
  • a fifteenth aspect provides a communication system, including one or more of the following: a first network element, a second network element, a third network element, a fourth network element, and a fifth network element.
  • FIG. 1 shows a schematic diagram of a network architecture suitable for this embodiment of the present application.
  • FIG. 2 shows another schematic diagram of a network architecture suitable for this embodiment of the present application.
  • FIG. 3 is a schematic diagram of a method 300 for determining a strategy provided by an embodiment of the present application.
  • FIG. 4 is a schematic diagram of a method 400 for determining a policy according to another embodiment of the present application.
  • FIG. 5 is a schematic flowchart of a determination strategy applicable to an embodiment of the present application.
  • FIG. 6 is another schematic flowchart of a determination strategy applicable to an embodiment of the present application.
  • FIG. 7 is another schematic flowchart of a determination strategy applicable to an embodiment of the present application.
  • FIG. 8 is another schematic flowchart of a determination strategy applicable to an embodiment of the present application.
  • FIG. 9 is another schematic flowchart of a determination strategy applicable to an embodiment of the present application.
  • FIG. 10 is another schematic flowchart of a determination strategy applicable to an embodiment of the present application.
  • FIG. 11 is a schematic flowchart of business chain management applicable to this embodiment of the present application.
  • FIG. 12 is a schematic block diagram of a communication apparatus provided according to an embodiment of the present application.
  • FIG. 13 is another schematic block diagram of a communication apparatus provided according to an embodiment of the present application.
  • FIG. 14 is a schematic structural diagram of a communication apparatus provided by an embodiment of the present application.
  • the technical solutions of the embodiments of the present application can be applied to various communication systems, for example, fifth generation (5th generation, 5G) systems or new radio (NR), long term evolution (LTE) systems, LTE frequency Division duplex (frequency division duplex, FDD) system, LTE time division duplex (time division duplex, TDD) and so on.
  • LTE long term evolution
  • LTE frequency Division duplex frequency division duplex
  • FDD frequency division duplex
  • TDD time division duplex
  • the technical solutions provided in this application can also be applied to future communication systems, such as the sixth generation mobile communication system.
  • the technical solutions of the embodiments of the present application can also be applied to device to device (D2D) communication, vehicle-to-everything (V2X) communication, machine to machine (M2M) communication, machine Machine type communication (MTC), and Internet of things (IoT) communication systems or other communication systems.
  • D2D device to device
  • V2X vehicle-to-everything
  • M2M machine to machine
  • MTC machine
  • FIG. 1 and FIG. 2 To facilitate understanding of the embodiments of the present application, a communication system applicable to the embodiments of the present application is first described in detail with reference to FIG. 1 and FIG. 2 .
  • FIG. 1 shows a schematic diagram of a network architecture suitable for this embodiment of the present application.
  • the network architecture may include, but is not limited to, the following, for example: user equipment (user equipment, UE), access network (access network, AN), access and mobility management function (access and mobility management function, AMF) network element, session management function (SMF) network element, user plane function (UPF) network element, policy control function (PCF) network element, unified data management (unified data) network element management, UDM) network element, application function (application function, AF), data network (data network, DN), etc.
  • user equipment user equipment
  • UE access network
  • AMF access and mobility management function
  • SMF session management function
  • UPF user plane function
  • PCF policy control function
  • UDM unified data management
  • application function application function, AF
  • data network data network
  • DN data network
  • Terminal equipment can be called user equipment (UE), access terminal, subscriber unit, subscriber station, mobile station, mobile station (MS), mobile terminal (MT), remote station , remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user equipment.
  • the terminal device may be a device that provides voice/data connectivity to the user, such as a handheld device with a wireless connection function, a vehicle-mounted device, and the like.
  • terminals can be: mobile phone (mobile phone), tablet computer (pad), computer with wireless transceiver function (such as notebook computer, palmtop computer, etc.), mobile internet device (mobile internet device, MID), virtual reality (virtual reality, VR) equipment, augmented reality (augmented reality, AR) equipment, wireless terminals in industrial control (industrial control), wireless terminals in unmanned driving (self driving), wireless terminals in remote medical (remote medical) Terminal, wireless terminal in smart grid, wireless terminal in transportation safety, wireless terminal in smart city, wireless terminal in smart home, cellular phone, cordless Telephone, session initiation protocol (SIP) telephone, wireless local loop (WLL) station, personal digital assistant (PDA), handheld device, computing device or connection with wireless communication capabilities
  • Other processing equipment to wireless modems in-vehicle equipment, wearable equipment, terminal equipment in 5G networks or terminal equipment in the future evolved public land mobile network (PLMN), etc.
  • PLMN public land mobile network
  • the terminal device may also be a terminal device in an Internet of things (Internet of things, IoT) system.
  • IoT Internet of things
  • Its main technical feature is to connect items to the network through communication technology, so as to realize the intelligent network of human-machine interconnection and interconnection of things.
  • IoT technology can achieve massive connections, deep coverage, and terminal power saving through, for example, narrow band (NB) technology.
  • NB narrow band
  • terminal equipment can also include sensors such as smart printers, train detectors, and gas stations.
  • the main functions include collecting data (part of terminal equipment), receiving control information and downlink data of network equipment, and sending electromagnetic waves to transmit uplink data to network equipment. .
  • the terminal device may be any device that can access the network.
  • a certain air interface technology can be used to communicate with each other between the terminal device and the access network device.
  • the UE may be used to act as a base station.
  • a UE may act as a scheduling entity that provides sidelink signals between UEs in V2X or D2D or the like.
  • UEs may be used to act as a base station.
  • a UE may act as a scheduling entity that provides sidelink signals between UEs in V2X or D2D or the like.
  • cell phones and automobiles communicate with each other using sidelink signals. Communication between cell phones and smart home devices without relaying communication signals through base stations.
  • Access network The access network can provide network access functions for authorized users in a specific area, including radio access network (RAN) equipment and AN equipment.
  • the RAN equipment is mainly the 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP) network wireless network equipment, and the AN equipment may be the access network equipment defined by non-3GPP (non-3GPP).
  • 3GPP 3rd Generation Partnership Project
  • the access network may be an access network using different access technologies.
  • 3GPP access technologies such as those employed in 3G, 4G or 5G systems
  • non-3GPP (non-3GPP) access technologies 3GPP access technology refers to the access technology that conforms to the 3GPP standard specifications.
  • the access network equipment in the 5G system is called the next generation Node Base station (gNB) or RAN.
  • Non-3GPP access technologies refer to access technologies that do not conform to 3GPP standards, such as air interface technologies represented by access points (APs) in wireless fidelity (WiFi), global interconnection microwave access (worldwide interoperability for microwave access, WiMAX), code division multiple access (code division multiple access, CDMA) networks, etc.
  • the access network equipment (AN equipment) can allow the terminal equipment and the 3GPP core network to use non-3GPP technology for interconnection and intercommunication.
  • An access network that implements an access network function based on a wireless communication technology may be referred to as a RAN.
  • the radio access network can be responsible for functions such as radio resource management, quality of service (QoS) management, data compression and encryption on the air interface side.
  • QoS quality of service
  • the wireless access network provides access services for terminal equipment, and then completes the forwarding of control signals and user data between the terminal and the core network.
  • a radio access network may include, but is not limited to, a macro base station, a micro base station (also called a small cell), a radio network controller (RNC), a Node B (Node B, NB), a base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved NodeB, or home Node B, HNB), baseband unit (baseband unit, BBU), AP in WiFi systems, wireless Relay node, wireless backhaul node, transmission point (TP) or transmission and reception point (TRP), etc. It can also be a gNB or a transmission point (TRP or TRP) in a 5G (eg, NR) system.
  • RNC radio network controller
  • Node B Node B
  • BSC base station controller
  • base transceiver station base transceiver station
  • BTS home base station
  • home base station for example, home evolved NodeB, or home Node B, HNB
  • TP one or a group (including multiple antenna panels) antenna panels of a base station in a 5G system, or, it can also be a network node that constitutes a gNB or a transmission point, such as a baseband unit (BBU), or a distributed unit ( distributed unit, DU), or the base station in the next-generation communication 6G system, etc.
  • BBU baseband unit
  • DU distributed unit
  • the embodiments of the present application do not limit the specific technology and specific device form adopted by the wireless access network device.
  • the access network may provide services to the cell.
  • the terminal device may communicate with the cell through transmission resources (eg, frequency domain resources, or spectrum resources) allocated by the access network device.
  • transmission resources eg, frequency domain resources, or spectrum resources
  • AMF network element mainly used for mobility management and access management, such as user location update, user registration network, user switching, etc.
  • AMF can also be used to implement other functions than session management in mobility management entity (mobility management entity, MME). For example, legal interception, or access authorization (or authentication) and other functions.
  • SMF network element It is mainly used for session management, UE's Internet Protocol (IP) address allocation and management, selection of user plane functions that can be managed, policy control, or termination point of charging function interfaces, and downlink data notification, etc.
  • IP Internet Protocol
  • the SMF main user is responsible for session management in the mobile network, such as session establishment, modification, release, and the like.
  • Specific functions may include, for example, assigning IP addresses to terminal devices, selecting UPFs that provide packet forwarding functions, and the like.
  • UPF network element responsible for the forwarding and reception of user data in the terminal equipment.
  • the UPF network element can receive user data from the data network (DN), and transmit it to the terminal equipment through the access network equipment.
  • the UPF network element can also receive user data from the terminal device through the access network device and forward it to the data network.
  • the transmission resources and scheduling functions that provide services to terminal equipment in the UPF network element are managed and controlled by the SMF network element.
  • PCF network element a unified policy framework for guiding network behavior, providing policy rule information for control plane functional network elements (such as AMF, SMF network elements, etc.), and being responsible for acquiring user subscription information related to policy decision-making.
  • control plane functional network elements such as AMF, SMF network elements, etc.
  • AF network element mainly supports interaction with the 3GPP core network to provide services, such as influencing data routing decisions, interacting with policy control functions (PCF), or providing third parties to the network side.
  • PCF policy control functions
  • UDM network element used to generate authentication credential, user identification processing (such as storing and managing user permanent identity, etc.), access authorization control and contract data management, etc.
  • Data Network A service network for providing data services to users.
  • the Internet Internet
  • a third-party service network an IP multimedia service (IP multi-media service, IMS) network, etc.
  • IP multimedia service IP multi-media service, IMS
  • each network element can communicate with each other through the interfaces shown in the figure, and some interfaces can be implemented in the form of service-oriented interfaces.
  • the UE and the AMF can interact through the N1 interface, and the interactive message can be called, for example, an N1 message (N1 Message).
  • the RAN and the AMF can interact through the N2 interface, and the N2 interface can be used for sending non-access stratum (NAS) messages.
  • the RAN and the UPF can interact through the N3 interface, and the N3 interface can be used to transmit data on the user plane.
  • the SMF and the UPF can interact through the N4 interface, and the N4 interface can be used to transmit information such as the tunnel identification information of the N3 connection, the data buffer indication information, and the downlink data notification message.
  • the AF and PCF can interact through the N5 interface, and the N5 interface can be used for application service request delivery and network events.
  • the UPF and the DN can interact through the N6 interface, and the N6 interface can be used to transmit data on the user plane.
  • the PCF and the SMF can interact through the N7 interface, and the N7 interface can be used to deliver protocol data unit (PDU) session (PDU session) granularity and business data flow granularity control policies.
  • the AMF and the UDM can interact through the N8 interface.
  • the N8 interface can be used by the AMF to obtain access and mobility management-related subscription data and authentication data from the UDM, and to register the UE's current mobility management-related information with the UDM.
  • the SMF and the UDM can interact through the N10 interface, and the N10 interface can be used for the SMF to obtain the session management-related subscription data from the UDM, and the SMF to register the UE's current session related information with the UDM.
  • the SMF and AMF can interact through the N11 interface, and the N11 interface can be used to transfer PDU session tunnel information between the RAN and the UPF, transfer control messages sent to the UE, and transfer radio resource control information sent to the RAN.
  • the PCF and the AMF can interact through the N15 interface, and the N15 interface can be used to deliver UE policies and access control related policies.
  • the relationship between other interfaces and each network element is shown in Figure 1, and for the sake of brevity, it will not be described in detail here.
  • AMF, SMF, UPF, PCF, UDM, etc. shown in FIG. 1 can be understood as network elements for implementing different functions, for example, they can be combined into network slices as required. These network elements can be independent devices, or integrated in the same device to implement different functions, or can be network elements in hardware devices, software functions running on dedicated hardware, or platforms (for example, cloud The virtualization function instantiated on the platform), the present application does not limit the specific form of the above network element.
  • the name of the interface between each network element in FIG. 1 is just an example, and the name of the interface in a specific implementation may be other names, which are not specifically limited in this application.
  • the names of the messages (or signaling) transmitted between the above network elements are only an example, and do not constitute any limitation on the functions of the messages themselves.
  • the UE establishes a PDU session after accessing the network, and accesses the external data network DN through the PDU session, and interacts with the application server deployed in the DN.
  • the network can select the UPF that accesses the DN as the anchor according to the network policy, such as the PDU session anchor (PSA), and access the application server through the N6 interface of the PSA.
  • PSA PDU session anchor
  • Operators or third-party application providers can deploy mobile service value-added networks to provide users with quality of experience (QoE), reduce network bandwidth pressure, and provide value-added services.
  • FIG. 2 shows another schematic diagram of a network architecture suitable for this embodiment of the present application.
  • FIG 2 mainly uses a dynamic business chain scheme of local area network (LAN) (such as N6-LAN) to adapt to flexible and rapid service deployment changes, while reducing capital expenditure (capital expenditure, CAPX)
  • LAN local area network
  • CAPX capital expenditure
  • the architecture is: examples are illustrated.
  • PCF can formulate a data-oriented policy (traffic steering policy, TSP) for the application accessed by the user.
  • TSP rules usually include service data flow description information and corresponding service chain identifiers. After the UPF detects the service data, it marks the corresponding service chain identifier on the data packets of the service data flow.
  • the switch will dynamically guide the data packet to the corresponding service function node, also called the enabler, according to the service chain identifier.
  • switch1 dynamically guides the data packets to the corresponding service function node 1 and service function node 2 according to the service chain identifier
  • switch 2 dynamically guides the data packet to the corresponding service function according to the service chain identifier. on node 3 and service function node 4.
  • the PCF usually formulates the TSP according to the user's subscription and the policy configured by the operator. In this way, the adjustment period of the dynamic business chain is relatively long, and it cannot quickly respond to the rapidly changing demands of the application on the business chain.
  • the present application provides a method that can quickly respond to the rapidly changing requirements of the application on the business chain. It should be understood that the embodiments of the present application are not only applicable to the architectures shown in FIG. 1 and FIG. 2 above, but also applicable to other architectures, which are not limited thereto. For example, the embodiments of the present application can be applied to any scenario where a network device formulates a service chain policy for an application; for another example, the embodiments of the present application can be applied to any scenario where a service chain is deployed for an application.
  • FIG. 3 is a schematic diagram of a method 300 for determining a strategy provided by an embodiment of the present application.
  • Method 300 may include the following steps.
  • the second network element sends a request message #1 to the first network element, where the request message #1 includes information of a service chain required by the application.
  • the first network element receives the request message #1.
  • request message #1 is named for distinction, and the naming does not limit the protection scope of the embodiments of the present application.
  • the information of the service chain required by the application such as but not limited to: service chain identifier (service chain identifier, SC Id) required by the application, external service chain identifier (external service chain identifier, external SC Id) required by the application , information of one or more service functions required by the application, information of one or more external service functions required by the application, information of the service chain required by the application, and data network access identifier identification, DNAI), or information about applying the corresponding business chain strategy.
  • the correspondence between the information of the service chain required by the application and the DNAI for example, may be the correspondence between the service chain identifier required by the application and the DNAI, or may be one or more required by the application. Correspondence between a business function and DNAI. Specifically, it will be introduced in detail below.
  • method 300 may further include step 320 .
  • the first network element determines a service chain policy corresponding to the application according to the service chain information required by the application.
  • the information of the service chain required by the application can be carried when the request is sent. Therefore, whether to authorize can be determined according to the information of the service chain required by the application carried in the request, or a service chain policy can be formulated directly according to the information of the service chain required by the application carried in the request.
  • the solution provided by the embodiments of the present application can quickly respond to the rapidly changing requirements of the application on the service chain.
  • the specific forms of the first network element and the second network element are not limited in this embodiment of the present application.
  • the second network element represents the requested device, for example, the second network element carries the information of the service chain required by the application in the request message #1; the first network element represents the authorized device or determines A service chain policy device, such as the first network element, authorizes or formulates a service chain policy according to the service chain information required by the application carried in the request message #1.
  • the first network element may be, for example, a PCF, or may also be a V-PCF, etc., which is not limited thereto.
  • the second network element may be an AF, or may also be a capability exposure function (network exposure function, NEF), etc., which is not limited.
  • the information of the service chain required by the application includes the service chain identifier required by the application, and the first network element determines the service chain policy corresponding to the application according to the service chain identifier required by the application.
  • the first network element is PCF
  • the second network element is AF.
  • the AF sends the service chain identifier required by the application to the PCF
  • the PCF determines the service chain policy corresponding to the application according to the service chain identifier required by the application.
  • the first network element is PCF
  • the second network element is NEF.
  • the NEF receives the external service chain identifier required by the application, for example, the NEF receives the external service chain identifier required by the application from the AF.
  • the NEF maps the external service chain identifier required by the application to the internal service chain identifier (ie, the service chain identifier), and sends the internal service chain identifier to the PCF.
  • the PCF determines the service chain policy corresponding to the application according to the service chain identifier required by the application.
  • the information of the service chain required by the application includes information of one or more service functions required by the application, and the first network element determines the service chain corresponding to the application according to the information of the one or more service functions required by the application Strategy.
  • the information of the service function may include, for example, the identifier of the service function and/or the type of the service function.
  • the first network element is PCF
  • the second network element is AF.
  • the AF sends the information of the service function required by the application to the PCF
  • the PCF determines the service chain policy corresponding to the application according to the information of the service function required by the application.
  • the first network element is PCF
  • the second network element is NEF.
  • the NEF receives the information of the external service function required by the application, eg, the NEF receives the information of the external service function required by the application from the AF.
  • the NEF maps the external service functions required by the application to the internal service functions (ie, service functions), and sends the information of the internal service functions to the PCF.
  • the PCF determines the service chain policy corresponding to the application according to the information of the internal service function required by the application.
  • Implementation mode 3 The information of the service chain required by the application includes the corresponding relationship between the service chain identifier required by the application and the DNAI, and the first network element determines the application according to the corresponding relationship between the service chain identifier required by the application and the DNAI Corresponding business chain strategy.
  • the first network element is PCF
  • the second network element is AF.
  • the AF sends the correspondence between the service chain identifier required by the application and the DNAI to the PCF
  • the PCF determines the service chain policy corresponding to the application according to the correspondence between the service chain identifier required by the application and the DNAI.
  • the first network element is PCF
  • the second network element is NEF.
  • the NEF receives the correspondence between the external service chain identifier required by the application and the DNAI, such as the correspondence between the external service chain identifier and the DNAI required by the NEF to receive the application from the AF.
  • the NEF maps the external service chain identifier required by the application to the internal service chain identifier (ie, the service chain identifier), and sends the correspondence between the internal service chain identifier and the DNAI to the PCF.
  • the PCF determines the service chain policy corresponding to the application according to the correspondence between the service chain identifier required by the application and the DNAI.
  • the information of the service chain required by the application includes the corresponding relationship between the information of one or more service functions required by the application and the DNAI, and the first network element is based on the information of one or more service functions required by the application.
  • the corresponding relationship with DNAI determines the business chain strategy corresponding to the application.
  • the first network element is PCF
  • the second network element is AF.
  • the AF sends the correspondence between the service functions required by the application and the DNAI to the PCF
  • the PCF determines the service chain policy corresponding to the application according to the correspondence between the service functions required by the application and the DNAI.
  • the first network element is PCF
  • the second network element is NEF.
  • the NEF receives the corresponding relationship between the external service function required by the application and the DNAI, such as the corresponding relationship between the external service function required by the NEF to receive the application from the AF and the DNAI.
  • the NEF maps the external service functions required by the application to the internal service functions (ie, service functions), and sends the correspondence between the internal service functions and the DNAI to the PCF.
  • the PCF determines the service chain policy corresponding to the application according to the corresponding relationship between the internal service functions required by the application and the DNAI.
  • the first network element determines the service chain policy corresponding to the application according to the corresponding relationship between the service chain policy corresponding to the application and the DNAI.
  • the correspondence between the business chain policy corresponding to the application and the DNAI can be carried in the information of the business chain required by the application, or based on the correspondence between the information of one or more business functions required by the application and the DNAI Determined, or determined based on the corresponding relationship between the service chain identifier required by the application and the DNAI.
  • the second network element can notify the first network element of the relevant information of the service chain required by the application, and the first network element can directly authorize or determine the corresponding application according to the relevant information of the service chain required by the application.
  • the solutions of the chain strategy all fall within the protection scope of the embodiments of the present application.
  • the first network element sends the service chain policy corresponding to the application to the third network element.
  • the third network element receives the service chain policy corresponding to the application.
  • the first network element may also send indication information to the second network element, where the indication information is used to indicate acceptance of the request.
  • the first network element may also determine the information of one or more service functions supporting the application according to the information of one or more service functions required by the application, and send the information supporting the application to the second network element. Information on one or more business functions.
  • the first network element may determine one or more service functions supported by the application, which are not limited in this embodiment of the present application.
  • the first network element may determine, according to the subscription with the application and the network configuration, one or more service functions that the user accesses the application can support.
  • FIG. 4 is a schematic diagram of a method 400 for determining a policy according to another embodiment of the present application.
  • Method 400 may include the following steps.
  • the first network element sends a request message #2 to the fourth network element, where the request message #2 is used to request authorization of one or more service functions that support the user to access the application, or the request message #2 is used to request the user to access the application. Access the business chain policy corresponding to the application for authorization.
  • the fourth network element receives the request message #2.
  • the first network element sends a request message #2 to the fourth network element, the request message #2 includes the service chain policy corresponding to the application and the identifier of the user accessing the application, and the request message #2 is used to request Apply the corresponding business chain policy for authorization.
  • the first network element sends a request message #2 to the fourth network element, and the request message #2 includes the information of one or more service functions and the identifier of the user accessing the application.
  • the request message #2 is used for Request authorization for one or more business functions that support user access to the application.
  • the first network element receives the response message of the fourth network element.
  • the fourth network element sends the response message to the first network element.
  • the fourth network element after the fourth network element performs authorization, it sends confirmation information indicating acceptance to the first network element.
  • method 400 may further include step 401 .
  • the first network element determines a service chain policy corresponding to the application. For example, the first network element may determine to apply the corresponding service chain policy according to the solution described in method 300 .
  • the first network element after the first network element formulates the service chain policy according to the request, it can send the service chain policy to the fourth network element, so as to further authorize the fourth network element . Or, after determining the supported service function according to the request, the first network element may send the information of the service function to the fourth network element, so as to perform further authorization of the fourth network element.
  • the fourth network element is not limited in this embodiment of the present application.
  • the fourth network element may represent an authorized device.
  • the first network element is, for example, a V-PCF
  • the fourth network element is, for example, an H-PCF.
  • the method 400 and the method 300 can be used in combination or independently, which is not limited. Taking combined use as an example, the first network element may first apply the corresponding service chain policy through the solution shown in method 300 , and then request authorization of the service chain through the solution of method 400 .
  • the service chain identifier is represented by SC Id
  • the service function is represented by service function.
  • FIG. 5 is a schematic flowchart of service chain processing applicable to an embodiment of the present application.
  • the method 500 is mainly illustrated by taking the interaction among the UE, AMF, UPF, SMF, PCF and AF as an example.
  • the method 500 shown in FIG. 5 can be used for the AF to request the service chain processing flow required by the application from the network when the AF requests network resources for the application.
  • the second network element may be, for example, an AF
  • the first network element may be, for example, a PCF.
  • the method 500 shown in FIG. 5 may include the following steps.
  • PDU session establishment procedure PDU session establishment procedure
  • the UE initiates the establishment of a PDU session, the network selects a PSA for the PDU, and the network assigns an address to the UE.
  • the UE can access the application server in the DN network through the established PDU session. It can be understood that after the PDU session is established, the data transmission channel between the terminal device and the DN is established.
  • the SMF primary user is responsible for session management in the mobile network.
  • the PDU session can be established, modified or released between the UE and the SMF through NAS session management (session management, SM) signaling.
  • NAS session management session management, SM
  • step 501 is not limited in this embodiment of the present application.
  • step 501 may refer to the prior art or a manner to appear later.
  • the AF sends the SC Id information to the PCF.
  • the AF When the AF decides to request resources and value-added services for the application that the UE is accessing, the AF can send a request message to the PCF requesting service chain authorization, and the request message carries the SC Id information.
  • the SC Id may be known in advance by the AF.
  • the SC Id may be the service chain identifier negotiated between the application and the operator, or may be the service chain identifier pre-defined by the protocol or network, which is not limited.
  • the AF can provide different uplink and downlink SC Ids.
  • the AF may provide an uplink SC Id for the uplink and a downlink SC Id for the downlink.
  • the SC Id information sent by the AF to the PCF may include the uplink SC Id and the downlink SC Id.
  • the AF may send an Npcf interface policy authorization establishment request (Npcf_PolicyAuthorization_Create Request) message to the PCF, where the message includes SC Id information.
  • the Npcf interface is a service interface provided by PCF externally.
  • the message may also include, but is not limited to, service flow description information (such as quintuple information) and requested quality of service (quality of service, QoS) requirements.
  • the quintuple information usually refers to the source IP address, the source port, the destination IP address, the destination port and the transport layer protocol.
  • Npcf_PolicyAuthorization_Create Request message is only an exemplary description, which is not limited thereto. As long as the AF can send the information of the SC Id to the PCF, it is feasible to carry the information of the SC Id in any message.
  • the PCF After the PCF receives the information of the SC Id from the AF, it can save the received information. Additionally, the PCF can send a response to the AF.
  • the PCF sends confirmation information to the AF.
  • the PCF When the PCF requests the service chain authorization to the AF successfully, the PCF sends confirmation information indicating acceptance to the AF.
  • the PCF may send an Npcf interface policy authorization establishment response (Npcf_PolicyAuthorization_Create Response) message to the AF, where the message includes confirmation information indicating acceptance.
  • Npcf_PolicyAuthorization_Create Response Npcf interface policy authorization establishment response
  • Npcf_PolicyAuthorization_Create Response message is only an exemplary description, which is not limited thereto. As long as the PCF can indicate the acknowledgment to the AF, it is feasible that the acknowledgment indicating acceptance is carried in any message.
  • the PCF formulates a policy and charging control (policy and charging control, PCC) rule.
  • the PCF may, upon request of the AF, formulate PCC rules.
  • the PCC rule includes the TSP Id determined by the PCF according to the SC Id.
  • a rule represents a policy information element related to a PDU session or a service data flow, for which reference may be made to the existing description, which is not limited here.
  • the PCC rules may include different uplink and downlink TSP Ids.
  • the PCF can determine a TSP Id for uplink (for example, the PCF can determine an uplink TSP Id based on an uplink SC Id), and a TSP Id for downlink (for example, the PCF can determine a downlink TSP Id based on a downlink SC Id),
  • the PCC rule formulated by the PCF may include an uplink TSP Id and a downlink TSP Id.
  • the PCF sends the PCC rule to the SMF.
  • the PCC rules include the TSP Id determined by the PCF based on the SC Id.
  • the PCC rules include the upstream TSP Id and the downstream TSP Id.
  • the PCF may send a session management policy control update request (Npcf_SMPolicyControl_UpdateNotify Request) message to the SMF, where the message includes PCC rule information.
  • Npcf_SMPolicyControl_UpdateNotify Request session management policy control update request
  • Npcf_SMPolicyControl_UpdateNotify Request message is only an exemplary description, and is not limited thereto.
  • the PCF can indicate the information of the PCC rule to the SMF, it is feasible to carry the information of the PCC rule in any message.
  • the SMF sends confirmation information to the PCF.
  • the SMF After the SMF installs the PCC rules, it can return confirmation information to the PCF.
  • the SMF may send a session management policy control update response (Npcf_SMPolicyControl_UpdateNotify Response) message to the PCF.
  • Npcf_SMPolicyControl_UpdateNotify Response session management policy control update response
  • Npcf_SMPolicyControl_UpdateNotify Response message is only an exemplary description, which is not limited thereto.
  • the SMF can formulate N4 rules based on PCC rules.
  • the N4 rule may include a packet detection rule (packet detection rule, PDR) and an associated forwarding action rule (forwarding action rule, FAR).
  • PDR packet detection rule
  • FAR forwarding action rule
  • PDR packet detection rule
  • FAR forwarding action rule
  • a possible implementation is to perform N4 session modification (N4 session modification) between SMF and UPF to formulate N4 rules.
  • the UPF performs traffic steering.
  • the UPF matches the service data flow according to the PDR, and the UPF marks the data packet of the data flow according to the FAR, and sends it to the local area network (such as N6-LAN).
  • the switch in the local area network will send the data to the service function nodes in sequence according to the marking of the data packet.
  • a possible service chain processing flow is exemplified above with reference to steps 501-508 shown in FIG. 5 , such as a scenario in which an application requests service chain processing required by the application from the network when requesting network resources for the application.
  • steps 501-508 shown in FIG. 5 such as a scenario in which an application requests service chain processing required by the application from the network when requesting network resources for the application.
  • the above steps are only exemplary descriptions and are not strictly limited.
  • the size of the sequence numbers of the above processes does not mean the sequence of execution, and the execution sequence of each process should be determined by its function and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.
  • step 503 may be performed first, and then step 504 may be performed; or step 504 may be performed first, and then step 503 may be performed; or it may be performed synchronously. Not limited.
  • the network can dynamically make business chain decisions according to the application's request. For example, when the AF requests the application value-added service (ie, service chain) required by the service data flow from the network, it carries the service chain identifier required by the application. In this way, based on the request of the AF (ie, the service chain identifier required by the application), the PCF determines the corresponding service chain policy, or performs authorization. Therefore, it is possible to quickly respond to the rapidly changing demands of the application on the business chain.
  • the application value-added service ie, service chain
  • the PCF determines the corresponding service chain policy, or performs authorization. Therefore, it is possible to quickly respond to the rapidly changing demands of the application on the business chain.
  • FIG. 6 is another schematic flowchart of service chain processing applicable to an embodiment of the present application.
  • the method 600 is mainly illustrated by taking the interaction among the UE, AMF, UPF, SMF, PCF, NEF and AF as an example.
  • the method 600 shown in FIG. 6 can be used for the service chain processing flow required by the AF to request the network from the network through the NEF when the AF requests network resources for the application.
  • the second network element may be, for example, an NEF
  • the first network element may be, for example, a PCF.
  • the method 600 shown in FIG. 6 may include the following steps.
  • the UE initiates the establishment of a PDU session, the network selects a PSA for the PDU, and the network assigns an address to the UE.
  • the UE can access the application server in the DN network through the established PDU session.
  • step 601. For example, the description of step 501 above may be referred to.
  • step 601 reference may be made to the prior art or a manner that will appear later, and will not be described here.
  • the AF sends the information of the external service chain identifier external SC Id to the NEF.
  • the AF When the AF decides to request resources and value-added services for the application the UE is accessing, the AF can send a request message to the NEF to request service chain authorization, and the request message carries the information of the external SC Id.
  • the external SC Id can be known in advance by the AF.
  • the external SC Id can be the service chain identifier negotiated between the application and the operator, or it can be the service chain identifier pre-defined by the protocol or network, which is not limited.
  • the AF can provide different uplink and downlink external SC Ids.
  • the AF can provide an uplink external SC Id for the uplink and a downlink external SC Id for the downlink.
  • the external SC Id information sent by the AF to the NEF may include the uplink external SC Id and the downlink external SC Id. SCId.
  • the AF may send an AF session establishment request (Nnef_AFsessionWithQoS_Create Request) message with QoS on the Nnef interface to the NEF, and the message includes the information of the external SC Id.
  • the Nnef interface is a service interface provided by NEF externally.
  • the message may also include, but is not limited to, service flow description information (such as quintuple information) and requested QoS requirements.
  • Nnef_AFsessionWithQoS_Create Request message is only an exemplary description, which is not limited thereto. As long as the AF can send the information of the external SC Id to the NEF, it is feasible to carry the information of the external SC Id in any message.
  • the NEF may determine to authorize the AF's request.
  • the NEF can map the external SC Id to the internal service chain identifier (internal SC Id), that is, the NEF can obtain the internal SC Id required by the application.
  • the NEF can map the uplink external SC Id to the uplink internal SC Id, and map the uplink external SC Id to the uplink internal SC Id.
  • the downlink external SC Id is mapped to the downlink internal SC Id.
  • the NEF obtains the internal SC Id required by the application and can send the internal SC Id to the PCF.
  • the NEF sends the information of the internal SC Id to the PCF.
  • the NEF can send the Npcf_PolicyAuthorization_Create Request message to the PCF, which contains the information of the internal SC Id.
  • the message may also include, but is not limited to, service flow description information (such as quintuple information) and requested QoS requirements.
  • Npcf_PolicyAuthorization_Create Request message is only an exemplary description, which is not limited thereto. As long as the NEF can send the information of the internal SC Id to the PCF, it is feasible to carry the information of the internal SC Id in any message.
  • the PCF sends confirmation information to the NEF.
  • the PCF When the PCF successfully authorizes the requested service chain, the PCF sends a confirmation message indicating acceptance to the NEF.
  • the PCF may send an Npcf_PolicyAuthorization_Create Response message to the NEF, where the message includes confirmation information indicating acceptance.
  • Npcf_PolicyAuthorization_Create Response message is only an exemplary description, which is not limited thereto. As long as the PCF can indicate the accepted confirmation to the NEF, it is feasible to carry the accepted confirmation in any message.
  • the NEF sends confirmation information to the AF.
  • the NEF may send an AF session establishment response (Nnef_AFsessionWithQoS_Create Response) message with QoS on the Nnef interface to the AF, where the message includes confirmation information indicating acceptance.
  • AF session establishment response Nnef_AFsessionWithQoS_Create Response
  • Nnef_AFsessionWithQoS_Create Response message is only an exemplary description, which is not limited thereto. As long as the NEF can indicate to the AF the acknowledgment of acceptance, it is feasible that the acknowledgment of acceptance is carried in any message.
  • PCF makes PCC rules.
  • the PCF can formulate PCC rules according to the request of the AF (ie, the request conveyed through the NEF).
  • the PCC rule includes the TSP Id determined by the PCF according to the SC Id (that is, the internal SC Id received in step 604).
  • the PCC rules may include different uplink and downlink TSP Ids.
  • the PCF can determine a TSP Id for the uplink (for example, the PCF can determine an uplink TSP Id based on the internal SC Id of the uplink), and determine a TSP Id for the downlink (for example, the PCF can determine a downlink TSP Id based on the internal SC Id of the downlink) ), in step 607, the PCC rule formulated by the PCF may include the upstream TSP Id and the downstream TSP Id.
  • the PCF sends the PCC rule to the SMF.
  • step 608 for example, reference may be made to the description of the above-mentioned step 505, which will not be described here.
  • the SMF sends confirmation information to the PCF.
  • step 609 for example, reference may be made to the description of step 506, which will not be described here.
  • step 610 for example, reference may be made to the description of step 507, which will not be described here.
  • the UPF performs service routing.
  • step 611 for example, reference may be made to the description of step 508, which will not be described here.
  • step 605 may be performed first, and then step 607 may be performed; or step 607 may be performed first, and then step 605 may be performed; or it may be performed synchronously. Not limited.
  • the network can dynamically make business chain decisions according to the application's request. For example, when the AF requests the service chain processing required by the application to the network through the NEF, it carries the external service chain identifier. After mapping the external service chain identifier to the internal service chain identifier, the NEF sends the internal service chain identifier to the PCF. In this way, the PCF determines the corresponding service chain policy, or authorizes, based on the request of the AF (ie, the internal service chain identifier). Therefore, it is possible to quickly respond to the rapidly changing demands of the application on the business chain.
  • FIG. 7 is another schematic flowchart of service chain processing applicable to an embodiment of the present application.
  • the method 700 mainly takes the interaction among UE, AMF, UPF, SMF, PCF, NEF, unified data repository (UDR) and AF as an example for exemplary description.
  • the method 700 shown in FIG. 7 can be used for the service chain processing flow in which the AF provides the application corresponding to each DNAI to the network through the NEF.
  • the second network element may be, for example, UDR or NEF
  • the first network element may be, for example, PCF.
  • the method 700 shown in FIG. 7 may include the following steps.
  • the AF sends the information of the correspondence between the external service chain identifier external SC Id and the DNAI to the NEF.
  • Information about the correspondence between external SC Id and DNAI can be sent in the form of a list.
  • the AF can send the NEF a list of correspondences between external SC Ids and DNAIs.
  • the AF can send an Nnef interface traffic guidance establishment request (Nnef_TrafficInfluence_Create Request) message to the NEF, where the message contains data guidance request information, and the data guidance request information includes a list of correspondences between the external SC Id and the DNAI.
  • the data steering request information may further include, but is not limited to, applicable user external group identifiers or indication information of any user.
  • Nnef_TrafficInfluence_Create Request message is only an exemplary description, and is not limited thereto. As long as the AF can send the information about the correspondence between the external SC Id and the DNAI to the NEF, it is feasible to carry the information about the correspondence between the external SC Id and the DNAI in any message.
  • NEF performs processing.
  • the NEF may determine to authorize the AF's request.
  • NEF can map external SC Id to internal SC Id, that is, NEF can obtain the correspondence between internal SC Id and DNAI.
  • NEF can also map external group IDs to internal group IDs.
  • NEF saves the correspondence between the internal SC Id and the DNAI to the UDR.
  • the UDR receives the correspondence between the internal SC Id and the DNAI from the NEF, and saves the correspondence between the internal SC Id and the DNAI.
  • the NEF may save the data steering request information received in step 701 into the UDR. It can be understood that in step 702, the NEF can map the external SC Id to the internal SC Id, and can also map the external group identifier to the internal group identifier. Therefore, the data steering request information stored in the UDR may include: the internal SC Id and the internal SC Id. The corresponding relationship of DNAI, the applicable user's internal identifier or any user's instruction information.
  • the NEF sends confirmation information to the AF.
  • the NEF may send the Nnef interface traffic steering establishment response (Nnef_TrafficInfluence_Create Response) message to the AF, and the message contains confirmation information indicating acceptance.
  • Nnef interface traffic steering establishment response Nnef_TrafficInfluence_Create Response
  • Nnef_TrafficInfluence_Create Response message is only an exemplary description, which is not limited thereto. As long as the NEF can indicate to the AF the acknowledgment of acceptance, it is feasible that the acknowledgment of acceptance is carried in any message.
  • the UDR notifies the corresponding PCF of the data steering request information.
  • the data-oriented request information may include: the corresponding relationship between the internal SC Id and the DNAI, the applicable user internal identifier or the indication information of any user.
  • the UE establishes a PDU session.
  • the UE initiates the establishment of a PDU session, the network selects a PSA for the PDU, and the network assigns an address to the UE.
  • Step 706 may refer to the prior art or a manner that will appear later, and will not be described here.
  • PCF makes PCC rules.
  • the PCF formulates corresponding PCC rules.
  • the PCF can determine the TSP Id based on the internal SC Id.
  • the PCC rule may include a data-oriented policy, and the data-oriented policy may include the correspondence between the TSP Id and the DNAI corresponding to the internal SC Id.
  • the PCC rules may include different uplink and downlink TSP Ids.
  • the PCF can determine a TSP Id for the uplink (for example, the PCF can determine an uplink TSP Id according to the internal SC Id of the uplink, or determine the correspondence between the TSP Id and the DNAI in the uplink), and determine a TSP Id for the downlink (such as PCF A downlink TSP Id may be determined according to the downlink internal SC Id, or the corresponding relationship between the downlink TSP Id and DNAI), in step 707, the PCC rule formulated by the PCF may include the TSP Id corresponding to the uplink internal SC Id The corresponding relationship with DNAI, and the corresponding relationship between the TSP Id and DNAI corresponding to the downstream internal SC Id.
  • the PCF sends the PCC rule to the SMF.
  • the PCC rules include a list of correspondences between TSP Ids and DNAIs.
  • the PCC rule includes a list of correspondences between TSP Ids and DNAIs in the uplink, and a list of correspondences between TSP Ids and DNAIs in the downlink.
  • the PCF may send an Npcf_SMPolicyControl_UpdateNotify Request message to the SMF, where the message includes the PCC rule information.
  • the SMF sends confirmation information to the PCF.
  • the SMF After the SMF installs the PCC rules, it can return confirmation information to the PCF.
  • the SMF can send the Npcf_SMPolicyControl_UpdateNotify Response message to the PCF.
  • Npcf_SMPolicyControl_UpdateNotify Response message is only an exemplary description, which is not limited thereto.
  • the SMF and the UPF perform user plane configuration (or reconfiguration).
  • the SMF can determine the target DNAI for the PDU session. For example, the SMF may determine the target DNAI for the PDU session based on the UE's location, operator policy, and DNAI list.
  • the SMF can determine the new PSA and TSP Id based on the target NDAI.
  • SMF can also formulate N4 rules based on PCC rules.
  • the PDR and associated FAR may be included in the N4 rule.
  • PDR includes service flow description information
  • FAR includes TSP Id.
  • UPF conducts traffic steering.
  • the UPF matches the service data flow according to the PDR, and the UPF marks the data packet of the data flow according to the FAR, and sends it to the local area network (such as N6-LAN).
  • the switch in the local area network will send the data to the service function nodes in sequence according to the marking of the data packet.
  • a possible service chain processing flow is exemplified above with reference to steps 701-711 shown in FIG. 7 , such as a scenario in which the application provides service chain processing corresponding to each DNAI to the network through the NEF.
  • steps 701-711 shown in FIG. 7 such as a scenario in which the application provides service chain processing corresponding to each DNAI to the network through the NEF.
  • the above steps are only exemplary descriptions and are not strictly limited.
  • the size of the sequence numbers of the above processes does not mean the sequence of execution, and the execution sequence of each process should be determined by its function and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.
  • the AF when it provides the data-oriented request information to the network, it can provide a list of the corresponding relationship between the DNAI and the external service chain identifier.
  • the NEF After mapping the external service chain identifier to the internal service chain identifier, the NEF sends the list of the correspondence between the DNAI and the internal service chain identifier to the PCF.
  • the PCF determines the corresponding TSP Id according to the internal service chain identifier, so that the corresponding relationship between the DNAI and the TSP Id is carried in the PCC rule sent to the SMF.
  • the SMF can determine the corresponding TSP Id according to the selected target DNAI, so that when the UE accesses the application through the target DNAI, the service data flow can be directed to the corresponding service function (service function).
  • FIG. 8 is another schematic flowchart of service chain processing applicable to an embodiment of the present application.
  • the method 800 is mainly illustrated by taking the interaction among the UE, AMF, UPF, SMF, PCF, NEF and AF as an example.
  • the method 800 shown in FIG. 8 can be used for the AF to provide the service value-added function requirement process to the network through the NEF.
  • the second network element may be, for example, NEF
  • the first network element may be, for example, PCF.
  • the method 800 shown in FIG. 8 may include the following steps.
  • the UE initiates the establishment of a PDU session, the network selects a PSA for the PDU, and the network assigns an address to the UE.
  • the UE can access the application server in the DN network through the established PDU session.
  • Step 801 is not limited in this embodiment of the present application, for example, the description of step 501 above may be referred to.
  • step 801 reference may be made to the prior art or a manner that will appear later, and will not be described here.
  • AF sends a list of external service functions to NEF.
  • a list of external service functions including information about one or more service functions.
  • the service function can be identified by a specific identifier or type, which is not limited.
  • a service function can be identified by the Id of the service function, that is, the list of external service functions includes the Id of the external service function.
  • the service function can be identified by the type of the service function, that is, the external service function list includes the type of the external service function.
  • Information about external service functions can be sent in the form of a list.
  • the AF may send a list of external service functions to the NEF, by way of example and not limitation, this list may be carried, for example, in the order in which the service functions are used.
  • the AF When the AF decides to request resources and value-added services for the application that the UE is accessing, the AF can send a request message to the NEF to request service chain authorization, and the request message carries the information of the external service function.
  • the AF can provide a list of different uplink and downlink external service functions.
  • the AF may provide a list of upstream service functions for the upstream and a list of downstream service functions for the downstream.
  • the list of service functions sent by the AF to the NEF may include the list of upstream service functions and the list of downstream services. A list of service functions.
  • the AF can send the Nnef_AFsessionWithQoS_Create Request message to the NEF, which contains a list of external service functions.
  • the message may also include, but is not limited to, service flow description information (such as quintuple information) and requested QoS requirements.
  • Nnef_AFsessionWithQoS_Create Request message is only an exemplary description, which is not limited thereto. As long as the AF can send the list of external service functions to the NEF, it is feasible to carry the list of external service functions in any message.
  • the NEF may determine to authorize the AF's request.
  • NEF can map external service functions to internal service functions, that is, NEF can obtain a list of internal service functions.
  • the NEF can map the uplink external service function list For the list of upstream internal service functions, map the list of downstream external service functions to the list of downstream internal service functions.
  • the NEF sends a list of internal service functions to the PCF.
  • the NEF can send the Npcf_PolicyAuthorization_Create Request message to the PCF, which contains a list of internal service functions.
  • the message may also include, but is not limited to, service flow description information (such as quintuple information) and QoS requirements.
  • Npcf_PolicyAuthorization_Create Request message is only an exemplary description, which is not limited thereto. Carrying the list of internal service functions in any message is feasible as long as the NEF can send the list of internal service functions to the PCF.
  • the PCF sends confirmation information to the NEF.
  • the PCF When the PCF successfully authorizes the requested service chain (that is, when the PCF successfully authorizes the requested service function), the PCF sends a confirmation message indicating acceptance to the NEF.
  • the PCF may determine whether to return an acknowledgement message to the NEF according to the network configuration and the operator's policy, that is, determine whether to authorize the requested service chain.
  • the confirmation information may also include: a list of internal service functions authorized by the PCF.
  • the PCF may authorize some of the multiple internal service functions, or the PCF may authorize all of the multiple internal service functions. limited.
  • the PCF can send the Npcf_PolicyAuthorization_Create Response message to the NEF, and the message contains confirmation information indicating that the internal service function is accepted.
  • Npcf_PolicyAuthorization_Create Response message is only an exemplary description, which is not limited thereto. As long as the PCF can indicate to the NEF to accept the confirmation information of the internal service function, it is feasible to carry the confirmation information of the indication to accept the internal service function in any message.
  • the NEF sends confirmation information to the AF.
  • the confirmation information may also include: a list of internal service functions authorized by the PCF.
  • the NEF can send the Nnef_AFsessionWithQoS_Create Response message to the AF, which contains confirmation information indicating that the internal service function is accepted.
  • Nnef_AFsessionWithQoS_Create Response message is only an exemplary description, which is not limited thereto. As long as the NEF can indicate to the AF to accept the confirmation information of the internal service function, it is feasible to carry the confirmation information of the indication to accept the internal service function in any message.
  • PCF makes PCC rules.
  • the PCF can determine the corresponding service chain according to the list of authorized internal service functions, so as to further determine the corresponding TSP Id.
  • PCF formulates PCC rules and includes TSP Ids in PCC rules.
  • the PCC rules may include different uplink and downlink TSP Ids.
  • the PCF sends the PCC rule to the SMF.
  • step 808 for example, reference may be made to the description of step 505, which will not be described here.
  • the SMF sends confirmation information to the PCF.
  • step 809 for example, reference may be made to the description of step 506, which will not be described here.
  • the SMF made the N4 rule.
  • step 810 for example, reference may be made to the description of step 507, which is not described here.
  • the UPF performs service routing.
  • step 811 for example, reference may be made to the description of step 508, which is not described here.
  • a possible service chain processing flow is exemplified above in conjunction with steps 801-811 shown in FIG. 8 , such as a scenario in which an application provides service value-added function requirements to the network through the NEF.
  • steps 801-811 shown in FIG. 8 , such as a scenario in which an application provides service value-added function requirements to the network through the NEF.
  • the above steps are only exemplary descriptions and are not strictly limited.
  • the size of the sequence numbers of the above processes does not mean the sequence of execution, and the execution sequence of each process should be determined by its function and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.
  • step 805 may be performed first, and then step 807 may be performed; or step 807 may be performed first, and then step 805 may be performed; or it may be performed synchronously. Not limited.
  • the network can dynamically make business chain decisions according to the application's request. For example, when the AF requests the service chain processing required by the application to the network through the NEF, it carries a list of external service functions. After mapping the external service function to the internal service function, the NEF sends the list of the internal service function to the PCF. In this way, the PCF determines the corresponding service chain based on the AF's request (ie, the list of internal service functions) and according to the list of authorized internal service functions, thereby further determining the corresponding service chain policy. Therefore, it is possible to quickly respond to the rapidly changing demands of the application on the business chain.
  • the AF requests the service chain processing required by the application to the network through the NEF
  • the NEF After mapping the external service function to the internal service function, the NEF sends the list of the internal service function to the PCF.
  • the PCF determines the corresponding service chain based on the AF's request (ie, the list of internal service functions) and according to the list of authorized internal
  • FIG. 9 is another schematic flowchart of service chain processing applicable to an embodiment of the present application.
  • the method 900 is mainly illustrated by taking the interaction among the UE, AMF, UPF, SMF, V-PCF, H-PCF, NEF and AF as an example.
  • the method 900 shown in FIG. 9 can be used in a roaming scenario where the UE is in local grooming.
  • the AF requests network resources for the application
  • the service chain processing flow required by the application is requested from the network.
  • the second network element may be, for example, NEF
  • the first network element may be, for example, V-PCF
  • the fourth network element may be, for example, H-PCF.
  • the method 900 shown in FIG. 9 may include the following steps.
  • the UE establishes a PDU session, the network selects a PSA for the PDU, and the network assigns an address to the UE.
  • the UE can access the application server in the DN network through the established PDU session.
  • the UE sends a session establishment request message
  • the session establishment request message may include but is not limited to: single network slice selection assistance information (single network slice selection assistance information, S-NSSAI), data network name (data network name, DNN), subscription permanent identifier (SUPI).
  • S-NSSAI single network slice selection assistance information
  • DNN data network name
  • SUPI subscription permanent identifier
  • the SMF interacts with the V-PCF, establishes a session management policy association, and obtains the PCC policy from the PCF.
  • step 901 may refer to the prior art or a method that appears later, and will not be described here.
  • the AF sends the information of the external service chain identifier external SC Id to the NEF.
  • the AF When the AF decides to request resources and business value-added services for the application that the UE is accessing, the AF can send a request message requesting service chain authorization to the NEF, and the request message carries the information of the external SC Id.
  • the external SC Id can be known in advance by the AF.
  • the external SC Id can be the service chain identifier negotiated between the application and the operator, or it can be the service chain identifier pre-defined by the protocol or network, which is not limited.
  • the AF can provide different uplink and downlink external SC Ids.
  • the AF can provide an uplink external SC Id for the uplink and a downlink external SC Id for the downlink.
  • the external SC Id information sent by the AF to the NEF may include the uplink external SC Id and the downlink external SC Id. SCId.
  • the AF can send the Nnef_AFsessionWithQoS_Create Request message to the NEF, and the message contains the information of the external SC Id.
  • the message may also include, but is not limited to, service flow description information (such as quintuple information) and requested QoS requirements.
  • Nnef_AFsessionWithQoS_Create Request message is only an exemplary description, which is not limited thereto. As long as the AF can send the information of the external SC Id to the NEF, it is feasible to carry the information of the external SC Id in any message.
  • the NEF may determine to authorize the AF's request. NEF can map external SC Id to internal SC Id.
  • the NEF can map the uplink external SC Id to the uplink internal SC Id, and map the uplink external SC Id to the uplink internal SC Id.
  • the downlink external SC Id is mapped to the downlink internal SC Id.
  • the NEF sends the information of the internal SC Id to the V-PCF.
  • the NEF may send the Npcf_PolicyAuthorization_Create Request message to the V-PCF, where the message includes the information of the internal SC Id.
  • the message may also include, but is not limited to, service flow description information (such as quintuple information) and requested QoS requirements.
  • Npcf_PolicyAuthorization_Create Request message is only an exemplary description, which is not limited thereto. As long as the NEF can send the information of the internal SC Id to the V-PCF, it is feasible to carry the information of the internal SC Id in any message.
  • V-PCF 905, V-PCF to make PCC rules.
  • the V-PCF can authorize according to the request of the AF (ie, the request conveyed by the NEF).
  • the V-PCF can determine the corresponding TSP Id according to the internal SC Id.
  • the V-PCF formulates PCC rules and includes TSP Ids in the PCC rules.
  • the PCC rules may include different uplink and downlink TSP Ids.
  • the V-PCF can determine a TSP Id for the uplink (for example, the V-PCF can determine an uplink TSP Id based on the internal SC Id of the uplink), and determine a TSP Id for the downlink (for example, the V-PCF can determine the TSP Id based on the internal SC Id of the downlink) Determine a downlink TSP Id), in step 905, the PCC rule formulated by the V-PCF may include the uplink TSP Id and the downlink TSP Id.
  • the V-PCF sends a PCC authorization request message to the H-PCF.
  • the V-PCF determines that the UE is a roaming user, and the V-PCF can send a PCC authorization request message to the H-PCF, where the PCC authorization request message can carry: the identifier of the UE (such as SUPI), DNN, and S-NSSAI.
  • the V-PCF can select the H-PCF through the NF repository function (NRF) of the visited place after determining the home operator of the UE according to the SUPI, or select the H-PCF through the NRF of the home place.
  • NRF NF repository function
  • the PCC authorization request message may include one or more of the following: PCC rules determined by V-PCF, TSP Id determined by V-PCF, internal SC Id determined by V-PCF, service function list authorized by V-PCF .
  • the PCC rules include the TSP Id determined by the V-PCF according to the SC Id.
  • the PCC rules include the upstream TSP Id and the downstream TSP Id.
  • the service function can be identified by a specific identifier or type, which is not limited.
  • the service function can be identified by the ID of the service function, that is, the service function list includes the ID of the service function authorized by the V-PCF.
  • the service function can be identified by the type of the service function, that is, the service function list includes the type of the service function authorized by the V-PCF.
  • the V-PCF may send an Npcf interface PCC authorization establishment request (Npcf_PccAuthorization_Create Request) message to the H-PCF.
  • Npcf_PccAuthorization_Create Request Npcf interface PCC authorization establishment request
  • the Npcf_PccAuthorization_Create Request message is only an exemplary description, which is not limited thereto.
  • the H-PCF sends confirmation information to the V-PCF.
  • step 907 after the H-PCF authorizes, it sends confirmation information indicating acceptance to the V-PCF.
  • the H-PCF may send the Npcf interface PCC authorization establishment response (Npcf_PccAuthorization_Create Response) message to the V-PCF.
  • Npcf_PccAuthorization_Create Response is only an exemplary description, which is not limited thereto.
  • the V-PCF sends confirmation information to the NEF.
  • the V-PCF can send the Npcf_PolicyAuthorization_Create Response message to the NEF. It should be understood that the Npcf_PolicyAuthorization_Create Response message is only an exemplary description, which is not limited thereto.
  • NEF sends confirmation information to AF.
  • the NEF can send the Nnef_AFsessionWithQoS_Create Response message to the AF. It should be understood that the Nnef_AFsessionWithQoS_Create Response message is only an exemplary description, which is not limited thereto.
  • the V-PCF sends the PCC rule to the SMF.
  • the TSP Id is included in the PCC rules.
  • the PCC rules include the upstream TSP Id and the downstream TSP Id.
  • the V-PCF may send an Npcf_SMPolicyControl_UpdateNotify Request message to the SMF, where the message includes PCC rule information.
  • Npcf_SMPolicyControl_UpdateNotify Request message is only an exemplary description, and is not limited thereto.
  • the V-PCF can indicate the information of the PCC rule to the SMF, it is feasible to carry the information of the PCC rule in any message.
  • the SMF sends confirmation information to the V-PCF.
  • the SMF After the SMF installs the PCC rules, it can return confirmation information to the V-PCF.
  • the SMF may send the Npcf_SMPolicyControl_UpdateNotify Response message to the V-PCF. It should be understood that the Npcf_SMPolicyControl_UpdateNotify Response message is only an exemplary description, which is not limited thereto.
  • the SMF made the N4 rule.
  • step 912 for example, reference may be made to the description of the foregoing step 507, which will not be described here.
  • the UPF performs service routing.
  • step 913 for example, reference may be made to the description of step 508, which will not be described here.
  • step 908 may be performed first, and then step 910 may be performed; or step 910 may be performed first, and then step 908 may be performed; or it may be performed synchronously. Not limited.
  • the V-PCF can formulate a service chain policy (ie, TSP policy) according to the request of the AF, and send the service chain policy to the H-PCF for further authorization by the H-PCF.
  • a service chain policy ie, TSP policy
  • FIG. 10 is another schematic flowchart of service chain processing applicable to an embodiment of the present application.
  • the method 1000 is mainly illustrated by taking the interaction among the UE, AMF, UPF, SMF, V-PCF, H-PCF, UDR, NEF and AF as an example.
  • the method 1000 shown in FIG. 10 can be used in a roaming scenario where the UE is in local grooming, and the AF requests the network for service chain processing required by the application when providing data steering request information.
  • the second network element may be, for example, UDR or NEF or H-PCF
  • the first network element may be, for example, V-PCF
  • the fourth network element may be, for example, H-PCF.
  • the method 1000 shown in FIG. 10 may include the following steps.
  • the AF sends the information of the correspondence between the external service chain identifier external SC Id and the DNAI to the NEF.
  • Information about the correspondence between external SC Id and DNAI can be sent in the form of a list.
  • the AF can send the NEF a list of correspondences between external SC Ids and DNAIs.
  • the AF may send an Nnef_TrafficInfluence_Create Request message to the NEF, where the message includes data-oriented request information, and the data-oriented request information includes a list of correspondences between external SC Ids and DNAIs.
  • the data steering request information may further include, but is not limited to, applicable user external group identifiers or indication information of any user.
  • Nnef_TrafficInfluence_Create Request message is only an exemplary description, and is not limited thereto. As long as the AF can send the information about the correspondence between the external SC Id and the DNAI to the NEF, it is feasible to carry the information about the correspondence between the external SC Id and the DNAI in any message.
  • the NEF is processed.
  • the NEF may determine to authorize the AF's request.
  • NEF can map external SC Id to internal SC Id, that is, NEF can obtain the correspondence between internal SC Id and DNAI.
  • NEF can also map external group IDs to internal group IDs.
  • NEF saves the correspondence between the internal SC Id and the DNAI to the UDR.
  • the UDR receives the correspondence between the internal SC Id and the DNAI from the NEF, and saves the correspondence between the internal SC Id and the DNAI.
  • the NEF may save the data steering request information received in step 1001 into the UDR. It can be understood that in step 1002, the NEF can map the external SC Id to the internal SC Id, and can also map the external group identifier to the internal group identifier. Therefore, the data steering request information saved in the UDR may include: the internal SC Id and the internal SC Id. The corresponding relationship of DNAI, the applicable user's internal identifier or any user's instruction information.
  • the NEF sends confirmation information to the AF.
  • NEF can send Nnef_TrafficInfluence_Create Response message to AF. It should be understood that the Nnef_TrafficInfluence_Create Response message is only an exemplary description, which is not limited thereto.
  • the UDR notifies the corresponding PCF of the data steering request information.
  • the UDR notifies the V-PCF and the H-PCF of the data steering request information.
  • the data-oriented request information may include: the corresponding relationship between the internal SC Id and the DNAI, the applicable user internal identifier or the indication information of any user.
  • the UE establishes a PDU session.
  • step 1006 for example, reference may be made to the description of the above-mentioned step 901, which will not be described here.
  • V-PCF made PCC rules.
  • the V-PCF formulates corresponding PCC rules.
  • the V-PCF can determine the corresponding relationship between the TSP Id and the DNAI corresponding to the internal SC Id according to the corresponding relationship between the internal SC Id and the DNAI.
  • the PCC rule may include a data-oriented policy, and the data-oriented policy may include the correspondence between the TSP Id and the DNAI corresponding to the internal SC Id.
  • the PCC rules may include different uplink and downlink TSP Ids.
  • the V-PCF can determine a TSP Id for the uplink (for example, the V-PCF can determine an uplink TSP Id according to the internal SC Id of the uplink, or determine the correspondence between the TSP Id and the DNAI in the uplink), and determine a TSP for the downlink.
  • the V-PCF can determine a downlink TSP Id according to the downlink internal SC Id, or determine the corresponding relationship between the downlink TSP Id and DNAI
  • the PCC rules formulated by the PCF may include the uplink internal The corresponding relationship between the TSP Id and DNAI corresponding to the SC Id, and the corresponding relationship between the TSP Id and DNAI corresponding to the downstream internal SC Id.
  • the V-PCF sends the PCC rule to the SMF.
  • the PCC rules include a list of correspondences between TSP Ids and DNAIs.
  • the PCC rule includes a list of correspondences between TSP Ids and DNAIs in the uplink, and a list of correspondences between TSP Ids and DNAIs in the downlink.
  • the V-PCF may send an Npcf_SMPolicyControl_UpdateNotify Request message to the SMF, where the message includes PCC rule information.
  • the SMF sends confirmation information to the V-PCF.
  • the SMF After the SMF installs the PCC rules, it can return confirmation information to the V-PCF.
  • the SMF may send the Npcf_SMPolicyControl_UpdateNotify Response message to the V-PCF.
  • Npcf_SMPolicyControl_UpdateNotify Response message is only an exemplary description and is not limited thereto.
  • SMF and UPF perform user plane configuration (or reconfiguration).
  • the SMF can determine the target DNAI for the PDU session. For example, the SMF may determine the target DNAI for the PDU session based on the UE's location, operator policy, network configuration, and DNAI list.
  • the SMF can determine the new PSA and TSP Id based on the target NDAI.
  • SMF can also formulate N4 rules based on PCC rules.
  • the PDR and associated FAR may be included in the N4 rule.
  • PDR includes service flow description information
  • FAR includes TSP Id.
  • the SMF sends the information of the target DNAI and/or the TSP Id to the V-PCF, which is used to request the authorization of the service chain policy.
  • the SMF may send an Npcf_SMPolicyControl_Update Request message to the V-PCF, where the message carries the determined target DNAI and/or TSP Id.
  • Npcf_SMPolicyControl_Update Request message is only an exemplary description, which is not limited thereto.
  • the V-PCF sends a PCC authorization request message to the H-PCF.
  • the V-PCF determines that the UE is a roaming user, and the V-PCF may send a PCC authorization request message to the H-PCF, where the PCC authorization request message may carry: the SUPI, DNN, and S-NSSAI of the UE.
  • the V-PCF can select the H-PCF through the NRF of the visited place, or select the H-PCF through the NRF of the home place.
  • the PCC authorization request message may include one or more of the following: the PCC rule determined by the V-PCF corresponding to the target DNAI (the PCC rule includes the TSP Id), the TSP Id determined by the V-PCF corresponding to the target DNAI, the target The internal SC Id determined by the V-PCF corresponding to the DNAI, the list of service functions authorized by the V-PCF corresponding to the target DNAI, and the list of service functions authorized by the V-PCF corresponding to the TSP Id.
  • the service function can be identified by a specific identifier or type, which is not limited.
  • the V-PCF may send an Npcf_PccAuthorization_Create Request message to the H-PCF. It should be understood that the Npcf_PccAuthorization_Create Request message is only an exemplary description, which is not limited thereto.
  • the H-PCF sends confirmation information to the V-PCF.
  • step 1013 after the H-PCF authorizes, it sends confirmation information indicating acceptance to the V-PCF.
  • the H-PCF may send the Npcf_PccAuthorization_Create Response message to the V-PCF. It should be understood that the Npcf_PccAuthorization_Create Response message is only an exemplary description, which is not limited thereto.
  • the V-PCF sends confirmation information to the SMF.
  • V-PCF sends confirmation information to SMF to indicate service chain policy authorization.
  • the V-PCF can send the Npcf_SMPolicyControl_Update Response message to the SMF. It should be understood that the Npcf_SMPolicyControl_Update Response message is only an exemplary description, which is not limited thereto.
  • UPF conducts traffic steering.
  • step 1015 for example, reference may be made to the description of the above-mentioned step 508, which will not be described here.
  • step 1003 can be executed first, and then step 1004 can be executed; or step 1004 can be executed first, and then step 1003 can be executed; or it can be executed synchronously. Not limited.
  • the V-PCF can formulate a service chain policy (ie, TSP policy) according to the request of the AF, and send the service chain policy to the H-PCF for further authorization by the H-PCF.
  • TSP policy a service chain policy
  • the NEF After mapping the external service chain identifier to the internal service chain identifier, the NEF sends a list of the correspondence between the DNAI and the internal service chain identifier to the V-PCF.
  • the V-PCF determines the corresponding TSP Id according to the internal service chain identifier, thereby carrying the corresponding relationship between the DNAI and the TSP Id in the PCC rules. After the SMF determines the target DNAI, it reports to the V-PCF, and the V-PCF further sends the corresponding service chain policy (ie, the TSP policy) to request the H-PCF for further authorization.
  • the corresponding service chain policy ie, the TSP policy
  • FIGS. 5 to 10 may be used to perform the scheme of the method 300
  • FIGS. 9 to 10 may also be used to perform the scheme of the method 400 .
  • the embodiments of the present application considering that the information of the service chain required by the application is carried when the request is sent, the embodiments of the present application provide a method for management of the service chain. A possible flow of business chain management is described below with reference to FIG. 11 .
  • FIG. 11 is a schematic flowchart of business chain management applicable to this embodiment of the present application.
  • the method 1100 mainly takes the interaction among the service chain manager (service chain manager), the NEF and the AF as an example to illustrate.
  • the method 1100 shown in FIG. 11 can be used to register the service function with the NEF after an operator or a third-party application deploys the service function.
  • the third party requests Query the process of obtaining the business chain.
  • the second network element may be, for example, an AF.
  • the method 1100 shown in FIG. 11 may include the following steps.
  • Business chain management devices such as operators or third-party applications, can perceive the operation of the service function after deploying the service function.
  • the operation of the service function for example, it can include but is not limited to: creation, modification or deletion.
  • the service chain registration information is exchanged between the service chain management device and the NEF.
  • the service chain management device sends the service chain registration information to the NEF, and the service chain registration information can carry one or more of the following information: the correspondence between the service function type and the service function identifier, the service function Correspondence between type and external SC Id, service function type, service function identifier and DNAI correspondence, service function identifier, external SC Id identifier and DNAI correspondence.
  • the service function may include, for example, a service function such as creation, modification or deletion.
  • the AF receives the trigger and decides that it needs to request service chain processing. For example, the AF decides to request resources and business value-added services for the application that the UE is accessing.
  • the AF sends a service chain discovery (service chain discovery) request message to the NEF.
  • service chain discovery service chain discovery
  • the request message may carry: the required service function type and DNAI information.
  • NEF can return the service function or SC Id supported by DNAI and the type of service function included according to the DNAI information.
  • NEF can return the corresponding service function Id or SC Id and the included service function type according to the type of service function.
  • the AF may initiate a request message as in the previous method 500 to method 1000 embodiments.
  • a possible business chain processing flow is exemplarily introduced above in conjunction with steps 1101-1104 shown in FIG. 11.
  • the service function is registered to the NEF. Scenarios in which a third party requests a query to obtain a business chain when it is required to request business chain processing.
  • the above steps are only exemplary descriptions and are not strictly limited.
  • the size of the sequence numbers of the above processes does not mean the sequence of execution, and the execution sequence of each process should be determined by its function and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.
  • third-party applications can dynamically request service chains.
  • the network registers the supported service functions or service chains with the NEF, and third-party applications can obtain the corresponding service functions or service chains through query.
  • the information of the service chain is mentioned many times, such as the information of the required service chain or the information of the service chain to be queried, which is used to represent the information related to the service chain, for example, it may include SC Id, external SC Id, service function information, external service function information, DNAI, etc.
  • the network elements in the existing network architecture are mainly used as examples for illustrative description.
  • the application examples are not limited.
  • network elements that can implement the same function in the future are all applicable to the embodiments of the present application.
  • any architecture in which a service chain can be deployed in the future is applicable to the embodiments of the present application.
  • the service chain policy corresponding to the request application is mainly used as an example for illustrative description, and it should be understood that this is not limited.
  • a service chain policy can be formulated using the solutions of the embodiments of the present application.
  • method 400 and method 300 may be used in combination or independently.
  • method 1100 may be used alone, or may be used in combination as a preparation for method 500-method 1000, and so on.
  • network devices eg. various network elements
  • components eg, chips or circuits
  • FIG. 12 is a schematic block diagram of an apparatus 1200 provided by an embodiment of the present application.
  • the apparatus 1200 includes a transceiver unit 1210 and a processing unit 1220 .
  • the transceiver unit 1210 can implement corresponding communication functions, and the processing unit 1220 is used for data processing.
  • Transceiver unit 1210 may also be referred to as a communication interface or a communication unit.
  • the apparatus 1200 may further include a storage unit, which may be used to store instructions and/or data, and the processing unit 1220 may read the instructions and/or data in the storage unit, so that the apparatus implements the foregoing method embodiments .
  • a storage unit which may be used to store instructions and/or data
  • the processing unit 1220 may read the instructions and/or data in the storage unit, so that the apparatus implements the foregoing method embodiments .
  • the apparatus 1200 may be used to perform the actions performed by the network equipment (eg, various network elements) in the above method embodiments.
  • the apparatus 1200 may be a network equipment or a component that can be configured in the network equipment, and the transceiver unit 1210 is used for To perform the operations related to sending and receiving on the network device side in the above method embodiments, the processing unit 1220 is configured to perform the operations related to the processing on the network device side in the above method embodiments.
  • the apparatus 1200 is configured to perform the actions performed by the first network element in the above method embodiments.
  • the transceiver unit 1210 is configured to receive a first request message from the second network element, where the first request message includes the information of the service chain required by the application; the transceiver unit 1210 is further configured to send a message to the third network Meta sends the business chain policy corresponding to the application, and the business chain policy corresponding to the application is formulated according to the information of the business chain required by the application.
  • the processing unit 1220 is configured to determine the service chain policy corresponding to the application according to the information of the service chain required by the application.
  • the apparatus 1200 may implement steps or processes corresponding to the first network element in the method embodiment according to the embodiment of the present application, and the apparatus 1200 may include a unit for executing the method performed by the first network element in the method embodiment .
  • each unit in the apparatus 1200 and the above-mentioned other operations and/or functions are respectively for implementing the corresponding flow of the method embodiment in the first network element in the method embodiment.
  • the transceiver unit 1210 can be used to execute steps 310 and 330 in the method 300 ; the processing unit 1220 can be used to execute the processing steps in the method 300 , such as step 320 .
  • the transceiver unit 1210 can be used to execute steps 410 and 420 in the method 400 ; the processing unit 1220 can be used to execute the processing steps in the method 400 , such as step 401 .
  • the transceiver unit 1210 can be used to execute steps 502 , 503 , 505 and 506 in the method 500 ; the processing unit 1220 can be used to execute the processing steps of the method 500 , such as step 504 .
  • the transceiver unit 1210 can be used to execute steps 604 , 605 , 608 and 609 in the method 600 ; the processing unit 1220 can be used to execute the processing steps of the method 600 , such as step 607 .
  • the transceiver unit 1210 can be used to perform steps 705 , 708 and 709 in the method 700 ; the processing unit 1220 can be used to perform the processing steps in the method 700 , such as step 707 .
  • the transceiver unit 1210 can be used to execute steps 804 , 805 , 808 and 809 in the method 800 ; the processing unit 1220 can be used to execute the processing steps of the method 800 , such as step 807 .
  • the transceiver unit 1210 can be used to execute steps 904 , 906 - 908 , 910 , and 911 in the method 900 ; the processing unit 1220 can be used to execute the processing steps in the method 900 , such as Step 905.
  • the transceiver unit 1210 can be used to execute steps 1005 , 1008 , 1009 , 1011 to 1014 in the method 1000 ; the processing unit 1220 can be used to execute the processing steps in the method 1000 , such as Step 1007
  • the apparatus 1200 is configured to perform the actions performed by the second network element in the above method embodiments.
  • the transceiver unit 1210 is configured to send a first request message to the first network element, where the first request message includes the information of the service chain required by the application; the transceiver unit 1210 is further configured to receive information from the first network element. Meta indication information, the indication information is used to instruct to accept the request of the service chain required by the application.
  • the apparatus 1200 may implement steps or processes corresponding to those performed by the second network element in the method embodiment according to the embodiment of the present application, and the apparatus 1200 may include a unit for performing the method performed by the second network element in the method embodiment .
  • each unit in the apparatus 1200 and the above-mentioned other operations and/or functions are respectively for implementing the corresponding flow of the method embodiment in the second network element in the method embodiment.
  • the transceiver unit 1210 can be used to execute steps 310 and 320 in the method 300 ;
  • the transceiver unit 1210 can be used to execute steps 502 and 503 in the method 500 ; the processing unit 1220 can be used to execute the processing steps in the method 500 , such as step 501 .
  • the transceiver unit 1210 can be used to execute steps 602 , 604 , 605 and 606 in the method 600 ; the processing unit 1220 can be used to execute the processing steps of the method 600 , such as step 603 .
  • the transceiver unit 1210 can be used to perform steps 701 , 704 or 705 in the method 700 ; the processing unit 1220 can be used to perform the processing steps of the method 700 , such as step 702 .
  • the transceiver unit 1210 can be used to execute steps 802 , 804 , 805 , and 806 of the method 800 ; the processing unit 1220 can be used to execute the processing steps of the method 800 , such as step 803 .
  • the transceiver unit 1210 can be used to execute steps 902 , 904 , 909 , or 904 , 906 - 908 in the method 900 ; the processing unit 1220 can be used to execute the processing in the method 900 steps, such as step 903 or 905.
  • the transceiver unit 1210 can be used to execute steps 1001 , 1004 , 1005 , 1008 , 1009 , 1011 to 1014 in the method 1000 ; the processing unit 1220 can be used to execute the steps in the method 1000 Processing steps, such as steps 1002, 1003, or 1007.
  • the transceiver unit 1210 can be used to execute the step 1104 in the method 1100 ; the processing unit 1220 can be used to execute the processing steps of the method 1100 .
  • the apparatus 1200 is configured to perform the actions performed by the fourth network element in the above method embodiments.
  • the transceiver unit 1210 is used to receive a request message from the first network element, where the request message is used to request authorization of one or more service functions, or the request message is used to request a service corresponding to an application
  • the chain policy performs authorization; the transceiver unit 1210 is further configured to send a response message of the request message to the first network element.
  • the transceiver unit 1210 is specifically configured to receive a request message from the first network element, where the request message includes the service chain policy corresponding to the application and the identifier of the user accessing the application, and the request message is used to request the application corresponding to the application accessed by the user. authorized by the business chain strategy.
  • the transceiver unit 1210 is specifically configured to receive a request message from the first network element, where the request message includes information of one or more service functions and an identifier of a user accessing the application, and the request message is used to request a user access Authorization is performed by applying the information of one or more corresponding business functions.
  • the apparatus 1200 may implement steps or processes corresponding to the fourth network element in the method embodiment according to the embodiment of the present application, and the apparatus 1200 may include a unit for executing the method performed by the fourth network element in the method embodiment .
  • each unit in the apparatus 1200 and the above-mentioned other operations and/or functions are respectively for implementing the corresponding flow of the method embodiment in the fourth network element in the method embodiment.
  • the transceiver unit 1210 can be used to execute steps 410 and 420 in the method 400 ; the processing unit 1220 can be used to execute the processing steps in the method 400 .
  • the transceiver unit 1210 can be used to execute steps 906 and 907 in the method 900 ; the processing unit 1220 can be used to execute the processing steps of the method 900 .
  • the transceiver unit 1210 can be used to perform steps 1005 , 1012 and 1013 in the method 1000 ; the processing unit 1220 can be used to perform the processing steps in the method 1000 .
  • the apparatus 1200 is configured to perform the actions performed by the fifth network element in the above method embodiments.
  • the transceiver unit 1210 is used to receive a request message from the second network element, where the request message includes the information of the service chain required by the application; the processing unit 1220 is used for the information of the service chain required by the application. Perform processing; the transceiver unit 1210 is further configured to send the processed service chain information to the first network element.
  • the apparatus 1200 may implement steps or processes corresponding to the fifth network element in the method embodiment according to the embodiment of the present application, and the apparatus 1200 may include a unit for executing the method performed by the fifth network element in the method embodiment . Moreover, each unit in the apparatus 1200 and the above-mentioned other operations and/or functions are respectively for implementing the corresponding process of the method embodiment in the fifth network element in the method embodiment.
  • the transceiver unit 1210 can be used to execute steps 602 , 604 , 605 , and 605 of the method 600 ; the processing unit 1220 can be used to execute the processing steps of the method 600 , such as Step 603.
  • the transceiver unit 1210 can be used to execute steps 701 and 704 in the method 700 ; the processing unit 1220 can be used to execute the processing steps in the method 700 , such as step 702 .
  • the transceiver unit 1210 can be used to execute steps 802 , 804 - 806 of the method 800 ; the processing unit 1220 can be used to execute the processing steps of the method 800 , such as step 803 .
  • the transceiver unit 1210 can be used to execute steps 902 , 904 , 908 and 909 in the method 900 ; the processing unit 1220 can be used to execute the processing steps of the method 900 , such as step 903 .
  • the transceiver unit 1210 can be used to execute steps 1001 and 1004 in the method 1000 ; the processing unit 1220 can be used to execute the processing steps of the method 1000 , such as steps 1002 and 1003 .
  • the processing unit 1220 in the above embodiments may be implemented by at least one processor or processor-related circuits.
  • the transceiver unit 1210 may be implemented by a transceiver or a transceiver-related circuit.
  • the storage unit may be implemented by at least one memory.
  • an embodiment of the present application further provides an apparatus 1300 .
  • the apparatus 1300 includes a processor 1310 coupled with a memory 1320 for storing computer programs or instructions and/or data, and the processor 1310 for executing the computer programs or instructions and/or data stored in the memory 1320 such that The methods in the above method embodiments are performed.
  • the apparatus 1300 includes one or more processors 1310 .
  • the apparatus 1300 may further include a memory 1320 .
  • the device 1300 may include one or more memories 1320 .
  • the memory 1320 may be integrated with the processor 1310, or provided separately.
  • the apparatus 1300 may further include a transceiver 1330, and the transceiver 1330 is used for signal reception and/or transmission.
  • the processor 1310 is used to control the transceiver 1330 to receive and/or transmit signals.
  • the apparatus 1300 is configured to implement the operations performed by the network device (eg, each of the foregoing network elements) in the above method embodiments.
  • This embodiment of the present application further provides an apparatus 1400, where the apparatus 1400 may be a network device or a chip.
  • the apparatus 1400 may be configured to perform the operations performed by the network device (eg, each of the foregoing network elements) in the foregoing method embodiments.
  • Figure 14 shows a simplified schematic diagram of the structure.
  • Device 1400 includes part 1410 and part 1420 .
  • the 1410 part is mainly used for sending and receiving radio frequency signals and the conversion of radio frequency signals and baseband signals; the 1420 part is mainly used for baseband processing and controlling the base station.
  • the 1410 part may generally be referred to as a transceiver unit, a transceiver, a transceiver circuit, or a transceiver.
  • the 1420 part is usually the control center of the base station, which can usually be called a processing unit, and is used to control the base station to perform the processing operations on the receiving end device side in the above method embodiments.
  • the transceiver unit of part 1410 which may also be called a transceiver or a transceiver, etc., includes an antenna and a radio frequency circuit, where the radio frequency circuit is mainly used for radio frequency processing.
  • the device used for implementing the receiving function in part 1410 may be regarded as a receiving unit
  • the device used for implementing the sending function may be regarded as a sending unit, that is, part 1410 includes a receiving unit and a sending unit.
  • the receiving unit may also be referred to as a receiver, a receiver, or a receiving circuit, and the like
  • the transmitting unit may be referred to as a transmitter, a transmitter, or a transmitting circuit, and the like.
  • the 1420 portion may include one or more single boards, each of which may include one or more processors and one or more memories.
  • the processor is used to read and execute the program in the memory to realize the baseband processing function and control the base station. If there are multiple boards, each board can be interconnected to enhance the processing capability.
  • one or more processors may be shared by multiple boards, or one or more memories may be shared by multiple boards, or one or more processors may be shared by multiple boards at the same time. device.
  • FIG. 14 is only an example and not a limitation, and the above-mentioned network device including a transceiver unit and a processing unit may not depend on the structure shown in FIG. 14 .
  • the chip When the device 1400 is a chip, the chip includes a transceiver unit and a processing unit.
  • the transceiver unit may be an input/output circuit or a communication interface;
  • the processing unit may be a processor, a microprocessor or an integrated circuit integrated on the chip.
  • the apparatus 1400 may also be a chip system or a processing system, so that the device on which the apparatus 1400 is installed can implement the methods and functions of the embodiments of the present application.
  • the processing unit 1420 can be a chip system or a processing circuit in the processing system, which can control the device on which the chip system or the processing system is installed, and can also be coupled and linked to the storage unit to call the instructions in the storage unit, so that the device can realize the
  • the transceiver unit 1410 may be an input/output circuit in a chip system or a processing system, which outputs information processed by the chip system, or inputs data or signaling information to be processed into the chip system for processing. .
  • Embodiments of the present application further provide a computer-readable storage medium, on which computer instructions for implementing the method performed by a network device (eg, each network element) in the foregoing method embodiments are stored.
  • a network device eg, each network element
  • the computer program when executed by a computer, the computer can implement the method executed by the network device in the above method embodiments.
  • Embodiments of the present application further provide a computer program product including instructions, which, when executed by a computer, enable the computer to implement the method executed by a network device (eg, each network element) in the above method embodiments.
  • a network device eg, each network element
  • Embodiments of the present application further provide a communication system, where the communication system includes the network devices (eg, various network elements) in the above embodiments, such as AF and PCF, or NEF and PCF, or AF, NEF, and PCF, etc. Wait.
  • the network devices eg, various network elements
  • the network devices such as AF and PCF, or NEF and PCF, or AF, NEF, and PCF, etc. Wait.
  • processors mentioned in the embodiments of the present application may be a central processing unit (central processing unit, CPU), and may also be other general-purpose processors, digital signal processors (digital signal processors, DSP), application-specific integrated circuits ( application specific integrated circuit, ASIC), off-the-shelf programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the memory mentioned in the embodiments of the present application may be a volatile memory and/or a non-volatile memory.
  • the non-volatile memory may be read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically programmable Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory may be random access memory (RAM).
  • RAM can be used as an external cache.
  • RAM may include the following forms: static random access memory (SRAM), dynamic random access memory (DRAM), synchronous dynamic random access memory (SDRAM) , double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (synchlink DRAM, SLDRAM) and Direct memory bus random access memory (direct rambus RAM, DR RAM).
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • ESDRAM enhanced synchronous dynamic random access memory
  • SLDRAM synchronous link dynamic random access memory
  • Direct memory bus random access memory direct rambus RAM, DR RAM
  • the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic devices, discrete gate or transistor logic devices, or discrete hardware components
  • the memory storage module
  • memory described herein is intended to include, but not be limited to, these and any other suitable types of memory.
  • the disclosed apparatus and method may be implemented in other manners.
  • the apparatus embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, which may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to implement the solution provided in this application.
  • each functional unit in each embodiment of the present application may be integrated into one unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the computer may be implemented in whole or in part by software, hardware, firmware or any combination thereof.
  • software it can be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general purpose computer, special purpose computer, computer network, or other programmable device.
  • the computer may be a personal computer, a server, or a network device or the like.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server, or data center Transmission to another website site, computer, server, or data center is by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that includes an integration of one or more available media.
  • the usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVDs), or semiconductor media (eg, solid state disks (SSDs), etc.
  • the aforementioned usable media may include But not limited to: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Communication Control (AREA)

Abstract

L'invention concerne un procédé de détermination de stratégie et un appareil de communication. Le procédé peut comprendre les étapes suivantes : un premier élément de réseau reçoit un message de demande en provenance d'un deuxième élément de réseau, le message de demande comprenant des informations d'une chaîne de service requise par une application ; et le premier élément de réseau formule une stratégie de chaîne de service pour l'application en fonction des informations de la chaîne de service requise par l'application, et envoie, à un troisième élément de réseau, la stratégie de chaîne de service correspondant à l'application. De cette manière, lorsqu'on détermine qu'un service à valeur ajoutée d'application doit être fourni, un deuxième élément de réseau peut recevoir des informations pertinentes d'une chaîne de service requise dans un message de demande, de telle sorte que le deuxième élément de réseau peut formuler directement une stratégie de chaîne de service en fonction des informations de la chaîne de service requise, et on peut ainsi apporter une réponse rapide aux exigences de changement rapide d'une chaîne de service.
PCT/CN2021/129713 2021-02-09 2021-11-10 Procédé de détermination de stratégie et appareil de communication WO2022170798A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110179154.1A CN114915929A (zh) 2021-02-09 2021-02-09 确定策略的方法和通信装置
CN202110179154.1 2021-02-09

Publications (1)

Publication Number Publication Date
WO2022170798A1 true WO2022170798A1 (fr) 2022-08-18

Family

ID=82762311

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/129713 WO2022170798A1 (fr) 2021-02-09 2021-11-10 Procédé de détermination de stratégie et appareil de communication

Country Status (2)

Country Link
CN (1) CN114915929A (fr)
WO (1) WO2022170798A1 (fr)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109842895A (zh) * 2019-03-20 2019-06-04 腾讯科技(深圳)有限公司 一种网络可靠性配置方法、信息传输方法和装置以及系统
CN110048873A (zh) * 2018-01-16 2019-07-23 华为技术有限公司 多锚点协议数据单元会话的策略控制的方法和通信装置
CN110740430A (zh) * 2018-07-20 2020-01-31 维沃移动通信有限公司 资源计费方法与系统、af以及策略与计费功能实体

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110048873A (zh) * 2018-01-16 2019-07-23 华为技术有限公司 多锚点协议数据单元会话的策略控制的方法和通信装置
CN110740430A (zh) * 2018-07-20 2020-01-31 维沃移动通信有限公司 资源计费方法与系统、af以及策略与计费功能实体
CN109842895A (zh) * 2019-03-20 2019-06-04 腾讯科技(深圳)有限公司 一种网络可靠性配置方法、信息传输方法和装置以及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI, HISILICON: "Correction to traffic steering control", 3GPP DRAFT; S2-1810763 - 23501 CORRECTION TO TRAFFIC STEERING CONTROL, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. Dongguan, China; 20181015 - 20181019, 9 October 2018 (2018-10-09), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051539712 *

Also Published As

Publication number Publication date
CN114915929A (zh) 2022-08-16

Similar Documents

Publication Publication Date Title
JP7041212B2 (ja) 仮想化されたモバイルコアネットワークへの接続
WO2020168840A1 (fr) Procédé et appareil de sélection de nœud de réseau
WO2023280121A1 (fr) Procédé et appareil d'obtention de service de périphérie
US20220217611A1 (en) Service Configuration Method, Communication Apparatus, and Communication System
WO2021136211A1 (fr) Procédé et dispositif pour déterminer un résultat d'autorisation
KR20190133239A (ko) 중계 통신 방법과 중계 통신 장치 및 시스템
KR20210024160A (ko) 통신 방법 및 장치
US20230254922A1 (en) Multipath transmission method and communication apparatus
CN112752297B (zh) 一种通信方法及设备
US20230156833A1 (en) Packet Forwarding Method, Apparatus, and System
US20240172084A1 (en) Data transmission method and apparatus
WO2022199451A1 (fr) Procédé et appareil de commutation de session
US20220272577A1 (en) Communication method and communication apparatus
WO2023087965A1 (fr) Procédé et appareil de communication
KR20210144491A (ko) 무선 통신 시스템에서 단말의 데이터 세션 앵커의 재배치를 위한 방법 및 장치
KR20240060670A (ko) 통신 방법 및 장치
WO2022142792A1 (fr) Procédé et appareil de transmission de données
US20230180212A1 (en) P-bsr enhancements for iab networks to improve e2e latency
WO2022170798A1 (fr) Procédé de détermination de stratégie et appareil de communication
WO2024001897A1 (fr) Procédé et appareil de communication
WO2023142717A1 (fr) Procédé et appareil pour déterminer une politique de sélection d'itinéraire d'équipement utilisateur
WO2023160394A1 (fr) Procédé et appareil de communication
WO2023197772A1 (fr) Procédé de communication et appareil associé
US20240155325A1 (en) Information obtaining method and apparatus, and system
WO2023020481A1 (fr) Procédé de transmission de données et appareil

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21925445

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21925445

Country of ref document: EP

Kind code of ref document: A1