WO2022206315A1 - 网络切片的准入控制方法及装置 - Google Patents

网络切片的准入控制方法及装置 Download PDF

Info

Publication number
WO2022206315A1
WO2022206315A1 PCT/CN2022/079817 CN2022079817W WO2022206315A1 WO 2022206315 A1 WO2022206315 A1 WO 2022206315A1 CN 2022079817 W CN2022079817 W CN 2022079817W WO 2022206315 A1 WO2022206315 A1 WO 2022206315A1
Authority
WO
WIPO (PCT)
Prior art keywords
network slice
access
network
terminal device
indication information
Prior art date
Application number
PCT/CN2022/079817
Other languages
English (en)
French (fr)
Inventor
朱方园
李岩
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP22778499.8A priority Critical patent/EP4294087A1/en
Publication of WO2022206315A1 publication Critical patent/WO2022206315A1/zh
Priority to US18/478,983 priority patent/US20240031930A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/80Ingress point selection by the source endpoint, e.g. selection of ISP or POP
    • H04L45/85Selection among different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/80Ingress point selection by the source endpoint, e.g. selection of ISP or POP
    • H04L45/85Selection among different networks
    • H04L45/851Dynamic network selection or re-selection, e.g. after degradation of quality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/74Admission control; Resource allocation measures in reaction to resource unavailability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/76Admission control; Resource allocation using dynamic resource allocation, e.g. in-call renegotiation requested by the user or requested by the network in response to changing network conditions
    • H04L47/762Admission control; Resource allocation using dynamic resource allocation, e.g. in-call renegotiation requested by the user or requested by the network in response to changing network conditions triggered by the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • H04W60/04Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration using triggered events

Definitions

  • the present application relates to the field of communication technologies, and in particular, to an admission control method and device for network slicing.
  • network slicing technology provides mutually isolated network environments for different application scenarios by virtualizing independent logical networks on the same network infrastructure, so that different application scenarios can customize network functions and features according to their own needs, thus effectively guaranteeing different The quality of service (QoS) requirements of the business.
  • QoS Quality of service
  • the goal of 5G network slicing is to organically combine terminal equipment, access network resources, core network resources, and network O&M and management systems to provide independent O&M and isolated networks for different application scenarios or business types.
  • the number of users that a network slice can accommodate is limited due to network resource constraints. Therefore, when the number of users accessed by the network slice reaches the maximum value, how to ensure that the terminal device accesses the network slice needs to be solved urgently.
  • the present application provides an admission control method and apparatus for a network slice, which can still ensure that the terminal equipment can access the network slice when the number of terminal equipments that the terminal equipment requests to access reaches a certain number (such as the maximum number of accesses). into the network slice.
  • an embodiment of the present application provides an admission control method for network slicing, the method comprising:
  • the access and mobility management network element receives a registration request message from the terminal device, and the registration request message carries the identification information of the network slice that the terminal device requests to access; In the case that the number of terminal devices that perform admission control and access to the network slice is greater than or equal to the first threshold, the access and mobility management network element sends a registration message that carries the identification information of the first network slice to the terminal device Accepting the message, the first network slice is a network slice that allows the terminal device to access.
  • the access and mobility management network element may also be referred to as a network element or a device having access and mobility management functions, or the like.
  • the access and mobility management network element may be an access and mobility management function (access and mobility management function, AMF) network element in the 5G network architecture.
  • AMF access and mobility management function
  • the network slice requested to be accessed by the terminal device may be one network slice, or may be at least two network slices, such as two or three network slices. It is understandable that although the first threshold is used in the embodiments of the present application to measure whether the network slice that needs to perform admission control among the network slices requested by the terminal device to access is still allowed to access the terminal device, when the terminal device requests access When there are two or more network slices in the network slice for which admission control needs to be performed, whether the first thresholds corresponding to the two or more network slices are the same is not limited in this embodiment of the present application. That is to say, the network slices that need to perform admission control among the network slices that the terminal device requests to access are network slice 1 and network slice 2, the first threshold used to measure network slice 1, and the network slice used to measure network slice 2. The first threshold may be different.
  • the network slices that need to perform admission control include the second network slice. Then the number of terminal devices accessed by the second network slice is greater than or equal to the first threshold, which can also be understood as: the number of terminal devices currently accessed by the second network slice is greater than or equal to the first threshold; the second network slice The number of terminal devices that have been accessed exceeds the quota; or, the number of terminal devices that have been accessed by the second network slice exceeds the quota; or, the second network slice cannot allow new terminal devices to access; or, the second network slice The terminal devices that have accessed the network slice reach the maximum number of allowed access (ie, the first threshold). Because the number of terminal devices accessed by the second network slice is greater than or equal to the first threshold, the terminal device cannot access the second network slice.
  • the first threshold can also be understood as: the number of terminal devices currently accessed by the second network slice is greater than or equal to the first threshold; the second network slice The number of terminal devices that have been accessed exceeds the quota; or, the number of terminal devices
  • the first network slice shown in this embodiment of the present application may be a network slice that does not belong to the network slices requested by the terminal device carried in the registration request message.
  • the terminal device cannot access these network slices, thus causing the terminal device to register fail.
  • the terminal device even if the number of terminal devices in the network slice requested by the terminal device that needs to perform admission control access to the network slice exceeds the quota, the terminal device still has network slices that can be accessed, such as the first network slice. slicing, so that not only the terminal device is successfully registered, but also can ensure that the terminal device can perform service communication in time through the first network slicing.
  • the first network slice is a default subscription network slice of the terminal device.
  • the subscription information (also referred to as subscription data) of the terminal device includes the default subscription network slice.
  • the terminal device requests access to the network slice, the number of terminal devices that need to perform admission control network slice access
  • the value is greater than or equal to the first threshold, the number of terminal devices accessed by the default subscription network slice of the terminal device may not reach a certain number, or the default subscription network slice does not need to perform admission control.
  • the terminal device accesses the default subscription network slice, which not only prevents the terminal device from failing to register, but also enables the terminal device to access the network slice in time to ensure the service quality of the terminal device.
  • the method further includes: determining, by the access and mobility management network element, that the terminal device is allowed to access a default subscription network slice.
  • the access and mobility management network element may determine at least one first network slice from one or more default subscription network slices as A network slice that allows end devices to access. If the first network slice needs to perform admission control, the access and mobility management network element may, after confirming that the number of terminal equipments accessed by the default subscription network slice is less than the second threshold, from the access terminal equipment Among the one or more default subscription network slices whose number is less than the second threshold, it is determined that at least one first network slice is a network slice that allows the terminal device to access.
  • the access and mobility management network element determines that the terminal device is allowed to access the default subscription network slice, including:
  • the access and mobility management network element configures first information, where the first information is used to indicate the number of terminal devices that need to perform admission control network slice access in the network slice to which the terminal device requests access When it is greater than or equal to the first threshold, the terminal device is allowed to access the default subscription network slice; the access and mobility management network element determines, according to the first information, that the terminal device is allowed to access the network slice. Describe the default subscription network slice.
  • the access and mobility management network element determines that the terminal device is allowed to access the default subscription network slice, including:
  • the access and mobility management network element sends a first request message to the unified data management network element; the access and mobility management network element receives the first response message from the unified data management network element, and the first response message is received from the unified data management network element.
  • a response message carries the identification information of the default subscription network slice and first indication information, where the first indication information is used to indicate the network slice access that needs to perform admission control when the terminal device requests access to the network slice.
  • the access and mobility management network element determines to allow the default subscription network slice according to the first indication information The terminal device accesses the default subscription network slice.
  • the access and mobility management network element determines that the terminal device is allowed to access the default subscription network slice, including:
  • the access and mobility management network element determines, according to the subscription information of the terminal device, that the terminal device is allowed to access the default subscription network slice, wherein the subscription information of the terminal device includes first indication information,
  • the first indication information is used to indicate that when the number of terminal devices that need to perform admission control access to the network slice in the network slice requested by the terminal device is greater than or equal to the first threshold, the terminal device is allowed to access the network slice. Enter the default subscription network slice.
  • the number of terminal devices accessing the first network slice is less than a second threshold.
  • the method further includes:
  • the access and mobility management network element sends a second request message to the first network element, where the second request message carries the identification information of the network slice that needs to perform admission control among the network slices that the terminal device requests to access and the identification information of the default subscription network slice; the access and mobility management network element receives a second response message from the first network element, and the second response message carries the second indication information and the third Indication information, where the second indication information is used to indicate that the number of terminal devices that need to perform admission control access to the network slice in the network slice requested by the terminal device is greater than or equal to the first threshold, the first The three indication information is used to indicate that the number of terminal devices accessed by the default subscription network slice is less than the second threshold.
  • the access and mobility management network element can simultaneously obtain the number of terminal devices accessed by the first network slice, and access control needs to be performed in the network slice requested by the terminal device to access The number of terminal devices connected to the network slice. Therefore, when the number of terminal devices that need to perform admission control network slice access in the network slice requested by the terminal device to access is greater than or equal to the first threshold, the access and mobility management network element can subscribe according to the default The number of terminal devices accessed by the network slice determines that the first network slice is a network slice that allows terminal devices to access.
  • the terminal device can access the first network slice and avoid the situation that the terminal device fails to register; but also because the access and mobility management network element interacts with the first network element once (that is, the second request message and the second response). message), the first network slice can be determined, which improves the efficiency of signaling interaction.
  • the second request message further includes fourth indication information, where the fourth indication information is used to indicate a network slice that needs to perform admission control among the network slices that the terminal requests to access When the number of accessed terminal devices is greater than or equal to the first threshold, the admission control for the default subscription network slice is triggered (which may also be understood as activation).
  • the second request message further includes fifth indication information, where the fifth indication information is used to instruct the first network element to determine, from a plurality of the default subscription network slices, the The first network slice, or the fifth indication information is used to instruct the first network element to perform terminal device counting only on the first network slice in the plurality of default subscription network slices.
  • the first network slice is a network slice with the smallest number of access terminal devices among the multiple default subscription network slices.
  • the method further includes:
  • the access and mobility management network element sends the The first network element sends a third request message, where the third request message carries the identification information of the default subscription network slice; the access and mobility management network element receives a third response from the first network element message, the third response message carries third indication information, where the third indication information is used to indicate that the number of terminal devices accessed by the default subscription network slice is less than the second threshold.
  • the third request message further includes sixth indication information, where the sixth indication information is used to instruct the first network element to determine, from a plurality of the default subscription network slices, the The first network slice, or the sixth indication information is used to instruct the first network element to perform terminal device counting only on the first network slice in the multiple default subscription network slices.
  • the first network slice is a network slice with the smallest number of access terminal devices among the multiple default subscription network slices.
  • the first network slice is a network slice that does not need to perform admission control.
  • the method further includes:
  • the access and mobility management network element sends a subscription request message to the first network element, where the subscription request message carries the identification information of the network slice for which admission control needs to be performed and all the network slices that the terminal device requests to access. identification information of the terminal device; the access and mobility management network element receives a first notification message from the first network element, the first notification message carries seventh indication information, and the seventh indication information is used.
  • the number of terminal devices accessed by the second network slice in the network slice that indicates that the terminal device requests access to the network slice that needs to perform admission control is less than the first number threshold; the access and mobility management network element is directed to The terminal device sends a second notification message, where the second notification message carries the identification information of the second network slice.
  • the number of UEs accessed by the second network slice is less than the first threshold, it is ensured that the UEs can access the second network slice in a timely and effective manner. Therefore, the fairness of the UE's access to the network slice is effectively ensured, so that the UE can access the network slice it requests to access.
  • an embodiment of the present application provides a network slice admission control method, the method includes:
  • the terminal device sends a registration request message to the access and mobility management network element, where the registration request message carries the identification information of the network slice that the terminal device requests to access;
  • the terminal device receives a registration accept message from the access and mobility management network element, where the registration accept message carries the identification information of the first network slice, and the first network slice is a network slice that allows the terminal device to access.
  • Network Slicing
  • the first network slice is a default subscription network slice of the terminal device.
  • the number of terminal devices accessing the first network slice is less than a second threshold.
  • the first network slice is a network slice with the smallest number of access terminal devices among the plurality of default subscription network slices.
  • the first network slice is a network slice that does not need to perform admission control.
  • an embodiment of the present application provides a communication apparatus, which is configured to execute the method in the first aspect or any possible implementation manner of the first aspect.
  • the communication apparatus includes corresponding means for performing the method of the first aspect or any possible implementation of the first aspect.
  • the communication device may be an access and mobility management network element or a chip in the access and mobility management network element, or the like.
  • an embodiment of the present application provides a communication apparatus for executing the method in the second aspect or any possible implementation manner of the second aspect.
  • the communication apparatus includes a corresponding method having a method for performing the second aspect or any possible implementation of the second aspect.
  • the communication apparatus may be a terminal device or a chip in the terminal device, or the like.
  • the above-mentioned communication apparatus may include a transceiving unit and a processing unit.
  • a transceiving unit and a processing unit.
  • the transceiver unit and the processing unit reference may also be made to the apparatus embodiments shown below.
  • an embodiment of the present application provides a communication apparatus, where the communication apparatus includes a processor configured to execute the method shown in the first aspect or any possible implementation manner of the first aspect.
  • the processor is configured to execute a program stored in the memory, and when the program is executed, the method shown in the first aspect or any possible implementation manner of the first aspect is executed.
  • the process of sending a message in the above method can be understood as a process of outputting the above message by the processor.
  • the processor When the processor outputs the above-mentioned message, the processor outputs the above-mentioned message to the transceiver for transmission by the transceiver. After the above-mentioned message is output by the processor, other processing may be required before reaching the transceiver.
  • the processor receives an input message (such as receiving a registration request message or a first response message, etc.)
  • the transceiver receives the above-mentioned message and inputs it into the processor.
  • the above-mentioned message may need to be processed in other ways before being input to the processor.
  • the above-mentioned processor may be a processor specially used to execute these methods, or may be a processor that executes computer instructions in a memory to execute these methods, such as a general-purpose processor.
  • the above-mentioned memory can be a non-transitory (non-transitory) memory, such as a read-only memory (Read Only Memory, ROM), which can be integrated with the processor on the same chip, or can be set on different chips respectively.
  • ROM read-only memory
  • the embodiment does not limit the type of the memory and the setting manner of the memory and the processor. It can be understood that the description of the processor and the memory is also applicable to the sixth aspect shown below, and the sixth aspect will not be described in detail for the convenience of repeating the description.
  • the memory is located outside the above-mentioned communication device.
  • the memory is located within the above-mentioned communication device.
  • the processor and the memory may also be integrated into one device, that is, the processor and the memory may also be integrated together.
  • the communication device further includes a transceiver, which is used for receiving a signal or transmitting a signal.
  • the transceiver may be used to receive registration request messages, and to send registration accept messages.
  • the transceiver may be used to send the first request message and receive the first response message.
  • the transceiver may be configured to send a second request message, receive a second response message, etc., which will not be described in detail here.
  • the communication device may be an access and mobility management network element or a chip in the access and mobility management network element, or the like.
  • an embodiment of the present application provides a communication device, where the communication device includes a processor, configured to execute the method shown in the second aspect or any possible implementation manner of the second aspect.
  • the processor is configured to execute a program stored in the memory, and when the program is executed, the method shown in the second aspect or any possible implementation manner of the second aspect is executed.
  • the memory is located outside the above-mentioned communication device.
  • the memory is located within the above-mentioned communication device.
  • the processor and the memory may also be integrated into one device, that is, the processor and the memory may also be integrated together.
  • the communication device further includes a transceiver, which is used for receiving a signal or transmitting a signal.
  • the communication device may be a terminal device or a chip in the terminal device, or the like.
  • an embodiment of the present application provides a communication device, the communication device includes a logic circuit and an interface, the logic circuit is coupled with the interface; the interface is used for inputting a registration request message and outputting a registration accept message. It can be understood that the logic circuit may be used to process an input registration request message, etc., and the specific implementation of the logic circuit is not limited in this embodiment of the present application.
  • the logic circuit is configured to determine that the first network slice is a candidate network slice of the network slice that the terminal device is allowed to access.
  • the interface is further configured to output a second request message and input a second response message.
  • the interface is further configured to output a third request message and input a third response message.
  • the interface is further used to output a subscription request message, input a first notification message, and output a second notification message, and so on.
  • an embodiment of the present application provides a communication device, the communication device includes a logic circuit and an interface, the logic circuit is coupled to the interface; the interface is used for outputting a registration request message and inputting a registration accept message.
  • the logic circuit is used to process the input registration acceptance message, etc., and the specific implementation of the logic circuit is not limited in this embodiment of the present application.
  • the registration request message, the registration accept message, the first request message, the first response message, the second request message, the second response message, the third request message, the third For the description of the response message, the subscription request message, the first notification message, the second notification message, etc., reference may be made to the description of the above-mentioned first aspect or the second aspect; alternatively, reference may also be made to the various embodiments shown below, which will not be described in detail here. described.
  • an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium is used to store a computer program, which, when running on a computer, enables the first aspect or any possible possibility of the first aspect The methods shown in the implementation are executed.
  • an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium is used to store a computer program, which, when running on a computer, enables the second aspect or any possible possibility of the second aspect.
  • the methods shown in the implementation are executed.
  • an embodiment of the present application provides a computer program product, where the computer program product includes a computer program or computer code that, when run on a computer, enables the first aspect or any possible implementation manner of the first aspect The method shown is executed.
  • an embodiment of the present application provides a computer program product, the computer program product includes a computer program or computer code, which, when run on a computer, enables the above-mentioned second aspect or any possible implementation manner of the second aspect The method shown is executed.
  • an embodiment of the present application provides a computer program.
  • the computer program runs on a computer, the method shown in the first aspect or any possible implementation manner of the first aspect is executed.
  • an embodiment of the present application provides a computer program.
  • the computer program runs on a computer, the method shown in the second aspect or any possible implementation manner of the second aspect is executed.
  • an embodiment of the present application provides a wireless communication system, where the wireless communication system includes an access and mobility management network element and a terminal device, where the access and mobility management network element is configured to perform the above-mentioned first aspect Or the method shown in any possible implementation manner of the first aspect, the terminal device is configured to execute the method shown in the foregoing second aspect or any possible implementation manner of the second aspect.
  • an embodiment of the present application provides a wireless communication system, where the wireless communication system includes an access and mobility management network element and a first network element, where the access and mobility management network element is configured to execute the above-mentioned first network element.
  • the first network element is used to perform admission control on network slices, etc.
  • an embodiment of the present application provides a wireless communication system, where the wireless communication system includes an access and mobility management network element, a first network element, and a terminal device.
  • the wireless communication system includes an access and mobility management network element, a first network element, and a terminal device.
  • the access and mobility management network element, the first network, and the terminal device reference may be made to the first aspect and the second aspect above, or, the method embodiments shown below may also be referred to.
  • FIG. 1 is a schematic diagram of a communication system provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of another communication system provided by an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of a registration method provided by an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of an admission control method for network slicing provided by an embodiment of the present application
  • 5a to 5c are schematic flowcharts of a method for determining that a UE is allowed to access a default subscription network slice provided by an embodiment of the present application;
  • 6 to 8 are schematic flowcharts of an admission control method for network slicing provided by an embodiment of the present application.
  • 9 to 11 are schematic structural diagrams of a communication device provided by an embodiment of the present application.
  • At least one (item) means one or more
  • plural means two or more
  • at least two (item) means two or three and three
  • “and/or” is used to describe the relationship of related objects, indicating that there can be three kinds of relationships, for example, "A and/or B” can mean: only A exists, only B exists, and both A and B exist three A case where A and B can be singular or plural.
  • the character “/” generally indicates that the associated objects are an “or” relationship.
  • At least one of the following” or similar expressions refers to any combination of these items. For example, at least one (a) of a, b or c, can mean: a, b, c, "a and b", “a and c", “b and c", or "a and b and c" ".
  • LTE long term evolution
  • FDD frequency division duplex
  • TDD time division duplex
  • IoT Internet of Things
  • NB-IoT narrowband Internet of Things
  • WiFi wireless fidelity
  • 5G 5th generation
  • NR new radio
  • the terminal device in this application is a device with wireless transceiver function.
  • a terminal device can communicate with one or more core network (core network, CN) devices (or also referred to as an access device) in a radio access network (RAN). to communicate with the core device).
  • Terminal equipment may also be referred to as user equipment (UE), access terminal, terminal, subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user Terminal, user agent, or user device, etc.
  • terminal equipment can be deployed on land, including indoor or outdoor, handheld or vehicle-mounted; it can also be deployed on water (such as ships, etc.); it can also be deployed in the air (such as aircraft, balloons and satellites) superior).
  • the terminal device may be a handheld device with a wireless communication function, a vehicle-mounted device, a wearable device, a terminal in the Internet of Things, the Internet of Vehicles, a fifth-generation (5th generation, 5G) network, and a future network Any form of terminal equipment, etc., is not limited in this application.
  • the terminal equipment shown in this application may not only include vehicles (such as complete vehicles) in the Internet of Vehicles, but also include in-vehicle equipment or in-vehicle terminals in the Internet of Vehicles. Not limited.
  • the terminal device shown below will take the UE as an example to illustrate the method provided in this application.
  • the 5G network has made network architecture adjustments compared to the 4G network.
  • the 5G network splits the mobility management entity (MME) in the 4G network into two parts including the access and mobility management function (AMF) and the session management function (session management function). , SMF) and other network elements (or can also be called network functions).
  • MME mobility management entity
  • AMF access and mobility management function
  • SMF session management function
  • other network elements or can also be called network functions).
  • the AMF shown in this application is the control plane network function provided by the PLMN, and is responsible for the access control and mobility management of the UE accessing the PLMN, including functions such as mobility state management, assignment of temporary user identities, and authentication and authorization of users. Therefore, with the development of the mobile network, even if the AMF may evolve into other forms or names, as long as the method shown in the present application can be implemented, it falls within the protection scope of the present application.
  • the access and mobility management network elements shown below will take the AMF as an example to illustrate the method provided in this application.
  • the first network element shown in this application may be used to perform admission control (admission control) on the network slice.
  • the first network element may control and/or monitor the number of terminal devices that need to perform admission control to access the network slice, so as to ensure that the total number of terminal devices that have currently accessed the network slice does not exceed the number of terminal devices currently connected to the network slice.
  • the maximum number of UEs per network slice allowed to access the network slice may also store the number of terminal devices that have currently accessed the network slice, or store an identification list (also referred to as a first identification list) of terminal devices that have currently accessed the network slice.
  • the identifiers in the first identifier list are used to identify terminal devices that have currently accessed the network slice.
  • the first network element may also configure the maximum number of terminal devices allowed to access the network slice, that is, the first network element may configure the maximum number of users allowed to access the network slice ((maximum number of UEs per network slice) .
  • the method for the first network element to perform admission control on the network slice may be: if a terminal device (such as terminal device 1) requests to access a certain network slice that needs to perform admission control, the first network element checks the first network slice. Whether an identification list (that is, the identification list of the terminal equipment that the terminal equipment 1 requests to access to a network slice that needs to perform admission control has been accessed) already contains the identification of the terminal equipment 1 . If there is no identification of the terminal device 1 in the first identification list, further check whether the number of terminal devices identified in the first identification list has reached the maximum number of terminal devices allowed to access by the network slice.
  • an identification list that is, the identification list of the terminal equipment that the terminal equipment 1 requests to access to a network slice that needs to perform admission control has been accessed
  • the first network element increases the number of terminal devices currently accessing the network slice by 1, and adds the identifier of terminal device 1 to the first identifier list in. If the maximum value has been reached, the terminal device is not allowed to access the network slice.
  • the method for the first network element to perform admission control on a network slice may be: if a terminal device (such as terminal device 2) requests to access a certain network slice that needs to perform admission control, the first network element checks the network slice. Whether the number of terminal devices connected to the network slice has reached the maximum value. If the maximum value is not reached, the first network element increases the number of terminal devices currently connected to the network slice by 1, and adds the identifier of terminal device 2 to the identifier list of terminal devices that have accessed the network slice middle.
  • a terminal device such as terminal device 2
  • the first network element increases the number of terminal devices currently connected to the network slice by 1, and adds the identifier of terminal device 2 to the identifier list of terminal devices that have accessed the network slice middle.
  • first network element shown in this application may also perform admission control on network slices according to other methods, which is not limited in this application.
  • the first network element may include a network slice admission control (network slice admission control, NSAC) network element, or a network slice admission control function (network slice admission control function, NSACF) network element, etc.
  • the specific name of the first network element is not limited.
  • the terminal device that has been connected to the network slice described in this application can also be understood as the terminal device that has registered the network slice.
  • the number of terminal devices that have accessed the network slice described in this application can also be understood as the number of registered users on the network slice.
  • the method provided by the present application will be described below by taking the first network element as an NSACF as an example.
  • FIG. 1 is a schematic diagram of a communication system according to an embodiment of the present application, and the network architecture may include three parts, namely a terminal device part, a public land mobile network (PLMN) and a data network ( data network, DN).
  • PLMN public land mobile network
  • DN data network
  • the PLMN described in this application may specifically be a network that meets the requirements of the 3rd generation partnership project (3GPP) standard, which is referred to as a 3GPP network for short.
  • 3GPP 3rd generation partnership project
  • 3GPP networks generally include, but are not limited to, a fifth-generation (5th-generation, 5G) network (referred to as a 5G network), a fourth-generation (4th-generation, 4G) network (referred to as a 4G network), and the like.
  • the data network DN 120 which may also be referred to as a packet data network (PDN), is usually a network located outside the PLMN, such as a third-party network.
  • the PLMN can access multiple data networks DN 120, and multiple services can be deployed on the data network DN 120, so as to provide the terminal device 110 with services such as data and/or voice.
  • the PLMN may include: NSACF131, network slice selection function (NSSF) 132, policy control function (PCF) 133, unified data management (unified data management, UDM) 134, Application function (AF) 135, authentication server function (AUSF) 136, access and mobility management function (AMF) 137, session management function (SMF) 138.
  • the part other than the (radio) access network 140 part may be referred to as a core network (core network, CN) part or a core network part.
  • the unified data management UDM 134 is a control plane function provided by the operator, and is responsible for storing information such as subscriber permanent identifier (SUPI), security context (security context), and subscription data of subscribers in the PLMN.
  • PLMN subscribers may specifically be users who use services provided by the PLMN, such as users who use the terminal equipment core card of China Telecom, or users who use the terminal equipment core card of China Mobile.
  • the SUPI of the subscriber may be the number of the core card of the terminal device, or the like.
  • the above-mentioned security context may be data (cookie) or token (token) stored on a local terminal device (for example, a mobile phone).
  • the contract data of the above-mentioned contract user may be the supporting services of the terminal device chip card, such as the data package of the mobile phone chip card, and the like.
  • the subscription data may include the information of the subscribed network slice (also referred to as subscribed S-NSSAI).
  • the subscription data may further include eighth indication information, where the eighth indication information may be used to indicate whether the subscribed S-NSSAI contained in the subscription data is a default subscription network slice (also referred to as default subscribed S-NSSAI).
  • the default subscription network slice and the subscription network slice can be distinguished. That is to say, default subscribed S-NSSAI can be understood as one of subscribed S-NSSAI, and it is also a contracted network slice. But the default subscribed S-NSSAI can be used as the default slice.
  • the subscription data may also include first indication information, where the first indication information is used to indicate that the number of UEs that need to perform admission control access to the network slice in the network slice to which the UE requests access is greater than or equal to the number of UEs. At a threshold, the UE is allowed to access the default subscribed network slice.
  • the subscription data of the subscribing user may also be referred to as the subscription data of the UE, or the subscription information of the UE, etc.
  • the specific name of the subscription data is not limited in this application.
  • Nnsacf, Nnssf, Nausf, Npcf, Nudm, Naf, Namf, Nsmf, N1, N2, N3, N4, and N6 are interface serial numbers.
  • the terminal device 110 is used as an example for the UE, and the interface names between various network functions in FIG. 1 are only an example. In the specific implementation, the interface names of the system architecture Other names may also be used, which are not limited in this application.
  • the network architecture (eg, 5G network architecture) shown in FIG. 1 adopts a service-based architecture and a service-based interface, and the method shown in this application can also be applied to a point-to-point interface, as shown in FIG. 2 .
  • N1, N2, N3, N4, N5, N6, N7, N8, N10, N11, N12, N13, N15, N22, N58, N59, N60, N61, etc. shown in FIG. 2 are interface serial numbers.
  • Exemplarily, for the meaning of the above-mentioned interface serial number reference may be made to the meaning defined in the 3GPP standard protocol, and this application does not limit the meaning of the above-mentioned interface serial number.
  • the communication systems shown in FIG. 1 and FIG. 2 are only examples, and for example, the communication system may also include a network open function (network repository function, NRF) or a network slice authentication and authorization function (network slice-specific function). authentication and authorization function, NSSAAF), etc.
  • NRF network repository function
  • NSSAAF network slice authentication and authorization function
  • a simple understanding of slicing is to cut the operator's physical network into multiple virtual end-to-end networks.
  • Each virtual network (including the equipment, access network, transmission network, and core network in the network) is logically independent, and any virtual network is logically independent. Failure of one virtual network will not affect other virtual networks.
  • relatively independent management and operation and maintenance between businesses are required, and tailored business functions and analysis capabilities are provided.
  • Instances of different service types can be deployed on different network slices, and different instances of the same service type can also be deployed on different network slices.
  • a slice can consist of a set of network functions (NF) and/or sub-networks, etc.
  • NF network functions
  • the sub-networks (R) AN140, AMF 137, SMF 138, UPF 139 in Figure 1 can form a slice. It can be understood that only one of each network function in Fig. 1 is schematically drawn, and in actual network deployment, there may be multiple, dozens or hundreds of each network function or sub-network. Many slices can be deployed in PLMN, and each slice can have different performance to meet the needs of different applications and different vertical industries.
  • S-NSSAI Single network slice selection assistance information
  • a network slice can be identified by S-NSSAI, S-NSSAI can be distinguished by slice/service type (SST), or S-NSSAI can be identified by SST and slice differentiater (SD) )composition.
  • SST is used to describe the characteristics and business characteristics of slices.
  • SD is used to distinguish different network slices with the same SST features.
  • NSSAI Network slice selection assistance information
  • NSSAI is a set of S-NSSAI, and a set of one or more network slices can be identified by NSSAI.
  • the identification information of the network slice that the UE requests to access may be referred to as the requested NSSAI, or the requested S-NSSAI.
  • the identification information of the permitted network slice carried in the registration acceptance message may be referred to as an permitted NSSAI, or an permitted S-NSSAI.
  • FIG. 3 is a schematic flowchart of a network slice admission control method provided by an embodiment of the present application, and the method includes:
  • the UE sends a registration request message to the AMF, where the registration request message carries the identification information of the requested network slice.
  • the AMF receives the registration request message.
  • the identification information of the requested network slice may also be referred to as requested network slice selection assistance information (requested NSSAI).
  • requested NSSAI requested network slice selection assistance information
  • the AMF determines that the requested network slice includes a network slice that needs to perform admission control, and determines a target network slice, where the target network slice is a network slice that the UE requests to access and needs to perform admission control.
  • the target network slice may also be referred to as target NSSAI (target NSSAI).
  • target NSSAI target NSSAI
  • the AMF interacts with the NSACF to determine whether the quota of the target network slice (target NSSAI) has reached the maximum value of the number of terminal devices allowed to access the target network slice.
  • the AMF may send a request message to the NSACF, where the request message carries the target NSSAI, and the request message is used to request the NSACF to check the network slice corresponding to each S-NSSAI included in the target NSSAI for the currently accessed terminal equipment. Whether the number has exceeded the maximum value.
  • the AMF returns a registration acceptance message to the UE, where the registration acceptance message carries the identification information of the allowed network slice, wherein the identification information of the allowed network slice includes the above-mentioned S-NSSAI.
  • the NSACF may count the number of users in the network slice (that is, the number of users accessing the network slice). plus one).
  • the NSACF returns indication information 1 to the AMF, where the indication information 1 can be used to indicate that the number of terminal devices currently connected to the network slice has not reached the maximum value or that the network slice has an available quota (quota available) , so that the AMF includes the identification information of the network slice in the registration accept message. That is, the network slice with the available quota is an allowed network slice, and the identification information of the allowed network slice may also be called an allowed NSSAI (allowed NSSAI).
  • the AMF sends the UE to the UE.
  • a registration rejection message is returned, where the registration rejection message carries the identification information of the rejected network slice, wherein the identification information of the rejected network slice includes the above-mentioned S-NSSAI.
  • the NSACF returns indication information 2 to the AMF, and the indication information 2 is used to indicate that the number of terminal devices currently connected to the network slice in the target NSSAI has reached the maximum value or that the quota of the network slice is unavailable.
  • the AMF thus includes network slices that do not have available quotas in the Registration Reject message. That is, the network slice that does not have an available quota is a rejected network slice, and the identification information of the rejected network slice may also be referred to as rejected NSSAI (rejected NSSAI).
  • the quota of the network slice shown in this application can also be understood as: the number of UEs accessed by the network slice, or the number of users allowed to access the network slice, or the number of users registered in the network slice.
  • the quota of the network slice is unavailable, or the quota of the network slice is exceeded, or the number of UEs accessed by the network slice exceeds the quota, which can be understood as: the number of UEs accessed by the network slice exceeds the maximum value, or, the number of UEs accessed by the network slice exceeds the maximum value.
  • the number of UEs has reached the maximum number of UEs allowed to access, or the number of UEs accessed by the network slice is greater than or equal to the first threshold, or the number of UEs accessed by the network slice is greater than or equal to the first threshold.
  • the quota of the network slice is available, which can be understood as: the number of UEs accessed by the network slice does not exceed the maximum number, or the number of UEs accessed by the network slice has not reached the maximum number of UEs allowed to access, or, the number of UEs accessed by the network slice has not exceeded the maximum number.
  • the number of UEs is less than the first threshold.
  • admission control admission control
  • access control access control
  • the first threshold is used in this application to measure whether the network slice that needs to perform admission control among the network slices that the UE requests to access is still allowed to access the UE, it needs to be executed in the network slices that the UE requests to access.
  • the network slices for admission control are two or more network slices, it is not limited in this application whether the first thresholds corresponding to the two or more network slices are the same. That is to say, the network slices that need to perform admission control among the network slices that the UE requests to access are network slice 1 and network slice 2, the first threshold used to measure network slice 1, and the first threshold used to measure network slice 2.
  • a threshold which can be different.
  • the present application provides a network slice admission control method and apparatus, which can not only improve the accuracy rate of UE registration success, but also enable the UE to access the network slice in time.
  • admission control may be required for all network slices that the UE requests to access. Or, part of the network slices that the UE requests to access needs to perform admission control, so that the UE can access another part of the network slices that do not need to perform admission control.
  • a UE requests to access a network slice that needs to perform admission control if the number of UEs accessed by the network slice that needs to perform admission control is greater than or equal to the first threshold, the UE cannot access the network slice that needs to perform admission control. Controlled network slices.
  • the number of UEs that need to perform admission control access to the network slice in the network slice to which the UE requests access is greater than or equal to the first threshold
  • the number of UEs that the UE has subscribed to by default for access to the network slice may not have reached the second threshold , or, the UE's default subscription to the network slice does not need to perform admission control.
  • the UE can access the default subscribed network slice (also referred to as the default subscribed network slice) to improve the situation that the UE fails to register.
  • FIG. 4 is a network slice admission control method provided by an embodiment of the present application. Exemplarily, the method may be applied to the communication system shown in FIG. 1 , and may also be applied to the communication system shown in FIG. 2 , etc., and the embodiment of the present application will not describe the communication system to which the method is applicable. As shown in Figure 4, the method includes:
  • the UE sends a registration request message to the AMF, where the registration request message carries the identification information of the network slice that the UE requests to access.
  • the AMF receives the registration request message.
  • the network slice requested to be accessed by the UE may be one, or at least two network slices, such as two or three or more than three network slices.
  • the identification information of the network slice to which the UE requests access may be referred to as NSSAI (requested NSSAI) requested by the UE or S-NSSAI (requested S-NSSAI) requested by the UE.
  • the method shown in FIG. 4 further includes:
  • the AMF determines the network slice for which admission control needs to be performed among the network slices that the UE requests to access.
  • the AMF may determine the network slice for which admission control needs to be performed among the network slices that the UE requests to access according to the following method: 1.
  • the identification information of the network slice for which admission control needs to be performed is configured in the AMF. That is, the AMF is locally configured with the identification information of the network slice that needs to perform admission control. Therefore, the AMF can determine whether to include the identification information of the network slice that needs to perform admission control from the identification information of the network slice that the UE requests to access.
  • the UE's subscription data indicates the identification information of the network slice that needs to perform admission control. That is, the AMF can determine, according to the subscription data of the UE, whether the network slice that the UE requests to access includes the identification information of the network slice that needs to perform admission control.
  • This embodiment of the present application does not limit the method for the AMF to determine the network slice for which admission control needs to be performed from the network slices that the UE requests to access. It can be understood that the above description is also applicable to the method of judging whether the default subscription network slice needs to perform admission control, and will not be repeated below.
  • the AMF sends a registration acceptance carrying the identification information of the first network slice to the UE.
  • the first network slice is a network slice that the UE is allowed to access.
  • the UE receives the registration accept message.
  • the first network slice may be a default subscribed network slice (default subscribed S-NSSAI) of the UE. It can also be understood that the first network slice is included in the default subscription network slice of the UE.
  • the identification information of the first network slice may be included in the allowed NSSAI in the registration accept message.
  • the UE requests access and the access UEs are The identification information of the network slices whose number is greater than or equal to the first threshold may be included in the rejected NSSAI (rejected NSSAI) in the registration acceptance message.
  • the first thresholds corresponding to each network slice may be different. Therefore, the number of UEs that need to perform admission control access in the network slice to which the UE requests access is greater than or equal to the first threshold can also be understood as: each of the network slices to which the UE requests to access needs to perform admission control. The number of UEs accessed by the network slice is greater than or equal to the first threshold of the corresponding network slice. It is understandable that the above-mentioned first network slice is not included in the network slice that the UE requests to access.
  • the method shown in FIG. 4 may further include:
  • the AMF determines that the UE is allowed to access the default subscription network slice.
  • the AMF determines that the UE is allowed to access the default subscription network slice.
  • the identification information of the default subscription network slice may be referred to as default subscribed NSSAI, or default subscribed S-NSSAI.
  • the default subscription network slice does not need to perform admission control
  • the first network slice is a default subscription network slice that does not need to perform admission control.
  • step 402 may also be replaced with: the AMF determines at least one first network slice from one or more default subscription network slices.
  • the AMF may determine one default subscribed network slice from the plurality of default subscribed network slices as the first network slice. It can be understood that, for the description of this implementation manner, reference may also be made to the following description about FIG. 6 , which will not be described in detail here.
  • the default subscription network slice needs to perform admission control, that is, the first network slice is the default subscription network slice that needs to perform admission control.
  • the number of default subscription network slices of the UE is N, where N is an integer greater than or equal to 1.
  • the AMF may send the identification information of one or M or N default subscription network slices to the NSACF, where M is an integer greater than 1 and less than N.
  • the NSACF sends the identification information of the default subscription network slice smaller than the second threshold to the AMF according to whether the number of UEs that have been accessed by each network slice is smaller than the second threshold. At least one first network slice is determined among the slices.
  • the NSACF may also determine the network slice with the least number of access UEs as the first network slice according to the number of UEs accessed by each network slice, and send the identification information of the first network slice to the AMF.
  • the number of UEs accessing the default subscription network slice sent by the AMF to the NSACF is less than the second threshold.
  • the NSACF may not send the identification information of the default subscription network slice to the AMF, such as sending the third indication information. .
  • the third indication information reference may be made to the following, which will not be described in detail here.
  • the first network slice is a network slice in which the number of access UEs among the multiple default subscription network slices is less than the second threshold.
  • the first network slice is any one of the at least two network slices.
  • the first network slice is a network slice with the smallest number of access UEs among the multiple default subscription network slices.
  • the registration acceptance message may include one first network slice, or may include two or more first network slices.
  • the registration accept message may also include two or more first network slices. Therefore, the embodiments of the present application do not limit the number of first network slices determined by the AMF (or NSACF) and the number of first network slices carried in the registration acceptance message. For convenience of description, the method provided by the embodiment of the present application will be described below by taking a first network slice carried in the registration accept message as an example.
  • the terminal device can still access the network slice, such as the first Network slicing not only enables the terminal device to register successfully, but also ensures that the terminal device can perform service communication in time through the first network slice.
  • the AMF may also send The UE returns a registration rejection message.
  • the registration rejection message includes a rejection reason value and a back off timer. In this case, it means that among the network slices that the UE requests to access, the network slice that needs to perform admission control cannot allow the UE to access, and the default subscription network slice of the UE cannot allow the UE to access. Therefore, The UE can only initiate a registration request again after the delay timer expires.
  • Fig. 5a is a schematic flowchart of a method for determining that a UE is allowed to access a default subscription network slice provided by an embodiment of the present application. As shown in Figure 5a, the method includes:
  • the AMF configures first information, where the first information is used to indicate that the UE is allowed to access when the number of UEs that need to perform admission control access to the network slice in the network slice to which the UE requests access is greater than or equal to a first threshold.
  • Default subscription network slice
  • the AMF determines, according to the first information, that the UE is allowed to access the default subscription network slice.
  • the AMF is configured with the first information, which may also be referred to as the AMF is locally configured with the first information (it may also be referred to as the AMF is configured with a policy).
  • the first information is used to indicate that the UE is allowed to access the default subscription network slice when the number of UEs that need to perform admission control access to the network slice in the network slice to which the UE requests access is greater than or equal to the first threshold. That is, according to the first information or policy, when the number of UEs that need to perform admission control access to the network slice to which the UE requests access is greater than or equal to the first threshold, the AMF may not send registration information to the UE. reject message.
  • the first information can also be understood as: the first information is used to indicate when the UE requests access to the network slice that needs to perform admission control.
  • the first threshold it is further confirmed whether the number of UEs currently accessed by the default subscription network slice is less than the second threshold.
  • the UE can access the default subscription network slice it needs to be determined according to whether the number of UEs accessed by the default subscription network slice is less than the second threshold.
  • the above-mentioned first information may include first indication information, where the first indication information is used to indicate that the number of UEs accessing the network slice that needs to perform admission control in the network slice that the UE requests to access is greater than or equal to the first indication information.
  • the above-mentioned UE is allowed to access the default subscription network slice.
  • the above-mentioned first information may also include identification information of one or more default subscription network slices (such as default subscribed S-NSSAI, or default subscribed NSSAI).
  • Fig. 5b is a schematic flowchart of another method for determining that a UE is allowed to access a default subscription network slice provided by an embodiment of the present application. As shown in Figure 5b, the method includes:
  • the AMF sends the first request message to the UDM; correspondingly, the UDM receives the first request message.
  • the UDM sends a first response message to the AMF, and correspondingly, the AMF receives the first response message.
  • the first response message carries the identification information of the first network slice.
  • the first response message carries identification information of one or more default subscription network slices.
  • the AMF may determine to allow the UE to access the network slice carried in the first response message. That is to say, when the AMF requests the UDM for a default subscription network slice, the AMF may determine to allow the UE to access by default according to the default subscription network slice in the first response message.
  • the first response message carries identification information of the first network slice and first indication information, where the first indication information is used to indicate the network slice access that needs to perform admission control among the network slices that the UE requests to access.
  • the first response message carries the identification information of multiple default subscription network slices and the first indication information. That is, the AMF can clearly know that the UE can access the default subscription network slice through the first indication information.
  • the first response message may also carry subscription information of the UE, and the subscription information of the UE includes identification information of one or more default subscription network slices and first indication information. Therefore, the AMF can obtain one or more default subscription network slices (eg, the first network slice) from the subscription information of the UE.
  • the subscription information of the UE includes identification information of one or more default subscription network slices and first indication information. Therefore, the AMF can obtain one or more default subscription network slices (eg, the first network slice) from the subscription information of the UE.
  • the AMF determines, according to the first indication information, that the UE is allowed to access the default subscription network slice.
  • the UDM in the second implementation mode can also be other network elements, such as NSSF or PCF, etc.
  • the network element stores the identification information and/or the first indication information of the default subscription network slice of the UE, and the AMF can retrieve the information from the network element.
  • the identification information and/or the first indication information of the default subscription network slice of the UE is obtained in the element, and the network element belongs to the protection scope of the embodiment of the present application.
  • FIG. 5c is a schematic flowchart of another method for determining that a UE is allowed to access a default subscription network slice provided by an embodiment of the present application. As shown in Figure 5c, the method includes:
  • the AMF determines, according to the subscription information of the UE, that the UE is allowed to access the default subscription network slice.
  • the subscription information of the UE includes first indication information, where the first indication information is used to indicate that when the number of UEs that need to perform admission control access to the network slice in the network slice to which the UE requests access is greater than or equal to the first threshold , allowing the UE to access (or attempt to access) the default subscription network slice.
  • the subscription information of the UE further includes the identification information of the default subscription network slice.
  • the subscription information of the UE may be obtained by the AMF from the UDM.
  • the AMF may be the contract information obtained before step 401, the contract information obtained after step 401, or the contract information obtained before step 402, etc.
  • the AMF obtains the contract information Not limited. It is understandable that for the description of the subscription information, reference may be made to descriptions in other places, and details are not repeated here.
  • implementation manners 1 to 3 shown above may be mutually independent implementation manners, or may also be combined.
  • the first implementation and the second implementation are combined.
  • the second implementation mode and the third implementation mode are combined. That is, the different implementations are combined with each other, thereby ensuring that the AMF can effectively determine that the UE is allowed to access the default subscription network slice.
  • FIG. 6 to FIG. 8 shown below which will not be described in detail here.
  • FIG. 6 is a schematic flowchart of a network slice admission control method provided by an embodiment of the present application. As shown in FIG. 6 , the method includes:
  • the UE sends a registration request message to the AMF, and accordingly, the AMF receives the registration request message.
  • the registration request message carries the identification information of the network slice that the UE requests to access (that is, the requested NSSAI).
  • the AMF sends a first request message to the UDM, and accordingly, the UDM receives the first request message.
  • the UDM sends a first response message to the AMF, and correspondingly, the AMF receives the first response message.
  • the AMF may obtain subscription information of the UE (also referred to as subscription data of the UE) through steps 602 and 603 .
  • the subscription information of the UE may include identification information of a default subscription network slice.
  • the first indication information may be predefined (that is, configured on the AMF), that is, the subscription information of the UE does not include the first indication information, and the AMF allows the UE to access the default subscription in network slicing.
  • the subscription information of the UE may include identification information of the first network slice and first indication information.
  • the first indication information may be used to indicate that the first network slice does not need to perform admission control.
  • the subscription information of the UE may include identification information (subscribed S-NSSAI, or subscribed NSSAI) of the network slice subscribed by the UE, and some network slices subscribed by the UE may also be marked as default subscriptions Network Slicing.
  • the subscribed network slice may also be referred to as a default subscribed network slice.
  • Table 1 also shows the first indication information in the subscription information, that is, the first indication information is used to indicate that when the number of UEs requested by the UE to access the network slice has reached the maximum number (ie, the maximum value), the UE is allowed to access the network slice.
  • Default subscription network slice is used to indicate that when the number of UEs requested by the UE to access the network slice has reached the maximum number (ie, the maximum value), the UE is allowed to access the network slice.
  • the above steps 602 and 603 can also be understood as: the AMF obtains the UE's subscription information from the UDM through the NuDm_SDM_Get service operation request, and the UDM calls the service operation NuDm_SDM_Get response, and returns the UE's subscription information to the AMF.
  • the AMF can also obtain the default subscription network slice of the UE according to the configured first information.
  • the first information please refer to the above, which will not be detailed here. described.
  • the AMF may determine the network slice for which admission control needs to be performed among the network slices that the UE requests to access according to the following method: 1.
  • the identification information of the network slice for which admission control needs to be performed is configured in the AMF.
  • the UE's subscription data indicates the identification information of the network slice that needs to perform admission control. For the method for judging the network slice for which admission control needs to be performed among the network slices that the UE requests to access, the method shown in FIG.
  • the target NSSAI will be used to replace the identification information of the network slice that needs to perform admission control in the network slice that the UE requests to access.
  • the AMF sends a fourth request message to the NSACF, and correspondingly, the NSACF receives the fourth request message.
  • the fourth request message carries the identification information of the network slice that needs to perform admission control among the network slices that the UE requests to access.
  • the NSACF sends a fourth response message to the AMF, and correspondingly, the AMF receives the fourth response message.
  • the fourth response message carries second indication information, where the second indication information is used to indicate that the number of UEs accessing the network slice that needs to perform admission control in the network slice that the UE requests to access is greater than or equal to the first threshold.
  • the AMF can learn, according to the second indication information, that the number of UEs that need to perform admission control access to the network slice in the network slice requested by the UE has reached the maximum number (that is, greater than or equal to the first threshold, or has reached the maximum number) ), the UE has been unable to access the above network slice. Further, the AMF executes steps 606 and 607, so that the UE accesses the first network slice.
  • the above steps 604 and 605 can also be understood as: the AMF invokes a service-oriented operation of the NSACF such as Nnsacf_NSQuotaAvailabilityCheck_Request, and the service-oriented operation carries the target S-NSSAI(s).
  • the NSACF determines whether the number of UEs accessed by each network slice in the target S-NSSAI(s) is greater than or equal to equal to the first threshold.
  • the NSACF calls the service operation Nnsacf_NSQuotaAvailabilityCheck_Response, and returns to the AMF whether the number of UEs accessed by each network slice in the target S-NSSAI(s) is greater than or equal to the first threshold (also referred to as each network slice in the target S-NSSAI). the quota check result).
  • the fourth response message may also carry the number of UEs accessed by each network slice in the target NSSAI.
  • steps 604 and 605 may be after steps 602 and 603, that is, the AMF may obtain the subscription information of the UE before obtaining the second indication information.
  • steps 604 and 605 may be before steps 602 and 603, that is, the AMF may obtain the subscription information of the UE after obtaining the second indication information.
  • the AMF determines, according to the first indication information, that the UE is allowed to access the first network slice.
  • the AMF may determine that the UE is allowed to access the first network slice according to the first indication information in the first response message; then step 604 and step 605 are performed.
  • the AMF may save the UE's subscription information (or save the above-mentioned first indication information, etc.); then after steps 604 and 605, the AMF determines, according to the UE's subscription information, to allow the UE to access the first indication information.
  • the AMF may not obtain the first indication information through the foregoing steps 602 and 603, but may determine that the UE is allowed to access the first network slice through the locally configured first information. It can be understood that, for the specific description of the AMF determining that the UE is allowed to access the first network slice, reference may be made to FIG. 5a to FIG. 5c, which will not be repeated here.
  • the AMF sends a registration accept message to the UE, and accordingly, the UE receives the registration accept message.
  • the registration acceptance message may include the allowed NSSAI, and the allowed NSSAI includes the identification information of the first network slice, that is, the identification information of the default subscribed S-NSSAI.
  • the registration acceptance message may also include the rejected NSSAI, and the rejected NSSAI includes the network slices (including the second network slices) for which the number of accessed UEs is greater than or equal to the first threshold in the network slices that the UE requests to access. ) identification information. 608.
  • the AMF sends a subscription request message to the NSACF, and accordingly, the NSACF receives the subscription request message.
  • the subscription request message carries the identification information of one or more network slices (such as S-NSSAI or NSSAI) among the network slices that the UE requests to access, and the identification information of the UE.
  • the above-mentioned subscription request message may carry the identification information of one or more network slices, and the one or more network slices may be understood as: the network slices for which admission control needs to be performed among the network slices that the UE requests to access, and each network slice The number of UEs accessed by the slice is greater than or equal to the first threshold. Alternatively, it can also be understood as: one or more network slices in the rejected NSSAI carried in the registration acceptance message. It can be understood that the one or more network slices include a second network slice.
  • the subscription request message may carry identification information of one network slice, such as identification information of a second network slice.
  • the subscription request message may carry identification information of multiple network slices, and the identification information of the multiple network slices includes identification information of the second network slice. It can be understood that the conditions satisfied by the one or more network slices may be as shown above, and will not be described in detail here.
  • the above step 608 can also be understood as: the AMF invokes a servitization operation such as Nnsacf_NSQuotaAvailability_Subscribe, and the servitization operation carries the network slice that the UE requests to access and needs to perform admission control, and the number of accessed UEs is greater than or equal to the first threshold. Identification information of the network slice (such as S-NSSAI in rejected NSSAI) and UE identification information (such as UE ID). Exemplarily, through this servitization operation, the AMF may subscribe to the NSACF for the event that the number of UEs accessing one or more network slices (including the second network slice) in the rejected NSSAI is less than the first threshold (for example, it may also be referred to as a quota). available events).
  • a servitization operation such as Nnsacf_NSQuotaAvailability_Subscribe
  • the servitization operation carries the network slice that the UE requests to access and needs to perform admission control, and the number of accessed UE
  • the NSACF determines that the number of UEs accessed by the second network slice is less than the first threshold.
  • the NSACF When judging that the number of UEs accessed by the second network slice is less than the first threshold (ie, the quota is available), the NSACF notifies the AMF of the currently serving UE, so that the UE can access the second network slice.
  • the NSACF sends a fifth request message to the UDM, and correspondingly, the UDM receives the fifth request message.
  • the fifth request message carries the identification information of the UE.
  • the UDM sends a fifth response message to the NSACF, and correspondingly, the NSACF receives the fifth response message.
  • the fifth response message carries the identification information of the AMF currently serving the UE.
  • the above-mentioned steps 610 and 611 can also be understood as: the NSACF invokes a service operation of the UDM such as Nudm_UECM_Get, and the service operation carries the UE ID and the AMF registration indication information, and the AMF registration indication information is used to search the UDM for the AMF currently registered by the UE. That is, through the serving operation, the NSACF can query the UDM for the identification information of the AMF currently serving the UE.
  • a service operation of the UDM such as Nudm_UECM_Get
  • the service operation carries the UE ID and the AMF registration indication information
  • the AMF registration indication information is used to search the UDM for the AMF currently registered by the UE. That is, through the serving operation, the NSACF can query the UDM for the identification information of the AMF currently serving the UE.
  • the NSACF sends a first notification message to the AMF currently serving the UE, where the first notification message carries seventh indication information; correspondingly, the AMF currently serving the UE receives the first notification message.
  • the first notification message carries seventh indication information, where the seventh indication information is used to indicate that the number of UEs accessed by the second network slice is less than the first threshold.
  • the first notification message may carry seventh indication information, as shown in step 612 above.
  • the first notification message may also carry the identification information of the second network slice.
  • the second network slice can be understood as: among the network slices that the UE requests to access, the network slice for which admission control needs to be performed, and the number of UEs accessed by the second network slice is greater than or equal to the first threshold; After a period of time, the number of UEs accessed by the second network slice is less than the first threshold. That is, after a period of time, the UE can access the second network slice.
  • the first notification message may also carry multiple second network slices. Identification information for the slice.
  • the above step 612 can also be understood as: the NSACF calls Nnsacf_NSQuotaAvailability_Notify to send a first notification message to the AMF currently serving the UE.
  • the AMF currently serving the UE may be the above-mentioned AMF, or may be another AMF, etc., which is not limited in this embodiment of the present application.
  • the drawings illustrate that the AMF currently serving the UE is the above-mentioned AMF as an example, but this should not be construed as a limitation on the embodiments of the present application.
  • the AMF sends a second notification message to the UE, and accordingly, the UE receives the second notification message.
  • the second notification message carries the identification information of the second network slice.
  • the above step 613 can also be understood as: the AMF sends a non-access stratum (NAS) message to the UE, thereby notifying the UE that the number of UEs accessed by a certain S-NSSAI in the rejected NSSAI in the registration acceptance message is less than the number of the UE.
  • NAS non-access stratum
  • steps 608 to 613 when the number of UEs accessed by the second network slice is less than the first threshold, it can be ensured that the UEs can access the second network slice in a timely and effective manner. Therefore, the fairness of the UE's access to the network slice is effectively ensured, so that the UE can access the network slice it requests to access.
  • steps 608 to 613 in FIG. 6 are also applicable to the methods shown in FIGS. 7 and 8 .
  • the method shown in FIG. 7 may further include steps 708 to 713.
  • steps 708 to 713 refer to steps 608 to 613 shown in FIG. 6 Methods.
  • the method shown in FIG. 8 may further include steps 810 to 815.
  • steps 810 to 815 reference may be made to steps 608 to 613 shown in FIG. 6 . method shown. In order to avoid redundant description, the methods shown in the above steps 608 to 613 will not be described in detail below.
  • the UE when the number of UEs requesting access to the network slice that needs to perform admission control access is greater than or equal to the first threshold, the UE is allowed to access the default subscription network slice. At the same time, the default subscription network slice does not need to perform admission control, which effectively ensures that the UE can access the default subscription network slice.
  • FIG. 6 shows an example that the first network slice does not need to perform admission control, and the method provided in this embodiment of the present application will be described below by taking the first network slice that needs to perform admission control as an example.
  • FIG. 7 is a schematic flowchart of a network slice admission control method provided by an embodiment of the present application. As shown in FIG. 7 , the method includes:
  • the UE sends a registration request message to the AMF, and accordingly, the AMF receives the registration request message.
  • the registration request message carries the identification information of the network slice that the UE requests to access (that is, the requested NSSAIs).
  • the AMF sends a first request message to the UDM, and correspondingly, the UDM receives the first request message.
  • the UDM sends a first response message to the AMF, and correspondingly, the AMF receives the first response message.
  • steps 701 to 703 reference may be made to the descriptions of steps 601 to 603 in FIG. 6 , which will not be described in detail here.
  • the AMF determines, according to the first indication information, that the UE is allowed to access the default subscription network slice.
  • step 704 reference may be made to the description of step 402 in FIG. 4, or, referring to the description of FIG. 5b, etc., and will not be described in detail here.
  • the AMF sends a second request message to the NSACF, and accordingly, the NSACF receives the second request message.
  • the second request message carries the target NSSAI and the identification information of the default subscription network slice.
  • the NSACF by carrying the target NSSAI and the identification information of the default subscription network slice in the second request message, the NSACF can return to the AMF the number of UEs accessed by each network slice in the target NSSAI, and the default subscription network The number of UEs accessed by the slice; or, the NSACF can be made to return to the AMF whether the number of UEs accessed by each network slice in the target NSSAI is greater than or equal to the first threshold, and whether the number of UEs accessed by the default subscription network slice is less than the second threshold. That is, after receiving the second request message, the NSACF can return the above information to the AMF by default. It is understandable that the embodiment of the present application does not limit the number of default subscription network slices. As shown in FIG. 4 , the AMF may send the identification information of one or M or N default subscription network slices to the NSACF. Exemplarily, the NSACF may determine the first network slice according to the number of UEs accessing each default subscription network slice.
  • the second request message further includes fourth indication information, where the fourth indication information is used to indicate that when the number of UEs accessed by each network slice in the target NSSAI is greater than or equal to the first threshold, triggering (which can also be understood as activation) admission control to the default subscription network slice. That is to say, by carrying the fourth indication information in the second request message, the NSACF can be explicitly instructed to trigger the admission control of the default subscription network slice. That is, the NSACF obtains, according to the fourth indication information, the number of UEs with default subscription network slice access, or obtains whether the number of UEs with default subscription network slice access is less than the second threshold. In other words, if the number of UEs accessed by the network slice in the target NSSAI is less than the first threshold, admission control to the default subscription network slice may not be triggered.
  • fourth indication information is used to indicate that when the number of UEs accessed by each network slice in the target NSSAI is greater than or equal to the first threshold, triggering (which can also be understood as activ
  • the second request message further includes fifth indication information, where the fifth indication information is used to instruct the NSACF to determine the first network slice from multiple default subscription network slices.
  • the fifth indication information is used to instruct the NSACF to perform UE counting on only one network slice (eg, the first network slice) among the multiple default subscription network slices.
  • the second request message may carry the identification information of multiple default subscription network slices (that is, multiple first network slices), so that the NSACF only requests the first one of the multiple default subscription network slices according to the fifth indication information.
  • the network slice is counted, that is, the number of UEs accessed by the first network slice is incremented by 1. It can be understood that the first network slice counted by the NSACF is the first network slice in the registration accept message.
  • the NSACF sends a second response message to the AMF, and accordingly, the AMF receives the second response message.
  • the second response message only carries second indication information, where the second indication information is used to indicate that the number of UEs accessed by each network slice in the target NSSAI is greater than or equal to the first threshold. That is, the second response message may only include the second indication information, so that the AMF may consider that the number of UEs accessed by the first network slice is less than the second threshold according to the second indication information.
  • the second response message only carries third indication information, where the third indication information is used to indicate that the number of UEs accessed by the first network slice is less than the second threshold. Therefore, according to the third indication information, the AMF may by default consider that the number of UEs accessed by each network slice in the target NSSAI is greater than or equal to the first threshold.
  • the second response message may carry the second indication information and the third indication information at the same time.
  • the AMF sends a registration accept message to the UE, and accordingly, the UE receives the registration accept message.
  • step 707 reference may be made to the description of step 607 in FIG. 6 , and details are not repeated here.
  • steps 708 to 713 may further include steps 708 to 713 .
  • steps 708 to 713 reference may be made to steps 608 to 613 shown in FIG. 6 , which will not be described in detail here.
  • the terminal device not only can the terminal device be able to access the first network slice, and the registration failure of the terminal device can be avoided; message and the second response message) can determine the first network slice, which improves the efficiency of signaling interaction.
  • FIG. 8 is a schematic flowchart of a network slice admission control method provided by an embodiment of the present application. As shown in FIG. 8 , the method includes:
  • the UE sends a registration request message to the AMF, and accordingly, the AMF receives the registration request message.
  • the registration request message carries the identification information of the network slice that the UE requests to access (that is, the requested NSSAIs).
  • the AMF sends a first request message to the UDM, and correspondingly, the UDM receives the first request message.
  • the UDM sends a first response message to the AMF, and correspondingly, the AMF receives the first response message.
  • the AMF determines, according to the first indication information, that the UE is allowed to access the default subscription network slice.
  • steps 802 to 804 reference may be made to the descriptions of steps 702 to 704 shown in FIG. 7 , which will not be described in detail here.
  • the AMF sends a fourth request message to the NSACF, and correspondingly, the NSACF receives the fourth request message.
  • the fourth request message carries the identification information of the network slice that needs to perform admission control among the network slices that the UE requests to access.
  • the NSACF sends a fourth response message to the AMF, and correspondingly, the AMF receives the fourth response message.
  • the fourth response message carries second indication information, where the second indication information is used to indicate that the number of UEs accessing the network slice that needs to perform admission control in the network slice that the UE requests to access is greater than or equal to the first threshold.
  • step 804 and step 805 is not limited in this embodiment of the present application.
  • the AMF may also execute the above step 804; or, execute the above steps 802 to 804 and then execute the step 805.
  • step 805 and step 806 reference may be made to steps 604 and 605 shown in FIG. 6 , and details are not described here.
  • the AMF sends a third request message to the NSACF, where the third request message carries the identification information of the default subscription network slice.
  • the third request message further includes sixth indication information, where the sixth indication information is used to instruct the NSACF to determine a default subscription network from the default subscription network slices in which the number of access UEs is less than the second threshold.
  • Slice or the sixth indication information is used to instruct the NSACF to perform UE counting on only one default subscribed network slice (eg, the first network slice) among the multiple default subscribed network slices. It is understandable that for the description of the sixth indication information, reference may be made to the description of the fifth indication information in FIG. 7 , and details are not repeated here.
  • the NSACF sends a third response message to the AMF, where the third response message carries third indication information, where the third indication information is used to indicate that the number of terminal UEs accessed by the first network slice is less than the second threshold.
  • the third response message may also carry identification information of the first network slice.
  • the third indication information may also be used to indicate that the number of UEs accessed by each network slice in the default subscription network slice is less than the second threshold.
  • the AMF may determine one of the default subscription network slices as the first network slice.
  • the AMF sends a registration accept message to the UE, and accordingly, the UE receives the registration accept message.
  • the AMF when the AMF needs to send a request message (such as the fourth request message, the second request message or the third request message) to the NSACF, the AMF can call the service operation such as Nnsacf_NSQuotaAvailabilityCheck_Request .
  • the NSACF returns a response message (eg, the fourth response message, the second response message or the third response message) to the AMF, the NSACF may call Nnsacf_NSQuotaAvailabilityCheck_Response.
  • the AMF sends a request message (eg, the first request message) to the UDM
  • the AMF may call a serviced operation such as Nudm_SDM_Get.
  • the UDM returns a response message (such as the first response message) to the AMF
  • the UDM may call a service operation such as Nudm_SDM_Get response.
  • the terminal device can still access the network slice, such as the first Network slicing not only enables the terminal device to register successfully, but also ensures that the terminal device can perform service communication in time through the first network slice.
  • the present application divides the communication device into functional modules according to the above method embodiments.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
  • the above-mentioned integrated modules can be implemented in the form of hardware, and can also be implemented in the form of software function modules. It should be noted that the division of modules in this application is schematic, and is only a logical function division, and other division methods may be used in actual implementation.
  • the communication device according to the embodiment of the present application will be described in detail below with reference to FIG. 9 to FIG. 11 .
  • FIG. 9 is a schematic structural diagram of a communication device provided by an embodiment of the present application. As shown in FIG. 9 , the communication device includes a processing unit 901 and a transceiver unit 902 .
  • the communication device may be the access and mobility management network element shown above, or an AMF or a chip in an AMF, or the like. That is, the communication device can be used to perform the steps or functions performed by the AMF in the above method embodiments. in,
  • a transceiver unit 902 configured to input a registration request message
  • Transceiving unit 902 configured to output a registration carrying identification information of the first network slice when the number of UEs accessing the network slice that needs to perform admission control in the network slice requested by the UE to access is greater than or equal to a first threshold Accept the message.
  • the transceiver unit 902 is configured to input a registration request message, including: a transceiver unit 902 is configured to receive a registration request message from a UE.
  • the transceiver unit 902 is used for outputting the registration acceptance message, including: the transceiver unit 902 is used for sending the registration acceptance message to the UE.
  • the description about the transceiver unit here is also applicable to the first request message and the first response message shown in this application, the second request message and the second response message, the third request message and the third response message, the fourth request message and fourth response message, etc.
  • the sending and receiving unit 902 shown below to output the first request message includes: the sending and receiving unit 902 sends the first request message to the UDM.
  • the processing unit 901 is configured to determine that the UE is allowed to access the default subscription network slice.
  • the processing unit 901 is specifically configured to configure the first information, and determine, according to the first information, to allow the UE to access the default subscription network slice.
  • the processing unit 901 is configured to output the first request message and input the first response message through the transceiver unit 902; the processing unit 901 is configured to determine, according to the first indication information, that the UE is allowed to access the default Sign up for network slices.
  • the processing unit 901 is specifically configured to determine, according to the subscription information of the UE, that the UE is allowed to access the default subscription network slice.
  • the transceiver unit 902 is further configured to output a second request message and input a second response message.
  • the transceiver unit 902 is further configured to output a third request message and input a third response message.
  • the transceiver unit 902 is further configured to output a subscription request message, input a first notification message, and output a second notification message.
  • first indication information second indication information, third indication information, fourth indication information, fifth indication information, sixth indication information, seventh indication information, subscription request message, first notification message, second notification message, etc.
  • first indication information second indication information, third indication information, fourth indication information, fifth indication information, sixth indication information, seventh indication information, subscription request message, first notification message, second notification message, etc.
  • the transceiver unit 902 can also be used to perform the receiving step in the step 401 shown in FIG. 4
  • the processing unit 901 can also be used to perform the step 402 shown in FIG.
  • the sending step in step 403 is shown.
  • the transceiver unit 902 and the processing unit 901 may also be used to execute the corresponding methods shown in FIG. 6 to FIG. 8 , which will not be described in detail here.
  • the communication apparatus may be the terminal equipment (eg, UE, etc.) shown above, or a chip in the terminal equipment, or the like. That is, the communication apparatus may be used to perform the steps or functions performed by the UE in the above method embodiments.
  • the transceiver unit 902 is used for outputting a registration request message and inputting a registration acceptance message. Alternatively, it can also be understood that the processing unit 901 outputs a registration request message and inputs a registration acceptance message through the transceiver unit 902 .
  • transceiver unit and the processing unit shown in the embodiments of the present application are only examples.
  • specific functions or execution steps of the transceiver unit and the processing unit reference may be made to the above method embodiments, which will not be described in detail here.
  • AMF and the UE according to the embodiments of the present application are described above, and the possible product forms of the AMF and the UE are described below. It should be understood that any product with the function of AMF described in FIG. 9 above, or any product with the function of UE described in FIG. 9 above, falls within the protection scope of the embodiments of the present application. It should also be understood that the following description is only an example, and the product forms of the AMF and the UE in the embodiments of the present application are not limited thereto.
  • the processing unit 901 may be one or more processors
  • the transceiver unit 902 may be a transceiver, or the transceiver unit 902 may also be a sending unit and a receiving unit
  • the sending unit may be a transmitter
  • the receiving unit may be a receiver
  • the sending unit and the receiving unit are integrated into one device, such as a transceiver.
  • the processor and the transceiver may be coupled, etc., and the connection manner of the processor and the transceiver is not limited in the embodiment of the present application.
  • the communication device 100 includes one or more processors 1020 and a transceiver 1010 .
  • the transceiver 1010 is used to receive a registration request message and send a registration acceptance message, and the like.
  • the processor and the transceiver reference may be made to the description of the processing unit and the transceiver unit shown above, which will not be repeated here.
  • the transceiver 1010 is used to send a registration request message and receive a registration accept message.
  • first indication information second indication information, third indication information, fourth indication information, fifth indication information, sixth indication information, seventh indication information, subscription request message, first notification message, second notification message, etc.
  • first indication information second indication information, third indication information, fourth indication information, fifth indication information, sixth indication information, seventh indication information, subscription request message, first notification message, second notification message, etc.
  • a transceiver may include a receiver for performing the function (or operation) of receiving and a transmitter for performing the function (or operation) of transmitting ). And transceivers are used to communicate with other devices/devices over the transmission medium.
  • the communication apparatus 100 may further include one or more memories 1030 for storing program instructions and/or data.
  • Memory 1030 is coupled to processor 1020 .
  • the coupling in the embodiments of the present application is an indirect coupling or communication connection between devices, units or modules, which may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules.
  • the processor 1020 may cooperate with the memory 1030 .
  • the processor 1020 may execute program instructions stored in the memory 1030 .
  • at least one of the above-mentioned one or more memories may be included in the processor.
  • the memory 630 may store the first information, or the subscription information of the UE, etc., which is represented by a dotted line in FIG. 10 .
  • the specific connection medium between the transceiver 1010, the processor 1020, and the memory 1030 is not limited in the embodiments of the present application.
  • the memory 1030, the processor 1020, and the transceiver 1010 are connected through a bus 1040 in FIG. 10.
  • the bus is represented by a thick line in FIG. 10, and the connection between other components is only for schematic illustration. , is not limited.
  • the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is used in FIG. 10, but it does not mean that there is only one bus or one type of bus.
  • the processor may be a general-purpose processor, a digital signal processor, an application-specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, a discrete hardware component, etc.
  • a general purpose processor may be a microprocessor or any conventional processor or the like.
  • the steps of the method disclosed in conjunction with the embodiments of the present application may be directly embodied as being executed by a hardware processor, or executed by a combination of hardware and software modules in the processor, or the like.
  • the memory may include, but is not limited to, a non-volatile memory such as a hard disk drive (HDD) or a solid-state drive (SSD), a random access memory (Random Access Memory, RAM), Erasable Programmable Read-Only Memory (Erasable Programmable ROM, EPROM), Read-Only Memory (Read-Only Memory, ROM) or Portable Read-Only Memory (Compact Disc Read-Only Memory, CD-ROM) and so on.
  • a memory is any storage medium that can be used to carry or store program codes in the form of instructions or data structures, and can be read and/or written by a computer (such as the communication devices shown in this application, etc.), but is not limited thereto.
  • the memory in this embodiment of the present application may also be a circuit or any other device capable of implementing a storage function, for storing program instructions and/or data.
  • the processor 1020 is mainly used to process the communication protocol and communication data, control the entire communication device, execute software programs, and process data of the software programs.
  • the memory 1030 is mainly used to store software programs and data.
  • the transceiver 1010 may include a control circuit and an antenna, and the control circuit is mainly used for converting baseband signals to radio frequency signals and processing radio frequency signals. Antennas are mainly used to send and receive radio frequency signals in the form of electromagnetic waves. Input and output devices, such as touch screens, display screens, and keyboards, are mainly used to receive data input by users and output data to users.
  • the processor 1020 can read the software program in the memory 1030, interpret and execute the instructions of the software program, and process the data of the software program.
  • the processor 1020 performs baseband processing on the data to be sent, and outputs a baseband signal to the radio frequency circuit.
  • the radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal through the antenna in the form of electromagnetic waves.
  • the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor 1020, and the processor 1020 converts the baseband signal into data and processes the data. deal with.
  • the radio frequency circuit and antenna can be provided independently of the processor that performs baseband processing. For example, in a distributed scenario, the radio frequency circuit and antenna can be arranged remotely from the communication device. .
  • the communication device shown in the embodiment of the present application may also have more components and the like than those shown in FIG. 10 , which is not limited in the embodiment of the present application.
  • the method performed by the processor and the transceiver shown above is only an example, and for the specific steps performed by the processor and the transceiver, reference may be made to the method described above.
  • the processing unit 901 may be one or more logic circuits, and the transceiver unit 902 may be an input and output interface, or a communication interface, or an interface circuit , or interfaces, etc.
  • the transceiver unit 902 may also be a sending unit and a receiving unit, the sending unit may be an output interface, and the receiving unit may be an input interface, the sending unit and the receiving unit are integrated into one unit, such as an input and output interface.
  • the communication device shown in FIG. 11 includes a logic circuit 1101 and an interface 1102 .
  • the above-mentioned processing unit 901 can be implemented by the logic circuit 1101
  • the transceiver unit 902 can be implemented by the interface 1102
  • the logic circuit 1101 can be a chip, a processing circuit, an integrated circuit or a system on chip (SoC) chip, etc.
  • the interface 1102 can be a communication interface, an input and output interface, a pin, and the like.
  • FIG. 7 takes the above communication device as a chip as an example, and the chip includes a logic circuit 1101 and an interface 1102 .
  • the logic circuit and the interface may also be coupled to each other.
  • the specific connection manner of the logic circuit and the interface is not limited in the embodiment of the present application.
  • the interface 1102 is used to input a registration request message and output a registration accept message.
  • the logic circuit 1101 is configured to determine that the UE is allowed to access the default subscription network slice.
  • the logic circuit 1101 is specifically configured to configure the first information, and determine, according to the first information, to allow the UE to access the default subscription network slice.
  • the logic circuit 1101 is configured to output the first request message and input the first response message through the interface 1102; the logic circuit 1101 is configured to determine, according to the first indication information, that the UE is allowed to access the default subscription Network Slicing.
  • the logic circuit 1101 is specifically configured to determine, according to the subscription information of the UE, that the UE is allowed to access the default subscription network slice.
  • the interface 1102 is further configured to output the second request message and input the second response message.
  • the interface 1102 is further configured to output a third request message and input a third response message.
  • the interface 1102 is further configured to output a subscription request message, input a first notification message, and output a second notification message.
  • first indication information second indication information, third indication information, fourth indication information, fifth indication information, sixth indication information, seventh indication information, subscription request message, first notification message, second notification message, etc.
  • first indication information second indication information, third indication information, fourth indication information, fifth indication information, sixth indication information, seventh indication information, subscription request message, first notification message, second notification message, etc.
  • the interface 1102 is used to output a registration request message and input a registration accept message.
  • the communication apparatus shown in the embodiments of the present application may implement the methods provided in the embodiments of the present application in the form of hardware, and may also implement the methods provided in the embodiments of the present application in the form of software, etc., which are not limited in the embodiments of the present application.
  • An embodiment of the present application also provides a wireless communication system, where the wireless communication system includes an AMF and a UE, and the AMF and the UE can be used to execute any of the foregoing embodiments (as shown in FIG. 4 , FIG. 5 a to FIG. 5 c or FIG. 6 to FIG. 6 ). 8) method.
  • An embodiment of the present application further provides a wireless communication system, where the wireless communication system includes an AMF and an NSACF, and the AMF and the NSACF can be used to implement any of the foregoing embodiments (as shown in FIG. 5a to FIG. 5c or FIG. 6 to FIG. 8 ) method in .
  • An embodiment of the present application further provides a wireless communication system, where the wireless communication system includes an AMF, a UE, and an NSACF, and the AMF, the UE, and the NSACF can be used to execute any of the foregoing embodiments (as shown in FIG. 4 , FIG. 5 a to FIG. 5 c or 6 to 8).
  • the present application also provides a computer program for implementing the operations and/or processing performed by the AMF in the method provided by the present application.
  • the present application also provides a computer program for implementing the operations and/or processing performed by the UE in the method provided by the present application.
  • the present application also provides a computer-readable storage medium, where computer codes are stored in the computer-readable storage medium, and when the computer codes are executed on the computer, the computer executes the operations and/or operations performed by the AMF in the methods provided by the present application. deal with.
  • the present application also provides a computer-readable storage medium, where computer codes are stored in the computer-readable storage medium, and when the computer codes are executed on the computer, the computer is made to perform the operations performed by the UE in the method provided by the present application and/or deal with.
  • the present application also provides a computer program product, the computer program product includes computer code or computer program, when the computer code or computer program is run on a computer, the operation and/or processing performed by the AMF in the method provided by the present application is made. be executed.
  • the present application also provides a computer program product, the computer program product includes computer code or computer program, when the computer code or computer program is run on a computer, the operation and/or processing performed by the UE in the method provided by the present application is made. be executed.
  • the disclosed system, apparatus and method may be implemented in other manners.
  • the apparatus embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may also be electrical, mechanical or other forms of connection.
  • the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the technical effects of the solutions provided by the embodiments of the present application.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as an independent product, may be stored in a computer-readable storage medium.
  • a computer-readable storage medium includes several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned readable storage medium includes: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk, etc. that can store program codes medium.

Abstract

本申请公开了一种网络切片的准入控制方法及装置,该方法包括:UE向AMF发送注册请求消息,AMF接收该注册请求消息,该注册请求消息携带该UE请求接入的网络切片的标识信息。在UE请求接入的网络切片中需要执行准入控制的网络切片接入的UE的数量大于或等于第一阈值的情况下,AMF向UE发送携带第一网络切片的标识信息的注册接受消息,该第一网络切片为允许UE接入的网络切片,UE接收该注册接受消息。通过本申请提供的方法,可在UE请求接入的网络切片中需要执行准入控制的网络切片接入的UE的数量大于或等于第一阈值的情况下,仍能够保证UE能够注册成功,接入到网络切片中。

Description

网络切片的准入控制方法及装置
本申请要求于2021年03月29日提交中国专利局、申请号为202110336606.2、申请名称为“网络切片的准入控制方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种网络切片的准入控制方法及装置。
背景技术
第五代(5th-generation,5G)通信系统中,将有数以千亿计的物联网设备接入网络,不同类型的应用场景对网络的需求是差异化的,有的甚至是相互冲突的。通过单一网络同时为不同类型的应用场景提供服务,会导致网络架构异常复杂、网络管理效率和资源利用效率低下。
因此,网络切片技术通过在同一网络基础设施上虚拟独立逻辑网络的方式为不同的应用场景提供相互隔离的网络环境,使得不同应用场景可以按照各自的需求定制网络功能和特性,从而能够切实保障不同业务的服务质量(quality of service,QoS)需求。5G网络切片要实现的目标是将终端设备、接入网资源、核心网资源以及网络运维和管理系统等进行有机组合,为不同应用场景或者业务类型提供独立运维的、相互隔离的网络。
在切片的实际部署场景中,由于网络资源等限制,一个网络切片可以容纳接入的用户数是有限的。因此,在网络切片接入的用户数达到最大值时,如何保证终端设备接入到网络切片中亟待解决。
发明内容
本申请提供一种网络切片的准入控制方法及装置,在终端设备请求接入的网络切片接入的终端设备的数量达到一定数量(如最大接入数量)时,仍能够保证终端设备可以接入到网络切片中。
第一方面,本申请实施例提供一种网络切片的准入控制方法,所述方法包括:
接入和移动性管理网元接收来自终端设备的注册请求消息,所述注册请求消息携带所述终端设备请求接入的网络切片的标识信息;在所述终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于第一阈值的情况下,所述接入和移动性管理网元向所述终端设备发送携带第一网络切片的标识信息的注册接受消息,所述第一网络切片为允许所述终端设备接入的网络切片。
本申请实施例中,接入和移动性管理网元也可以称为具有接入和移动性管理功能的网元或设备等。例如,该接入和移动性管理网元可以为5G网络架构中的接入与移动性管理功能(access and mobility management function,AMF)网元。
该终端设备请求接入的网络切片可以为一个网络切片,也可以为至少两个网络切片,如为两个或三个网络切片等。可理解,尽管本申请实施例中均是以第一阈值来衡量终端设备请求接入的网络切片中需要执行准入控制的网络切片是否还允许接入终端设备,但是在终端设备请求接入的网络切片中需要执行准入控制的网络切片为两个或两个以上的网络切片时,该 两个或两个以上的网络切片所对应的第一阈值是否相同,本申请实施例不作限定。也就是说,如终端设备请求接入的网络切片中需要执行准入控制的网络切片为网络切片1和网络切片2,用于衡量网络切片1的第一阈值,与用于衡量网络切片2的第一阈值,可以不同。
示例性的,该终端设备请求接入的网络切片中需要执行准入控制的网络切片包括第二网络切片。则第二网络切片接入的终端设备的数量大于或等于第一阈值,也可以理解为:该第二网络切片当前已经接入的终端设备的数量大于或等于第一阈值;该第二网络切片已经接入的终端设备的数量超额;或者,该第二网络切片已经接入的终端设备的数量超过了配额;或者,该第二网络切片无法允许新的终端设备接入;或者,该第二网络切片已经接入的终端设备达到允许接入的最大数量(即第一阈值)。由于第二网络切片接入的终端设备的数量大于或等于第一阈值,因此终端设备无法接入第二网络切片。
可理解,本申请实施例所示的第一网络切片可以是不属于注册请求消息中所携带的终端设备请求的网络切片中的网络切片。
一般的,如果终端设备请求接入的网络切片中需要执行准入控制的网络切片已经接入的终端设备的数量超过了配额,则该终端设备就无法接入这些网络切片,从而导致终端设备注册失败。然而,本申请实施例中,即使终端设备请求的网络切片中需要执行准入控制的网络切片接入的终端设备的数量超过了配额,该终端设备仍有网络切片可以接入,如第一网络切片,从而不仅使得终端设备注册成功,而且还能够保证终端设备能够通过第一网络切片及时进行业务通信等。
在一种可能的实现方式中,所述第一网络切片为所述终端设备的缺省签约网络切片。
一般的,终端设备的签约信息(也可以称为签约数据)中包括缺省签约的网络切片,当终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于第一阈值时,该终端设备的缺省签约网络切片接入的终端设备的数量可能未到达一定数量,或者,该缺省签约网络切片不需要执行准入控制。该情况下,终端设备接入到缺省签约网络切片中,不仅避免了终端设备注册失败的情况,还能够使得终端设备能够及时地接入到网络切片中,保证终端设备的服务质量。
在一种可能的实现方式中,所述方法还包括:所述接入和移动性管理网元确定允许所述终端设备接入缺省签约网络切片。
本申请实施例中,如果缺省签约网络切片不需要执行准入控制,则该接入和移动性管理网元可以将从一个或多个缺省签约网络切片中确定至少一个第一网络切片为允许终端设备接入的网络切片。如果第一网络切片需要执行准入控制,则该接入和移动性管理网元可以在确认该缺省签约网络切片接入的终端设备的数量小于第二阈值后,从接入的终端设备的数量小于第二阈值的一个或多个缺省签约网络切片中确定至少一个第一网络切片为允许终端设备接入的网络切片。
在一种可能的实现方式中,所述接入和移动性管理网元确定允许所述终端设备接入缺省签约网络切片,包括:
所述接入和移动性管理网元配置第一信息,所述第一信息用于指示当所述终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于所述第一阈值时,允许所述终端设备接入所述缺省签约网络切片;所述接入和移动性管理网元根据所述第一信息确定允许所述终端设备接入所述缺省签约网络切片。
在一种可能的实现方式中,所述接入和移动性管理网元确定允许所述终端设备接入缺省签约网络切片,包括:
所述接入和移动性管理网元向统一数据管理网元发送第一请求消息;所述接入和移动性管理网元接收来自所述统一数据管理网元的第一响应消息,所述第一响应消息携带所述缺省签约网络切片的标识信息以及第一指示信息,所述第一指示信息用于指示当所述终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于第一阈值时,允许所述终端设备接入所述缺省签约网络切片;所述接入和移动性管理网元根据所述第一指示信息确定允许所述终端设备接入所述缺省签约网络切片。
在一种可能的实现方式中,所述接入和移动性管理网元确定允许所述终端设备接入缺省签约网络切片,包括:
所述接入和移动性管理网元根据所述终端设备的签约信息确定允许所述终端设备接入所述缺省签约网络切片,其中,所述终端设备的签约信息中包括第一指示信息,所述第一指示信息用于指示当所述终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于第一阈值时,允许所述终端设备接入所述缺省签约网络切片。
在一种可能的实现方式中,接入所述第一网络切片的终端设备的数量小于第二阈值。
在一种可能的实现方式中,所述方法还包括:
所述接入和移动性管理网元向第一网元发送第二请求消息,所述第二请求消息携带所述终端设备请求接入的网络切片中需要执行准入控制的网络切片的标识信息和所述缺省签约网络切片的标识信息;所述接入和移动性管理网元接收来自所述第一网元的第二响应消息,所述第二响应消息携带第二指示信息和第三指示信息,所述第二指示信息用于指示所述终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于所述第一阈值,所述第三指示信息用于指示所述缺省签约网络切片接入的终端设备的数量小于第二阈值。
本申请实施例中,接入和移动性管理网元通过第二请求消息,可以同时获得第一网络切片接入的终端设备的数量,以及终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量。从而,在终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于第一阈值时,接入和移动性管理网元就可以根据该缺省签约网络切片接入的终端设备的数量确定该第一网络切片为允许终端设备接入的网络切片。从而不仅可以保证终端设备能够接入第一网络切片,避免终端设备注册失败的情况;而且由于接入和移动性管理网元与第一网元进行一次交互(即第二请求消息和第二响应消息)就可以确定第一网络切片,提高了信令交互的效率。
在一种可能的实现方式中,所述第二请求消息还包括第四指示信息,所述第四指示信息用于指示当所述终端请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于所述第一阈值,触发(也可以理解为激活)对所述缺省签约网络切片的准入控制。
在一种可能的实现方式中,所述第二请求消息还包括第五指示信息,所述第五指示信息用于指示所述第一网元从多个所述缺省签约网络切片中确定所述第一网络切片,或者,所述第五指示信息用于指示所述第一网元仅对多个所述缺省签约网络切片中的所述第一网络切片进行终端设备计数。
在一种可能的实现方式中,所述第一网络切片为所述多个缺省签约网络切片中接入终端设备的数量最少的网络切片。
在一种可能的实现方式中,所述方法还包括:
在所述终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的 数量大于或等于所述第一阈值的情况下,所述接入和移动性管理网元向第一网元发送第三请求消息,所述第三请求消息携带所述缺省签约网络切片的标识信息;所述接入和移动性管理网元接收来自所述第一网元的第三响应消息,所述第三响应消息携带第三指示信息,所述第三指示信息用于指示所述缺省签约网络切片接入的终端设备的数量小于第二阈值。
在一种可能的实现方式中,所述第三请求消息还包括第六指示信息,所述第六指示信息用于指示所述第一网元从多个所述缺省签约网络切片中确定所述第一网络切片,或者,所述第六指示信息用于指示所述第一网元仅对多个所述缺省签约网络切片中的所述第一网络切片进行终端设备计数。
在一种可能的实现方式中,所述第一网络切片为所述多个缺省签约网络切片中接入终端设备的数量最少的网络切片。
在一种可能的实现方式中,所述第一网络切片为不需要执行准入控制的网络切片。
在一种可能的实现方式中,所述方法还包括:
所述接入和移动性管理网元向第一网元发送订阅请求消息,所述订阅请求消息携带所述终端设备请求接入的网络切片中需要执行准入控制的网络切片的标识信息和所述终端设备的标识信息;所述接入和移动性管理网元接收来自所述第一网元的第一通知消息,所述第一通知消息携带第七指示信息,所述第七指示信息用于指示所述终端设备请求接入的网络切片中需要执行准入控制的网络切片中第二网络切片接入的终端设备小于所述第一数量阈值;所述接入和移动性管理网元向所述终端设备发送第二通知消息,所述第二通知消息携带所述第二网络切片的标识信息。
本申请实施例中,在第二网络切片接入的UE的数量小于第一阈值时,保证UE能够及时有效地接入该第二网络切片。从而,还有效保证了UE接入网络切片的公平性,使得UE能够接入到其请求接入的网络切片中。
第二方面,本申请实施例提供一种网络切片准入控制方法,所述方法包括:
终端设备向接入和移动性管理网元发送注册请求消息,所述注册请求消息携带所述终端设备请求接入的网络切片的标识信息;
所述终端设备接收来自所述接入和移动性管理网元的注册接受消息,所述注册接受消息携带第一网络切片的标识信息,所述第一网络切片为允许所述终端设备接入的网络切片。
在一种可能的实现方式中,所述第一网络切片为所述终端设备的缺省签约网络切片。
在一种可能的实现方式中,接入所述第一网络切片的终端设备的数量小于第二阈值。
在一种可能的实现方式中,所述第一网络切片为多个所述缺省签约网络切片中接入终端设备的数量最少的网络切片。
在一种可能的实现方式中,所述第一网络切片为不需要执行准入控制的网络切片。
第三方面,本申请实施例提供一种通信装置,用于执行第一方面或第一方面的任意可能的实现方式中的方法。该通信装置包括具有执行第一方面或第一方面的任意可能的实现方式中的方法的相应单元。
示例性的,该通信装置可以为接入和移动性管理网元或接入和移动性管理网元中的芯片等。
第四方面,本申请实施例提供一种通信装置,用于执行第二方面或第二方面的任意可能的实现方式中的方法。该通信装置包括具有执行第二方面或第二方面的任意可能的实现方式中的方法的相应方法。
示例性的,该通信装置可以为终端设备或终端设备中的芯片等。
在第三方面或第四方面中,上述通信装置可以包括收发单元和处理单元。对于收发单元和处理单元的具体描述还可以参考下文示出的装置实施例。
第五方面,本申请实施例提供一种通信装置,该通信装置包括处理器,用于执行上述第一方面或第一方面的任意可能的实现方式所示的方法。或者,该处理器用于执行存储器中存储的程序,当该程序被执行时,上述第一方面或第一方面的任意可能的实现方式所示的方法被执行。
在执行上述方法的过程中,上述方法中有关发送消息(如发送注册接受消息或第一请求消息等)的过程,可以理解为由处理器输出上述消息的过程。处理器输出上述消息时,处理器将该上述消息输出给收发器,以便由收发器进行发射。该上述消息在由处理器输出之后,还可能需要进行其他的处理,然后才到达收发器。类似的,处理器接收输入的消息(如接收注册请求消息或第一响应消息等)时,收发器接收该上述消息,并将其输入处理器。更进一步的,在收发器收到该上述消息之后,该上述消息可能需要进行其他的处理,然后才输入处理器。
可理解,对于处理器所涉及的发射、发送和接收等操作,如果没有特殊说明,或者,如果未与其在相关描述中的实际作用或者内在逻辑相抵触,则均可以更加一般性的理解为处理器输出和接收、输入等操作,而不是直接由射频电路和天线所进行的发射、发送和接收操作。
在实现过程中,上述处理器可以是专门用于执行这些方法的处理器,也可以是执行存储器中的计算机指令来执行这些方法的处理器,例如通用处理器。上述存储器可以为非瞬时性(non-transitory)存储器,例如只读存储器(Read Only Memory,ROM),其可以与处理器集成在同一块芯片上,也可以分别设置在不同的芯片上,本申请实施例对存储器的类型以及存储器与处理器的设置方式不做限定。可理解,对于处理器和存储器的说明同样适用于下文示出的第六方面,为便于赘述第六方面不再详述。
在一种可能的实现方式中,存储器位于上述通信装置之外。
在一种可能的实现方式中,存储器位于上述通信装置之内。
本申请实施例中,处理器和存储器还可以集成于一个器件中,即处理器和存储器还可以被集成在一起。
在一种可能的实现方式中,通信装置还包括收发器,该收发器,用于接收信号或发送信号。
例如,收发器可以用于接收注册请求消息,以及发送注册接受消息。又例如,收发器可以用于发送第一请求消息,以及接收第一响应消息。又例如,收发器可以用于发送第二请求消息,以及接收第二响应消息等,这里先不详述。
本申请实施例中,该通信装置可以为接入和移动性管理网元或接入和移动性管理网元中的芯片等。
第六方面,本申请实施例提供一种通信装置,该通信装置包括处理器,用于执行上述第二方面或第二方面的任意可能的实现方式所示的方法。或者,处理器用于执行存储器中存储的程序,当该程序被执行时,上述第二方面或第二方面的任意可能的实现方式所示的方法被执行。
在一种可能的实现方式中,存储器位于上述通信装置之外。
在一种可能的实现方式中,存储器位于上述通信装置之内。
在本申请实施例中,处理器和存储器还可以集成于一个器件中,即处理器和存储器还可以被集成在一起。
在一种可能的实现方式中,通信装置还包括收发器,该收发器,用于接收信号或发送信号。
本申请实施例中,该通信装置可以为终端设备或终端设备中的芯片等。
第七方面,本申请实施例提供一种通信装置,该通信装置包括逻辑电路和接口,所述逻辑电路和所述接口耦合;所述接口,用于输入注册请求消息以及输出注册接受消息。可理解,所述逻辑电路可以用于处理输入的注册请求消息等,本申请实施例对于逻辑电路的具体实现不作限定。
例如,所述逻辑电路,用于确定所述第一网络切片为允许所述终端设备接入的网络切片的候选网络切片。
又例如,所述接口,还用于输出第二请求消息,以及输入第二响应消息。
又例如,所述接口,还用于输出第三请求消息,以及输入第三响应消息。
又例如,所述接口,还用于输出订阅请求消息,输入第一通知消息,以及输出第二通知消息等。
可理解,关于逻辑电路和接口的具体说明,还可以参考下文所示的装置实施例,这里先不详述。
第八方面,本申请实施例提供一种通信装置,该通信装置包括逻辑电路和接口,所述逻辑电路和所述接口耦合;所述接口,用于输出注册请求消息,以及输入注册接受消息。
所述逻辑电路,用于对输入的注册接受消息进行处理等,本申请实施例对于逻辑电路的具体实现不作限定。
第七方面和第八方面中,关于第一网络切片、注册请求消息、注册接受消息、第一请求消息、第一响应消息、第二请求消息、第二响应消息、第三请求消息、第三响应消息、订阅请求消息、第一通知消息和第二通知消息等的描述,可以参考上述第一方面或第二方面的描述;或者,还可以参考下文示出的各个实施例,这里不再详述。
第九方面,本申请实施例提供一种计算机可读存储介质,该计算机可读存储介质用于存储计算机程序,当其在计算机上运行时,使得上述第一方面或第一方面的任意可能的实现方式所示的方法被执行。
第十方面,本申请实施例提供一种计算机可读存储介质,该计算机可读存储介质用于存储计算机程序,当其在计算机上运行时,使得上述第二方面或第二方面的任意可能的实现方式所示的方法被执行。
第十一方面,本申请实施例提供一种计算机程序产品,该计算机程序产品包括计算机程序或计算机代码,当其在计算机上运行时,使得上述第一方面或第一方面的任意可能的实现方式所示的方法被执行。
第十二方面,本申请实施例提供一种计算机程序产品,该计算机程序产品包括计算机程序或计算机代码,当其在计算机上运行时,使得上述第二方面或第二方面的任意可能的实现方式所示的方法被执行。
第十三方面,本申请实施例提供一种计算机程序,该计算机程序在计算机上运行时,上述第一方面或第一方面的任意可能的实现方式所示的方法被执行。
第十四方面,本申请实施例提供一种计算机程序,该计算机程序在计算机上运行时,上述第二方面或第二方面的任意可能的实现方式所示的方法被执行。
第十五方面,本申请实施例提供一种无线通信系统,该无线通信系统包括接入和移动性管理网元和终端设备,所述接入和移动性管理网元用于执行上述第一方面或第一方面的任意 可能的实现方式所示的方法,所述终端设备用于执行上述第二方面或第二方面的任意可能的实现方式所示的方法。
第十六方面,本申请实施例提供一种无线通信系统,该无线通信系统包括接入和移动性管理网元和第一网元,所述接入和移动性管理网元用于执行上述第一方面或第一方面的任意可能的实现方式所示的方法,所述第一网元用于对网络切片进行准入控制等,对于第一网元的具体实现方式可以参考上述第一方面,也可以参考下文所示的方法实施例等。
第十七方面,本申请实施例提供一种无线通信系统,该无线通信系统包括接入和移动性管理网元、第一网元和终端设备。对于接入和移动性管理网元、第一网络和终端设备的具体实现方式可以参考上述第一方面和第二方面,或者,也可以参考下文所示的方法实施例。
附图说明
图1是本申请实施例提供的一种通信系统示意图;
图2是本申请实施例提供的另一种通信系统示意图;
图3是本申请实施例提供的一种注册方法的流程示意图;
图4是本申请实施例提供的一种网络切片的准入控制方法的流程示意图;
图5a至图5c是本申请实施例提供的一种确定允许UE接入缺省签约网络切片的方法流程示意图;
图6至图8是本申请实施例提供的一种网络切片的准入控制方法的流程示意图;
图9至图11是本申请实施例提供的一种通信装置的结构示意图。
具体实施方式
为了使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请作进一步地描述。
本申请的说明书、权利要求书及附图中的术语“第一”和“第二”等仅用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们的任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备等,没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元等,或可选地还包括对于这些过程、方法、产品或设备等固有的其它步骤或单元。
在本文中提及的“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本申请的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员可以显式地和隐式地理解的是,本文所描述的实施例可以与其它实施例相结合。
在本申请中,“至少一个(项)”是指一个或者多个,“多个”是指两个或两个以上,“至少两个(项)”是指两个或三个及三个以上,“和/或”,用于描述关联对象的关联关系,表示可以存在三种关系,例如,“A和/或B”可以表示:只存在A,只存在B以及同时存在A和B三种情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指这些项中的任意组合。例如,a,b或c中的至少一项(个),可以表示:a,b,c,“a和b”,“a和c”,“b和c”,或“a和b和c”。
本申请提供的技术方案可以应用于各种通信系统,例如:长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division  duplex,TDD)、物联网(internet of things,IoT)系统、窄带物联网系统(narrow band-internet of things,NB-IoT)、无线保真(wireless fidelity,WiFi)、第五代(5th generation,5G)通信系统或新无线(new radio,NR)以及未来的其他通信系统,如第六代移动通信系统等。
以下详细介绍本申请涉及的术语。
1、终端设备
本申请中的终端设备是一种具有无线收发功能的装置。终端设备可以经无线接入网(radio access network,RAN)中的接入网设备(或者也可以称为接入设备)与一个或多个核心网(core network,CN)设备(或者也可以称为核心设备)进行通信。终端设备也可以称为用户设备(user equipment,UE)、接入终端、终端(terminal)、用户单元(subscriber unit)、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、用户代理或用户装置等。在一种可能的实现方式中,终端设备可以部署在陆地上,包括室内或室外、手持或车载;也可以部署在水面上(如轮船等);还可以部署在空中(例如飞机、气球和卫星上等)。在一种可能的实现方式中,终端设备可以是具有无线通信功能的手持设备、车载设备、可穿戴设备、物联网、车联网中的终端、第五代(5th generation,5G)网络以及未来网络中的任意形态的终端设备等,本申请对此不作限定。
本申请示出的终端设备不仅可以包括车联网中的车(如整车)、而且还可以包括车联网中的车载设备或车载终端等,本申请对于该终端设备应用于车联网时的具体形态不作限定。
为便于描述,下文所示的终端设备将以UE为例说明本申请提供的方法。
2、AMF
随着移动带宽接入服务的扩展,移动网络也会随之发展以便更好地支持多样化的商业模式,满足更加多样化的应用业务以及更多行业的需求。例如,为了给更多的行业提供更好、更完善的服务,5G网络相对于4G网络做了网络架构调整。如5G网络将4G网络中的移动管理实体(mobility management entity,MME)进行拆分,拆分为包括接入与移动性管理功能(access and mobility management function,AMF)和会话管理功能(session management function,SMF)等多个网元(或也可以称为网络功能)。
本申请所示的AMF是由PLMN提供的控制面网络功能,负责UE接入PLMN的接入控制和移动性管理,例如包括移动状态管理,分配用户临时身份标识,认证和授权用户等功能。因此,随着移动网络的发展,即使AMF可能会演进为其他形式或名称等,但是只要可以实现本身本申请所示的方法,均属于本申请的保护范围之内。
为便于描述,下文所示的接入和移动性管理网元将以AMF为例来说明本申请提供的方法。
3、第一网元
本申请所示的第一网元可以用于对网络切片进行准入控制(admission control)。例如,第一网元可以对需要执行准入控制的网络切片接入的终端设备的数量进行控制和/或监测(monitoring),从而保证当前已经接入网络切片的终端设备的数量总和不超过该网络切片允许接入的终端设备的最大数量/数目(maximum number of UEs per network slice)。例如,第一网元还可以保存当前已经接入网络切片的终端设备的数量,或者保存当前已经接入网络切片的终端设备的标识列表(也可以称为第一标识列表)等。该第一标识列表里面的标识用于标识当前已经接入网络切片的终端设备。又例如,第一网元还可以配置网络切片允许接入的终端设备的数量的最大值,即第一网元可以配置网络切片允许接入的最大用户数量((maximum  number of UEs per network slice)。
示例性的,第一网元对网络切片进行准入控制的方法可以是:如终端设备(如终端设备1)请求接入某个需要执行准入控制的网络切片,则第一网元检查第一标识列表(即该终端设备1请求接入的某个需要执行准入控制的网络切片已经接入的终端设备的标识列表)是否已经包含了终端设备1的标识。如果该第一标识列表中没有该终端设备1的标识,则进一步检查第一标识列表里面所标识的终端设备的数量是否已经达到了该网络切片允许接入的终端设备的数量的最大值。如果没有达到该最大值(也可以称为最大用户数),则第一网元将当前已经接入该网络切片的终端设备的数量增加1,并将终端设备1的标识添加到第一标识列表里面。如果已达到该最大值,则不允许终端设备接入该网络切片。
示例性的,第一网元对网络切片进行准入控制的方法可以是:如终端设备(如终端设备2)请求接入某个需要执行准入控制的网络切片,则第一网元检查该网络切片中接入的终端设备的数量是否已经达到了最大值。如果没有达到该最大值,则第一网元将当前已经接入该网络切片的终端设备的数量增加1,并将该终端设备2的标识添加到该网络切片已经接入的终端设备的标识列表中。
可理解,本申请所示的第一网元还可以根据其他方法对网络切片进行准入控制,本申请不做限定。
示例性的,第一网元可以包括网络切片准入控制(network slice admission control,NSAC)网元,或者,网络切片准入控制功能(network slice admission control function,NSACF)网元等,本申请对于该第一网元的具体名称不作限定。本申请描述的已经接入网络切片的终端设备也可以理解为已经注册网络切片的终端设备。以及本申请描述的已经接入网络切片的终端设备的数量也可以理解为网络切片上的注册用户数。
为便于描述,下文将以第一网元为NSACF为例说明本申请提供的方法。
基于以上所示的通信装置,本申请还提供了一种通信系统。如图1所示,图1是本申请实施例的一种通信系统示意图,该网络架构可以包括三部分,分别是终端设备部分、公共陆地移动网络(public land mobile network,PLMN)和数据网络(data network,DN)。本申请中所描述的PLMN,具体可为符合第三代合作伙伴项目(3rd generation partnership project,3GPP)标准要求的网络,简称3GPP网络。3GPP网络通常包括但不限于第五代移动通信(5th-generation,5G)网络(简称5G网络)、第四代移动通信(4th-generation,4G)网络(简称4G网络)等。数据网络DN 120,也可以称为分组数据网络(packet data network,PDN),通常是位于PLMN之外的网络,例如第三方网络。示例性的,PLMN可以接入多个数据网络DN 120,数据网络DN 120上可部署多种业务,从而为终端设备110提供数据和/或语音等服务。
如图1所示,PLMN可以包括:NSACF131、网络切片选择功能(network slice selection function,NSSF)132、策略控制功能(policy control function,PCF)133、统一数据管理(unified data management,UDM)134、应用功能(application function,AF)135、认证服务器功能(authentication server function,AUSF)136、接入与移动性管理功能(access and mobility management function,AMF)137、会话管理功能(session management function,SMF)138、用户面功能(user plane function,UPF)139以及(无线)接入网((radio)access network,(R)AN)140等。上述PLMN中,除(无线)接入网140部分之外的部分可以称为核心网络(core network,CN)部分或核心网部分。
其中,统一数据管理UDM 134是由运营商提供的控制面功能,负责存储PLMN中签约用户的用户永久标识符(subscriber permanent identifier,SUPI)、安全上下文(security context)、签约数据等信息。上述PLMN的签约用户具体可为使用PLMN提供的业务的用户,例如使用中国电信的终端设备芯卡的用户,或者使用中国移动的终端设备芯卡的用户等。示例性的,签约用户的SUPI可为终端设备芯卡的号码等。上述安全上下文可以为存储在本地终端设备(例如手机)上的数据(cookie)或者令牌(token)等。上述签约用户的签约数据可以为该终端设备芯卡的配套业务,例如该手机芯卡的流量套餐等。
本申请中,签约数据中可以包括签约的网络切片的信息(也可以称为subscribed S-NSSAI)。该签约数据中还可以包括第八指示信息,该第八指示信息可以用于指示签约数据中包含的subscribed S-NSSAI是否是一个缺省签约网络切片(也可以称为default subscribed S-NSSAI)。或者,也可以理解为,根据该第八指示信息,可以对缺省签约网络切片和签约网络切片进行区分。也就是说,default subscribed S-NSSAI可以理解为subscribed S-NSSAI中的一种,也是一种签约的网络切片。但是default subscribed S-NSSAI可以作为缺省切片。可选的,该签约数据还可以包括第一指示信息,该第一指示信息用于指示当UE请求接入的网络切片中需要执行准入控制的网络切片接入的UE的数量大于或等于第一阈值时,允许UE接入缺省签约的网络切片。可理解,签约用户的签约数据还可以称为UE的签约数据,或者UE的签约信息等,本申请对于签约数据的具体名称不作限定。
可理解,图1所示的PLMN中的其他网络功能的具体实现方式,可以参考相关协议或标准等,本申请不作详述。
图1中Nnsacf、Nnssf、Nausf、Npcf、Nudm、Naf、Namf、Nsmf、N1、N2、N3、N4,以及N6等为接口序列号。示例性的,上述接口序列号的含义可参见3GPP标准协议中定义的含义,本申请对于上述接口序列号的含义不做限制。需要说明的是,图1中仅以终端设备110为UE作出了示例性说明,图1中的各个网络功能之间的接口名称也仅仅是一个示例,在具体实现中,该系统架构的接口名称还可能为其他名称,本申请对此不作限定。
图1中示出的网络架构(例如5G网络架构)采用基于服务的架构和基于服务化的接口,本申请所示的方法还可以适用于基于点对点的接口,如图2所示。可理解,图2中所示的N1、N2、N3、N4、N5、N6、N7、N8、N10、N11、N12、N13、N15、N22、N58、N59、N60、N61等为接口序列号。示例性的,上述接口序列号的含义可参见3GPP标准协议中定义的含义,本申请对于上述接口序列号的含义不做限制。
可理解,图1和图2所示的通信系统仅为示例,示例性的,该通信系统中还可以包括网络开放功能(network repository function,NRF)或网络切片认证与授权功能(network slice-specific authentication and authorization function,NSSAAF)等,本申请对于该通信系统的具体架构不作限定。
4、网络切片
切片简单理解就是将运营商的物理网络切割成多个虚拟的端到端的网络,每个虚拟网络之间(包括网络内的设备、接入网、传输网和核心网)是逻辑独立的,任何一个虚拟网络发生故障都不会影响到其它虚拟网络。为了满足多样性需求和切片间的隔离,需要业务间相对独立的管理和运维,并提供量身定做的业务功能和分析能力。不同业务类型的实例可以部署在不同的网络切片上,相同业务类型的不同实例也可部署在不同的网络切片上。切片可以由一组网络功能(network function,NF)和/或子网络等构成。比如,图1中的子网络(R)AN140、AMF 137、SMF 138、UPF 139可以组成一个切片。可理解,图1中的每种网络功能只 示意性地画出了一个,而在实际网络部署中,每种网络功能或子网络可以有多个、数十个或上百个。PLMN中可以部署很多切片,每个切片可以有不同的性能来满足不同应用、不同垂直行业的需求。
5、单个网络切片选择辅助信息(single network slice selection assistance information,S-NSSAI)
一个网络切片可以用S-NSSAI来标识,S-NSSAI可以由切片类型/业务类型(slice/service type,SST)进行区分,或者,S-NSSAI可以由SST和切片差异化标识(slice differentiator,SD)组成。如SST用于描述切片在特性和业务方面的特征。SD用于区分具有相同SST特征的不同网络切片。
6、网络切片选择辅助信息(network slice selection assistance information,NSSAI)
NSSAI是一组S-NSSAI的集合,一个或多个网络切片的集合可以用NSSAI来标识。例如,UE请求接入的网络切片的标识信息可以称为请求的NSSAI,或者,请求的S-NSSAI。又例如,注册接受消息中携带的允许的网络切片的标识信息可以称为允许的NSSAI,或者,允许的S-NSSAI。
可理解,关于网络切片的描述,还可以参考相关标准或协议等,本申请对此不作限定。以上关于术语的介绍同样适用于下文示出的各个实施例,为了申请文件的简洁,下文不再赘述。
在切片的部署场景中,由于网络资源等限制,一个切片可以容纳接入的用户数的数量是有限的,比如增强移动带宽(enhanced mobile broadband,eMBB)业务中切片最大可以容纳一千万个用户(即UE)接入,而V2X业务中切片最大可以容纳200万用户接入。如果接入的用户数超过这个数量,就无法保证切片的服务水平协议(service level agreement,SLA)。因此,就需要NSACF对网络切片接入的UE数量进行控制。如图3所示,图3是本申请实施例提供一种网络切片准入控制方法的流程示意图,该方法包括:
301、UE向AMF发送注册请求消息,该注册请求消息携带请求的网络切片的标识信息。相应的,AMF接收该注册请求消息。
请求的网络切片的标识信息也可以称为请求的网络切片选择辅助信息(requested NSSAI)。
302、AMF判断请求的网络切片中包括需要执行准入控制的网络切片,以及确定目标网络切片,该目标网络切片为UE请求接入且需要执行准入控制的网络切片。
该目标网络切片也可以称为目标NSSAI(target NSSAI)。如目标网络切片可以为UE请求接入且需要执行网络切片准入控制(network slice admission control)的切片集合。例如,requested NSSAI={1,2,3},网络切片{1,2,3}均需要执行准入控制,则AMF判断target NSSAI={1,2,3}。
303、AMF与NSACF进行交互,确定目标网络切片(target NSSAI)的配额是否已经到达目标网络切片允许接入的终端设备的数量的最大值。
示例性的,AMF可以向NSACF发送请求消息,请求消息中携带target NSSAI,该请求消息用于请求NSACF检查target NSSAI中包含的每一个S-NSSAI对应的网络切片中当前已经接入的终端设备的数量是否已经超过了最大值。
304、如果target NSSAI包含的某个S-NSSAI对应的网络切片的配额可用,即,该target NSSAI包含的某个S-NSSAI对应的网络切片中当前已经接入的终端设备的数量没有超过最大 值,则AMF向UE返回注册接受消息,该注册接受消息携带允许的网络切片的标识信息,其中,允许的网络切片的标识信息包含上述S-NSSAI。
针对目标网络切片中的每个网络切片,NSACF确定该网络切片当前已经接入的UE的数量未超过最大数量时,NSACF可以对该网络切片进行用户数计数(即,该网络切片接入的用户数加一)。此外,可选的,NSACF向AMF返回指示信息1,该指示信息1可以用来指示该网络切片当前已经接入的终端设备的数量未到达最大值或者指示该网络切片具有可用配额(quota available),从而AMF将该网络切片的标识信息包含于注册接受消息中。即该具有可用配额的网络切片为允许的网络切片,该允许的网络切片的标识信息也可以称为允许的NSSAI(allowed NSSAI)。
305、如果target NSSAI包含的网络切片的配额都不可用,即,该target NSSAI包含的某个S-NSSAI对应的网络切片中当前已经接入的终端设备的数量超过了最大值,则AMF向UE返回注册拒绝消息,该注册拒绝消息携带拒绝的网络切片的标识信息,其中,拒绝的网络切片的标识信息包含上述S-NSSAI。
也就是说,NSACF向AMF返回的是指示信息2,该指示信息2用于指示target NSSAI中的网络切片当前已经接入的终端设备的数量达到最大值或指示网络切片的配额不可用。从而AMF将不具有可用配额的网络切片包含于注册拒绝消息中。即该不具有可用配额的网络切片为拒绝的网络切片,该拒绝的网络切片的标识信息也可以称为拒绝的NSSAI(rejected NSSAI)。
本申请示出的网络切片的配额,也可以理解为:网络切片接入的UE的数量,或者,网络切片允许接入的用户数,或者,网络切片注册的用户数。网络切片的配额不可用,或者网络切片的配额超额,或者,网络切片接入的UE的数量超过了配额,可以理解为:网络切片接入的UE数量超过最大值,或者,网络切片接入的UE的数量已经到达允许接入的最大UE数量,或者,网络切片接入的UE的数量大于或等于第一阈值,或者,网络切片已经接入的UE的数量大于或等于第一阈值。网络切片的配额可用,可以理解为:网络切片接入的UE的数量未超过最大数量,或者,网络切片接入的UE的数量未到达允许接入的最大UE数量,或者,网络切片接入的UE的数量小于第一阈值。
本申请所示的准入控制(admission control)还可以称为接入控制(access control)等,本申请对其名称不作限定。
可理解,上述关于网络切片的配额以及准入控制的说明等,下文同样适用。为了申请文件的简洁,下文将以网络切片接入的UE的数量大于或等于第一阈值为例来说明本申请提供的方法。
可理解,尽管本申请中均是以第一阈值来衡量UE请求接入的网络切片中需要执行准入控制的网络切片是否还允许接入UE,但是在UE请求接入的网络切片中需要执行准入控制的网络切片为两个或两个以上的网络切片时,该两个或两个以上的网络切片所对应的第一阈值是否相同,本申请不作限定。也就是说,如UE请求接入的网络切片中需要执行准入控制的网络切片为网络切片1和网络切片2,用于衡量网络切片1的第一阈值,与用于衡量网络切片2的第一阈值,可以不同。
从图3所示的方法中可以看出,当UE请求接入的网络切片中需要执行准入控制的网络切片接入的UE数量大于或等于第一阈值时,会导致该UE注册不成功,从而不仅影响UE的注册流程,而且导致UE不能及时有效地接入网络切片。
鉴于此,本申请提供一种网络切片准入控制方法及装置,不仅可以提高UE注册成功的准确率,而且还能够使得UE及时接入到网络切片中。本申请中,UE请求接入的网络切片可以均需要执行准入控制。或者,UE请求接入的网络切片中部分需要执行准入控制,由此,UE可以接入另一部分不需要执行准入控制的网络切片。但是,当UE请求接入需要执行准入控制的网络切片时,若该需要执行准入控制的网络切片接入的UE的数量大于或等于第一阈值,从而UE无法接入该需要执行准入控制的网络切片。当UE请求接入的网络切片中需要执行准入控制的网络切片接入的UE数量大于或等于第一阈值时,该UE的缺省签约网络切片接入的UE数量可能还未达到第二阈值,或者,该UE缺省签约网络切片不需要执行准入控制。该情况下,UE可以接入到缺省签约网络切片(也可以称为缺省签约的网络切片),改善UE注册失败的情况。
以下先总体对本申请实施例提供的方法进行介绍,然后再结合各个实施例分别进行介绍,最后再结合方法实施例对本申请实施例提供的装置进行介绍。
图4是本申请实施例提供的一种网络切片准入控制方法。示例性的,该方法可以应用于图1所示的通信系统,还可以应用于图2所示的通信系统等,本申请实施例对于该方法所适用的通信系统不再赘述。如图4所示,该方法包括:
401、UE向AMF发送注册请求消息,该注册请求消息携带该UE请求接入的网络切片的标识信息。相应的,AMF接收该注册请求消息。
该UE请求接入的网络切片可以为一个,也可以为至少两个网络切片,如为两个或三个或三个以上网络切片等。该UE请求接入的网络切片的标识信息可以称为UE请求接入的NSSAI(requested NSSAI)或者,UE请求接入的S-NSSAI(requested S-NSSAI)。
在一种可能的实现方式中,AMF向UE发送携带第一网络切片的标识信息的注册接受消息之前,图4所示的方法还包括:
AMF确定UE请求接入的网络切片中需要执行准入控制的网络切片。
示例性的,AMF可以根据以下方法确定UE请求接入的网络切片中需要执行准入控制的网络切片:1、AMF中配置需要执行准入控制的网络切片的标识信息。即AMF本地配置了需要执行准入控制的网络切片的标识信息,由此,AMF可以从UE请求接入的网络切片的标识信息中确定是否包括需要执行准入控制的网络切片的标识信息。2、UE的签约数据中指示需要执行准入控制的网络切片的标识信息。即AMF可以根据UE的签约数据确定UE请求接入的网络切片中是否包括需要执行准入控制的网络切片的标识信息。本申请实施例对于AMF从UE请求接入的网络切片中确定需要执行准入控制的网络切片的方法不作限定。可理解,上述描述对于缺省签约网络切片是否需要执行准入控制的判断方法,同样适用,下文不再赘述。
403、在UE请求接入的网络切片中需要执行准入控制的网络切片接入的UE的数量大于或等于第一阈值的情况下,AMF向UE发送携带第一网络切片的标识信息的注册接受消息,该第一网络切片为允许UE接入的网络切片。相应的,UE接收该注册接受消息。
第一网络切片可以为UE的缺省签约网络切片(default subscribed S-NSSAI)。也可以理解为第一网络切片包含于UE的缺省签约网络切片中。示例性的,该第一网络切片的标识信息可以包含于注册接受消息中的允许NSSAI中。可选的,UE请求接入的网络切片由于接入的UE数量大于或等于第一阈值(即已经超过了允许接入的UE最大数量),因此该UE请求接入的,且接入的UE的数量大于或等于第一阈值的网络切片的标识信息可以包含于注册接受消息中的拒绝NSSAI(rejected NSSAI)中。可理解,由于UE请求接入的网络切片中需要 执行准入控制的网络切片中,各个网络切片对应的第一阈值可能会所有不同。因此,UE请求接入的网络切片中需要执行准入控制的网络切片接入的UE数量大于或等于第一阈值,也可以理解为:UE请求接入的网络切片中需要执行准入控制的各个网络切片接入的UE数量大于或等于对应网络切片的第一阈值。可理解,上述第一网络切片不包含于UE请求接入的网络切片中。
在一种可能的实现方式中,图4所示的方法还可以包括:
402、AMF确定允许UE接入缺省签约网络切片。
如AMF向UE发送注册接受消息之前,AMF确定允许UE接入缺省签约网络切片。该缺省签约网络切片的标识信息可以称为default subscribed NSSAI,或者,default subscribed S-NSSAI。
示例性的,缺省签约网络切片不需要执行准入控制,即第一网络切片为不需要执行准入控制的缺省签约网络切片。由此,步骤402还可以替换为:AMF从一个或多个缺省签约网络切片中确定至少一个第一网络切片。如AMF可以从该多个缺省签约网络切片中确定一个缺省签约网络切片作为第一网络切片。可理解,关于该种实现方式的说明还可以参考下文关于图6的描述,这里不作一一详述。
示例性的,缺省签约网络切片需要执行准入控制,即第一网络切片为需要执行准入控制的缺省签约网络切片。示例性的,UE的缺省签约网络切片为N个,N为大于或等于1的整数。AMF与NSACF进行交互时,AMF可以向NSACF发送一个或M个或N个缺省签约网络切片的标识信息,该M为大于1,且小于N的整数。该NSACF根据各个网络切片已经接入的UE的数量是否小于第二阈值,将小于第二阈值的缺省签约网络切片的标识信息发给AMF,该AMF从该小于第二阈值的缺省签约网络切片中确定至少一个第一网络切片。又例如,该NSACF也可以根据各个网络切片已经接入的UE的数量,确定接入UE的数量最少的网络切片作为第一网络切片,以及将该第一网络切片的标识信息发送给AMF。又例如,AMF向NSACF发送的缺省签约网络切片接入的UE的数量均小于第二阈值,该情况下,NSACF可以不向AMF发送缺省签约网络切片的标识信息,如发送第三指示信息。关于第三指示信息的说明可以参考下文,这里先不详述。
示例性的,第一网络切片为多个缺省签约网络切片中已经接入UE的数量小于第二阈值的网络切片。或者,若多个缺省签约网络切片中已经接入的UE的数量小于第二阈值的网络切片的数量为至少两个,则第一网络切片为该至少两个网络切片中的任一个。或者,第一网络切片为多个缺省签约网络切片中接入的UE的数量最少的网络切片。可理解,关于该种实现方式的说明还可以参考下文关于图7或图8的描述,这里不作一一详述。
可理解,注册接受消息中可以包括一个第一网络切片,也可以包括两个或两个以上的第一网络切片。如在允许向UE反馈多个第一网络切片的情况下,注册接受消息中也可以包括两个或两个以上的第一网络切片。因此,本申请实施例对于AMF(或NSACF)确定的第一网络切片的数量,以及注册接受消息中携带的第一网络切片的数量不作限定。为便于描述,下文将以注册接受消息中携带一个第一网络切片为例说明本申请实施例提供的方法。
本申请实施例中,即使终端设备请求的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于第一阈值,该终端设备仍可以接入到网络切片,如第一网络切片,从而不仅使得终端设备注册成功,而且还能够保证终端设备能够通过第一网络切片及时进行业务通信等。
需要说明的是,当缺省签约网络切片需要执行准入控制,且UE的缺省签约网络切片中 每个网络切片接入的UE的数量均大于或等于第二阈值,则AMF也可能会向UE返回注册拒绝消息。该注册拒绝消息包括拒绝原因值和延迟计时器(back off timer)。该情况下,则说明UE请求接入的网络切片中需要执行准入控制的网络切片已无法使得该UE接入,以及该UE的缺省签约网络切片也无法使得该UE接入,由此,UE只能在延迟计时器超时后再次发起注册请求。
以下详细介绍AMF确定允许UE接入缺省签约网络切片的三种实现方式。
实现方式一、
图5a是本申请实施例提供的一种确定允许UE接入缺省签约网络切片的方法流程示意图。如图5a所示,该方法包括:
4021、AMF配置第一信息,该第一信息用于指示当UE请求接入的网络切片中需要执行准入控制的网络切片接入的UE的数量大于或等于第一阈值时,允许UE接入缺省签约网络切片。
4022、AMF根据第一信息确定允许UE接入缺省签约网络切片。
本申请实施例中,AMF配置第一信息,也可以称为AMF本地配置有第一信息(也可以称为AMF配置有策略)。该第一信息用于指示当UE请求接入的网络切片中需要执行准入控制的网络切片接入的UE的数量大于或等于第一阈值时,允许UE接入缺省签约网络切片。也就是说,根据该第一信息或策略,在UE请求接入的网络切片中需要执行准入控制的网络切片接入的UE的数量大于或等于第一阈值时,AMF可以不向UE发送注册拒绝消息。而是根据该第一信息或策略,确定允许UE接入缺省签约网络切片。如缺省签约网络切片需要执行准入控制,则第一信息也可以理解为:该第一信息用于指示当UE请求接入的网络切片中需要执行准入控制的网络切片接入的UE的数量大于或等于第一阈值时,则进一步确认该缺省签约网络切片当前接入的UE的数量是否小于第二阈值。至于UE是否能接入到缺省签约网络切片中,则需要根据该缺省签约网络切片接入的UE的数量是否小于第二阈值确定。
示例性的,上述第一信息可以包括第一指示信息,该第一指示信息用于指示UE请求接入的网络切片中需要执行准入控制的网络切片接入的UE的数量大于或等于第一阈值时,允许上述UE接入缺省签约网络切片。可理解,上述第一信息中除了包括第一指示信息,还可以包括一个或多个缺省签约网络切片的标识信息(如default subscribed S-NSSAI,或default subscribed NSSAI)。
实现方式二、
图5b是本申请实施例提供的另一种确定允许UE接入缺省签约网络切片的方法流程示意图。如图5b所示,该方法包括:
4024、AMF向UDM发送第一请求消息;相应的,UDM接收该第一请求消息。
4025、UDM向AMF发送第一响应消息,相应的,该AMF接收该第一响应消息。
示例性的,第一响应消息携带第一网络切片的标识信息。或者,第一响应消息携带一个或多个缺省签约网络切片的标识信息。该情况下,AMF可以确定允许UE接入到第一响应消息中携带的网络切片中。也就是说,当AMF向UDM请求缺省签约网络切片时,该AMF可以默认根据第一响应消息中的缺省签约网络切片确定允许UE接入。
示例性的,该第一响应消息携带第一网络切片的标识信息以及第一指示信息,该第一指示信息用于指示UE请求接入的网络切片中需要执行准入控制的网络切片接入的UE的数量大于或等于第一阈值时,允许上述UE接入缺省签约网络切片。或者,第一响应消息中携带 多个缺省签约网络切片的标识信息以及第一指示信息。也就是说,AMF通过该第一指示信息便可以明确获知UE可以接入缺省签约网络切片。
示例性的,第一响应消息中也可以携带UE的签约信息,该UE的签约信息中包括一个或多个缺省签约网络切片的标识信息和第一指示信息。从而AMF可以从该UE的签约信息中获得一个或多个缺省签约网络切片(如第一网络切片)。
4026、AMF根据第一指示信息确定允许UE接入缺省签约网络切片。
可理解,实现方式二中的UDM还可以是其他网元,比如NSSF或者PCF等,网元中存储有UE的缺省签约网络切片的标识信息和/或第一指示信息,AMF能够从该网元中获取到UE的缺省签约网络切片的标识信息和/或第一指示信息,该网元均属于本申请实施例的保护范围。
实现方式三、
图5c是本申请实施例提供的又一种确定允许UE接入缺省签约网络切片的方法流程示意图。如图5c所示,该方法包括:
4028、AMF根据UE的签约信息确定允许该UE接入缺省签约网络切片。
该UE的签约信息中包括第一指示信息,该第一指示信息用于指示当UE请求接入的网络切片中需要执行准入控制的网络切片接入的UE的数量大于或等于第一阈值时,允许UE接入(或尝试接入)缺省签约网络切片。该UE的签约信息中还包括缺省签约网络切片的标识信息。
该UE的签约信息可以是AMF从UDM中获取的。如AMF可以是在步骤401之前获得的签约信息,也可以是在步骤401之后获取的签约信息,也可以是在步骤402之前获取的签约信息等,本申请实施例对于AMF何时获取的签约信息不作限定。可理解,关于签约信息的描述,可以参考其他地方的描述,这里不再赘述。
可理解,以上所示的实现方式一至实现方式三可以为相互独立的实现方式,或者,还可以结合。例如,实现方式一和实现方式二结合。又例如,实现方式二和实现方式三结合。即不同实现方式之间相互结合,从而保证AMF能够有效确定允许UE接入缺省签约网络切片。对于不同实现方式之间的结合,还可以参考下文所示的图6至图8,这里先不一一详述。
图6是本申请实施例提供的一种网络切片准入控制方法的流程示意图,如图6所示,该方法包括:
601、UE向AMF发送注册请求消息,相应的,AMF接收该注册请求消息。该注册请求消息携带UE请求接入的网络切片的标识信息(即requested NSSAI)。
602、AMF向UDM发送第一请求消息,相应的,UDM接收该第一请求消息。
603、UDM向AMF发送第一响应消息,相应的,AMF接收该第一响应消息。
本申请实施例中,AMF可以通过步骤602和步骤603获得UE的签约信息(也可以称为UE的签约数据)。该UE的签约信息中可以包括缺省签约网络切片的标识信息。该情况下,一种实现方式是,第一指示信息可以为预先定义的(即配置在AMF上),即UE的签约信息中不包括第一指示信息,AMF允许UE接入到该缺省签约网络切片中。或者,该UE的签约信息中可以包括第一网络切片的标识信息以及第一指示信息。本申请实施例中,第一指示信息可以用于指示第一网络切片不需要执行准入控制。如表1所示,UE的签约信息中可以包括UE签约的网络切片的标识信息(subscribed S-NSSAI,或者subscribed NSSAI),以及该UE签约的网络切片中还可以有一些被标记为缺省签约网络切片。结合上文所示的第八指示信息, 如当签约网络切片中包括第八指示信息时,则该签约网络切片也可以称为缺省签约网络切片。表1还示出了签约信息中的第一指示信息,即第一指示信息用于指示当UE请求的网络切片接入的UE数量已经达到最大数量(即最大值),则允许UE接入到缺省签约网络切片。
可理解,关于第一响应消息的描述,还可以参考上文关于图5b的介绍。
对于上述步骤602和步骤603也可以理解为:AMF通过NuDm_SDM_Get服务化操作请求从UDM获取UE的签约信息,UDM调用服务化操作NuDm_SDM_Get response,向AMF返回UE的签约信息。
表1
Figure PCTCN2022079817-appb-000001
可理解,上述步骤602和步骤603仅为示例,如AMF也可以根据配置的第一信息获得UE缺省签约的网络切片等,关于该第一信息的说明,可以参考上文,这里不再详述。
示例性的,AMF可以根据以下方法确定UE请求接入的网络切片中需要执行准入控制的网络切片:1、AMF中配置需要执行准入控制的网络切片的标识信息。2、UE的签约数据中指示需要执行准入控制的网络切片的标识信息。本申请实施例对于判断UE请求接入的网络切片中,需要执行准入控制的网络切片的方法,也可以参考图4所示的方法,这里不再详述。
为便于描述,下文将以target NSSAI来替换上述UE请求接入的网络切片中需要执行准入控制的网络切片的标识信息。
604、AMF向NSACF发送第四请求消息,相应的,NSACF接收该第四请求消息。该第四请求消息携带UE请求接入的网络切片中需要执行准入控制的网络切片的标识信息。
605、NSACF向AMF发送第四响应消息,相应的,AMF接收该第四响应消息。该第四响应消息携带第二指示信息,该第二指示信息用于指示UE请求接入的网络切片中需要执行准入控制的网络切片接入的UE的数量大于或等于第一阈值。
由此,AMF根据第二指示信息便可以获知UE请求的网络切片中需要执行准入控制的网络切片接入的UE的数量已达到最大数量(即大于或等于第一阈值,或已经达到最大值),该UE已无法接入到上述网络切片中。进一步地,AMF执行步骤606和步骤607,从而UE接入第一网络切片中。
可理解,上述步骤604和步骤605也可以理解为:AMF调用NSACF的服务化操作如Nnsacf_NSQuotaAvailabilityCheck_Request,该该服务化操作携带target S-NSSAI(s)。NSACF根据本地配置的每个网络切片允许接入的UE的最大数量(max number of UEs per network slice),确定target S-NSSAI(s)中的每一个网络切片接入的UE的数量是否大于或等于第一阈值。以及NSACF调用服务化操作Nnsacf_NSQuotaAvailabilityCheck_Response,向AMF返回target S-NSSAI(s)中每个网络切片接入的UE的数量是否大于或等于第一阈值(也可以称为target S-NSSAI中每个网络切片的配额检查结果)。
作为一种实现方式,第四响应消息也可以携带target NSSAI中每个网络切片接入的UE的数量。
可理解,步骤604和步骤605可以是在步骤602和步骤603之后,即AMF可以在未获得第二指示信息之前获取UE的签约信息。或者,步骤604和步骤605可以是在步骤602和 步骤603之前,即AMF可以是获得第二指示信息后,获取UE的签约信息。
606、AMF根据第一指示信息确定允许UE接入第一网络切片。
本申请实施例中,在步骤602和步骤603之后,AMF可以根据第一响应消息中的第一指示信息确定允许UE接入第一网络切片;然后执行步骤604和步骤605。或者,在步骤602和步骤603之后,AMF可以保存UE的签约信息(或者保存上述第一指示信息等);然后在步骤604和步骤605之后,AMF根据该UE的签约信息确定允许UE接入第一网络切片。或者,AMF可以不通过上述步骤602和步骤603获取第一指示信息,而是通过本地配置的第一信息确定允许UE接入第一网络切片。可理解,对于AMF确定允许UE接入第一网络切片的具体描述,可以参考图5a至图5c,这里不再赘述。
607、AMF向UE发送注册接受消息,相应的,该UE接收该注册接受消息。
示例性的,注册接受消息可以包括allowed NSSAI,该allowed NSSAI中包括第一网络切片的标识信息,即default subscribed S-NSSAI的标识信息。可选的,注册接受消息还可以包括rejected NSSAI,该rejected NSSAI中包括的是UE请求接入的网络切片中,接入的UE的数量大于或等于第一阈值的网络切片(包括第二网络切片)的标识信息。608、AMF向NSACF发送订阅请求消息,相应的,NSACF接收该订阅请求消息。该订阅请求消息携带UE请求接入的网络切片中需要执行准入控制的网络切片中的一个或多个网络切片的标识信息(如可以是S-NSSAI或NSSAI),以及UE的标识信息。
上述订阅请求消息中可以携带一个或多个网络切片的标识信息,该一个或多个网络切片可以理解为:UE请求接入的网络切片中需要执行准入控制的网络切片,且该每个网络切片接入的UE的数量大于或等于第一阈值。或者,也可以理解为:注册接受消息中携带的rejected NSSAI中的一个或多个网络切片。可理解,该一个或多个网络切片中包括第二网络切片。
也就是说,订阅请求消息中可以携带一个网络切片的标识信息,如第二网络切片的标识信息。又如订阅请求消息中可以携带多个网络切片的标识信息,该多个网络切片的标识信息中包括第二网络切片的标识信息。可理解,关于该一个或多个网络切片满足的条件可以如上所示,这里不再详述。
上述步骤608还可以理解为:AMF调用服务化操作如Nnsacf_NSQuotaAvailability_Subscribe,该服务化操作携带UE请求接入的网络切片中需要执行准入控制的,且接入的UE的数量大于或等于第一阈值的网络切片的标识信息(如可以简称为S-NSSAI in rejected NSSAI)以及UE的标识信息(如UE ID)。示例性的,通过该服务化操作,AMF可以向NSACF订阅rejected NSSAI中一个或多个网络切片(包括第二网络切片)接入的UE的数量小于第一阈值的事件(如也可以称为配额可用事件)。
609、NSACF确定第二网络切片接入的UE的数量小于第一阈值。
当判断第二网络切片接入的UE的数量小于第一阈值(即配额可用)时,NSACF通知当前服务UE的AMF,以便于UE能够接入该第二网络切片。
610、NSACF向UDM发送第五请求消息,相应的,UDM接收该第五请求消息。该第五请求消息携带UE的标识信息。
611、UDM向NSACF发送第五响应消息,相应的,NSACF接收该第五响应消息。该第五响应消息携带当前为UE服务的AMF的标识信息。
上述步骤610和611还可以理解为:NSACF调用UDM的服务化操作如Nudm_UECM_Get,该服务化操作携带UE ID以及AMF registration指示信息,该AMF registration指示信息用于向UDM查找当前UE注册的AMF。即通过该服务化操作NSACF 可以向UDM查询当前服务UE的AMF的标识信息。
612、NSACF向当前为UE服务的AMF发送第一通知消息,该第一通知消息携带第七指示信息;相应的,当前为UE服务的AMF接收该第一通知消息。该第一通知消息携带第七指示信息,该第七指示信息用于指示第二网络切片接入的UE的数量小于第一阈值。
示例性的,当订阅请求消息携带一个网络切片的标识信息,如第二网络切片的标识信息时,第一通知消息中可以携带第七指示信息,如上述步骤612所示。
示例性的,当订阅请求消息中携带的多个网络切片(包括第二网络切片)的标识信息时,该第一通知消息中还可以携带第二网络切片的标识信息。换句话说,该第二网络切片可以理解为:UE请求接入的网络切片中需要执行准入控制的网络切片,且该第二网络切片接入的UE的数量大于或等于第一阈值;在一段时长后,该第二网络切片接入的UE的数量小于第一阈值。即在一段时长后,UE可以接入该第二网络切片。可理解,如果NSACF确定有多个网络切片接入的UE的数量均小于第一阈值,即NSACF确定有多个第二网络切片时,则该第一通知消息中还可以携带多个第二网络切片的标识信息。
上述步骤612还可以理解为:NSACF调用Nnsacf_NSQuotaAvailability_Notify,向当前服务UE的AMF发送第一通知消息。
可理解,当前为UE服务的AMF可以为上述AMF,也可以为另外的AMF等,本申请实施例对此不作限定。附图是以当前为UE服务的AMF为上述AMF为例示出的,但是不应将其理解为对本申请实施例的限定。
613、AMF向UE发送第二通知消息,相应的,UE接收该第二通知消息。该第二通知消息携带第二网络切片的标识信息。
上述步骤613还可以理解为:AMF向UE发送非接入(non-access stratum,NAS)消息,从而通知UE注册接受消息中的rejected NSSAI中的某个S-NSSAI接入的UE的数量小于第一阈值或者通知UE注册接受消息中的rejected NSSAI中的某个S-NSSAI配额可用。
通过步骤608至步骤613所示的方法,可以使得在第二网络切片接入的UE的数量小于第一阈值时,保证UE能够及时有效地接入该第二网络切片。从而,还有效保证了UE接入网络切片的公平性,使得UE能够接入到其请求接入的网络切片中。
可理解,图6中的步骤608至步骤613同样适用于图7和图8所示的方法。例如,图7所示的方法中,在步骤707之后,图7所示的方法还可以包括步骤708至步骤713,对于步骤708至步骤713可以参考图6所示的步骤608至步骤613所示的方法。又例如,图8所示的方法中,在步骤809之后,图8所示的方法还可以包括步骤810至步骤815,对于步骤810至步骤815可以参考图6所示的步骤608至步骤613所示的方法。为避免赘述,下文对于上述步骤608至步骤613所示的方法不再一一详述。
通过本申请实施例,当UE请求接入的需要执行准入控制的网络切片接入的UE的数量大于或等于第一阈值,允许UE接入到缺省签约网络切片中。同时,该缺省签约网络切片不需要执行准入控制,有效保证了UE能够接入该缺省签约网络切片中。
可理解,图6是以第一网络切片不需要执行准入控制为例示出的,以下将以第一网络切片需要执行准入控制为例说明本申请实施例提供的方法。
图7是本申请实施例提供的一种网络切片准入控制方法的流程示意图,如图7所示,该方法包括:
701、UE向AMF发送注册请求消息,相应的,AMF接收该注册请求消息。该注册请求 消息携带UE请求接入的网络切片的标识信息(即requested NSSAIs)。
702、AMF向UDM发送第一请求消息,相应的,UDM接收该第一请求消息。
703、UDM向AMF发送第一响应消息,相应的,AMF接收该第一响应消息。
可理解,关于步骤701至步骤703的说明,可以参考图6中步骤601至步骤603的描述,这里不再详述。
704、AMF根据第一指示信息确定允许UE接入缺省签约网络切片。
可理解,关于步骤704的说明,可以参考图4中步骤402的描述,或者,参考图5b的描述等这里不再详述。
705、AMF向NSACF发送第二请求消息,相应的,NSACF接收该第二请求消息。该第二请求消息携带target NSSAI和缺省签约网络切片的标识信息。
本申请实施例中,第二请求消息中通过携带target NSSAI和缺省签约网络切片的标识信息,可使得NSACF向AMF返回target NSSAI中每个网络切片接入的UE的数量,以及缺省签约网络切片接入的UE的数量;或者,可使得NSACF向AMF返回target NSSAI中每个网络切片接入的UE的数量是否大于或等于第一阈值,以及缺省签约网络切片接入的UE的数量是否小于第二阈值。即NSACF在接收到第二请求消息后,可以默认向AMF返回上述信息。可理解,本申请实施例对于缺省签约网络切片的个数不作限定。如图4所示的方法,该AMF可以向NSACF发送一个或M个或N个缺省签约网络切片的标识信息。示例性的,NSACF可以根据各个缺省签约网络切片接入的UE的数量确定第一网络切片。
可选的,第二请求消息还包括第四指示信息,该第四指示信息用于指示当target NSSAI中每个网络切片接入的UE的数量大于或等于第一阈值,触发(也可以理解为激活)对缺省签约网络切片的准入控制。也就是说,第二请求消息中通过携带第四指示信息,可以显式地向NSACF指示触发对缺省签约网络切片的准入控制。即NSACF根据该第四指示信息,获取缺省签约网络切片接入的UE的数量,或者,获取缺省签约网络切片接入的UE的数量是否小于第二阈值。换句话说,如果target NSSAI中网络切片接入的UE的数量小于第一阈值,可以不触发对缺省签约网络切片的准入控制。
可选的,第二请求消息还包括第五指示信息,该第五指示信息用于指示NSACF从多个缺省签约网络切片中确定第一网络切片。或者说,该第五指示信息用于指示NSACF仅对多个缺省签约网络切片中的一个网络切片(如第一网络切片)进行UE计数。第二请求消息可以携带多个缺省签约网络切片(即多个第一网络切片)的标识信息,由此,NSACF根据该第五指示信息仅对多个缺省签约网络切片中的一个第一网络切片进行计数,即将该第一网络切片接入的UE的数量加1。可理解,NSACF进行计数的第一网络切片即为注册接受消息中的第一网络切片。
706、NSACF向AMF发送第二响应消息,相应的,AMF接收该第二响应消息。
可选的,第二响应消息仅携带第二指示信息,该第二指示信息用于指示target NSSAI中每个网络切片接入的UE的数量大于或等于第一阈值。也就是说,第二响应消息中可以仅包括第二指示信息,从而AMF根据该第二指示信息可以认为第一网络切片接入的UE的数量小于第二阈值。
可选的,第二响应消息仅携带第三指示信息,该第三指示信息用于指示第一网络切片接入的UE的数量小于第二阈值。由此,AMF根据该第三指示信息可以默认认为target NSSAI中每个网络切片接入的UE的数量大于或等于第一阈值。
可选的,该第二响应消息可以同时携带第二指示信息和第三指示信息。
707、AMF向UE发送注册接受消息,相应的,该UE接收该注册接受消息。
可理解,关于步骤707的说明,可以参考图6中步骤607的描述,这里不再赘述。
可理解,图7所示的方法还可以包括步骤708至步骤713。对于步骤708至步骤713的说明,可以参考图6所示的步骤608至步骤613,这里不再一一详述。
通过本申请实施例,不仅可以保证终端设备能够接入第一网络切片,避免终端设备注册失败的情况;而且由于接入和移动性管理网元与第一网元进行一次交互(即第二请求消息和第二响应消息)就可以确定第一网络切片,提高了信令交互的效率。
图8是本申请实施例提供的一种网络切片准入控制方法的流程示意图,如图8所示,该方法包括:
801、UE向AMF发送注册请求消息,相应的,AMF接收该注册请求消息。该注册请求消息携带UE请求接入的网络切片的标识信息(即requested NSSAIs)。
802、AMF向UDM发送第一请求消息,相应的,UDM接收该第一请求消息。
803、UDM向AMF发送第一响应消息,相应的,AMF接收该第一响应消息。
804、AMF根据第一指示信息确定允许UE接入缺省签约网络切片。
可理解,关于步骤802至步骤804的说明,可以参考图7所示的步骤702至步骤704的描述,这里不再一一详述。
805、AMF向NSACF发送第四请求消息,相应的,NSACF接收该第四请求消息。该第四请求消息携带UE请求接入的网络切片中需要执行准入控制的网络切片的标识信息。
806、NSACF向AMF发送第四响应消息,相应的,AMF接收该第四响应消息。该第四响应消息携带第二指示信息,该第二指示信息用于指示UE请求接入的网络切片中需要执行准入控制的网络切片接入的UE的数量大于或等于第一阈值。
可理解,关于步骤804与步骤805的先后顺序,本申请实施例不作限定。例如,AMF也可以在接收到第四响应消息后,执行上述步骤804;或者,执行上述步骤802至步骤804后执行步骤805。
可理解,关于步骤805和步骤806的说明,可参考图6所示的步骤604和605,这里不再一一详述。
807、AMF向NSACF发送第三请求消息,该第三请求消息携带缺省签约网络切片的标识信息。
可选的,第三请求消息还包括第六指示信息,该第六指示信息用于指示NSACF从多个接入的UE的数量小于第二阈值的缺省签约网络切片中确定一个缺省签约网络切片,或者,该第六指示信息用于指示NSACF仅对多个缺省签约网络切片中的一个缺省签约网络切片(如第一网络切片)进行UE计数。可理解,关于第六指示信息的说明可以参考图7中第五指示信息的描述,这里不再赘述。
808、NSACF向AMF发送第三响应消息,该第三响应消息携带第三指示信息,该第三指示信息用于指示第一网络切片接入的终端UE的数量小于第二阈值。
可选的,第三响应消息中还可以携带第一网络切片的标识信息。
可选的,第三指示信息也可以用于指示缺省签约网络切片中各个网络切片接入的UE的数量小于第二阈值。该情况下,可以由AMF从缺省签约网络切片中确定一个作为第一网络切片。
809、AMF向UE发送注册接受消息,相应的,该UE接收该注册接受消息。
可理解,图6至图8所示的方法中,当AMF需要向NSACF发送请求消息(如第四请求消息、第二请求消息或第三请求消息)时,该AMF可以调用服务化操作如Nnsacf_NSQuotaAvailabilityCheck_Request。当NSACF向AMF返回响应消息(如第四响应消息、第二响应消息或第三响应消息)时,该NSACF可以调用Nnsacf_NSQuotaAvailabilityCheck_Response。当AMF向UDM发送请求消息(如第一请求消息)时,该AMF可以调用服务化操作如Nudm_SDM_Get。当UDM向AMF返回响应消息(如第一响应消息)时,UDM可以调用服务化操作如Nudm_SDM_Get response。
本申请实施例中,即使终端设备请求的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于第一阈值,该终端设备仍可以接入到网络切片,如第一网络切片,从而不仅使得终端设备注册成功,而且还能够保证终端设备能够通过第一网络切片及时进行业务通信等。
以下将介绍本申请实施例提供的通信装置。
本申请根据上述方法实施例对通信装置进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。下面将结合图9至图11详细描述本申请实施例的通信装置。
图9是本申请实施例提供的一种通信装置的结构示意图,如图9所示,该通信装置包括处理单元901和收发单元902。
在本申请的一些实施例中,该通信装置可以是上文示出的接入和移动性管理网元或AMF或AMF中的芯片等。即该通信装置可以用于执行上文方法实施例中AMF执行的步骤或功能等。其中,
收发单元902,用于输入注册请求消息;
收发单元902,用于在UE请求接入的网络切片中需要执行准入控制的网络切片接入的UE的数量大于或等于第一阈值的情况下,输出携带第一网络切片的标识信息的注册接受消息。
本申请实施例中,收发单元902,用于输入注册请求消息,包括:收发单元902,用于接收来自UE的注册请求消息。收发单元902,用于输出注册接受消息,包括:收发单元902,用于向UE发送该注册接受消息。可理解,这里关于收发单元的说明,同样适用于本申请示出的第一请求消息以及第一响应消息,第二请求消息以及第二响应消息,第三请求消息以及第三响应消息,第四请求消息以及第四响应消息等。例如,下文示出的收发单元902输出第一请求消息,包括:收发单元902向UDM发送第一请求消息。
在一种可能的实现方式中,处理单元901,用于确定允许UE接入缺省签约网络切片。
在一种可能的实现方式中,处理单元901,具体用于配置第一信息,以及根据第一信息确定允许UE接入缺省签约网络切片。
在一种可能的实现方式中,处理单元901,用于通过收发单元902输出第一请求消息,以及输入第一响应消息;处理单元901,用于根据第一指示信息确定允许UE接入缺省签约网络切片。
在一种可能的实现方式中,处理单元901,具体用于根据UE的签约信息确定允许UE接入缺省签约网络切片。
在一种可能的实现方式中,收发单元902,还用于输出第二请求消息,以及输入第二响应 消息。
在一种可能的实现方式中,收发单元902,还用于输出第三请求消息,以及输入第三响应消息。
在一种可能的实现方式中,收发单元902,还用于输出订阅请求消息,输入第一通知消息,以及输出第二通知消息。
本申请实施例中,关于注册请求消息、注册响应消息、缺省签约网络切片、第一请求消息、第一响应消息、第二请求消息、第二响应消息、第三请求消息、第三响应消息、第一指示信息、第二指示信息、第三指示信息、第四指示信息、第五指示信息、第六指示信息、第七指示信息、订阅请求消息、第一通知消息、第二通知消息等的说明,可以参考上文所示的方法实施例,这里不再赘述。
可理解,本申请实施例示出的收发单元和处理单元的具体说明仅为示例,对于收发单元和处理单元的具体功能或执行的步骤等,可以参考上述方法实施例,这里不再详述。示例性的,收发单元902还可以用于执行图4所示的步骤401中的接收步骤,处理单元901还可以用于执行图4所示的步骤402,收发单元902还可以用于执行图4所示的步骤403中的发送步骤。示例性的,收发单元902和处理单元901还可以用于执行图6至图8所示的相应方法,这里不再一一详述。
复用图9,在本申请的另一些实施例中,该通信装置可以是上文示出的终端设备(如UE等)或终端设备中的芯片等。即该通信装置可以用于执行上文方法实施例中由UE执行的步骤或功能等。
收发单元902,用于输出注册请求消息,以及输入注册接受消息。或者,也可以理解为,处理单元901,通过收发单元902输出注册请求消息,以及输入注册接受消息。
本申请实施例中,关于注册请求消息和注册接受消息的说明还可以参考上文方法实施例中的介绍,这里不再一一详述。
可理解,本申请实施例示出的收发单元和处理单元的具体说明仅为示例,对于收发单元和处理单元的具体功能或执行的步骤等,可以参考上述方法实施例,这里不再详述。
以上介绍了本申请实施例的AMF和UE,以下介绍所述AMF和UE可能的产品形态。应理解,但凡具备上述图9所述的AMF的功能的任何形态的产品,或者,但凡具备上述图9所述的UE的功能的任何形态的产品,都落入本申请实施例的保护范围。还应理解,以下介绍仅为举例,不限制本申请实施例的AMF和UE的产品形态仅限于此。
在一种可能的实现方式中,图9所示的通信装置中,处理单元901可以是一个或多个处理器,收发单元902可以是收发器,或者收发单元902还可以是发送单元和接收单元,发送单元可以是发送器,接收单元可以是接收器,该发送单元和接收单元集成于一个器件,例如收发器。本申请实施例中,处理器和收发器可以被耦合等,对于处理器和收发器的连接方式,本申请实施例不作限定。
如图10所示,该通信装置100包括一个或多个处理器1020和收发1010。
示例性的,当该通信装置用于执行上述AMF执行的步骤或方法或功能时,收发器1010,用于接收注册请求消息以及发送注册接受消息等。关于处理器和收发器的具体说明,可以参考上文所示的处理单元和收发单元的描述,这里不再一一赘述。
示例性的,当该通信装置用于执行上述UE执行的步骤或方法或功能时,收发器1010,用于发送注册请求消息以及接收注册接受消息。
本申请实施例中,关于注册请求消息、注册响应消息、缺省签约网络切片、第一请求消息、第一响应消息、第二请求消息、第二响应消息、第三请求消息、第三响应消息、第一指示信息、第二指示信息、第三指示信息、第四指示信息、第五指示信息、第六指示信息、第七指示信息、订阅请求消息、第一通知消息、第二通知消息等的说明,可以参考上文所示的方法实施例,这里不再赘述。
在图10所示的通信装置的各个实现方式中,收发器可以包括接收机和发射机,该接收机用于执行接收的功能(或操作),该发射机用于执行发射的功能(或操作)。以及收发器用于通过传输介质和其他设备/装置进行通信。
可选的,通信装置100还可以包括一个或多个存储器1030,用于存储程序指令和/或数据。存储器1030和处理器1020耦合。本申请实施例中的耦合是装置、单元或模块之间的间接耦合或通信连接,可以是电性,机械或其它的形式,用于装置、单元或模块之间的信息交互。处理器1020可能和存储器1030协同操作。处理器1020可可以执行存储器1030中存储的程序指令。可选的,上述一个或多个存储器中的至少一个可以包括于处理器中。本申请实施例中,存储器630中可以存储有第一信息,或者UE的签约信息等,图10中以虚线表示。
本申请实施例中不限定上述收发器1010、处理器1020以及存储器1030之间的具体连接介质。本申请实施例在图10中以存储器1030、处理器1020以及收发器1010之间通过总线1040连接,总线在图10中以粗线表示,其它部件之间的连接方式,仅是进行示意性说明,并不引以为限。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图10中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
在本申请实施例中,处理器可以是通用处理器、数字信号处理器、专用集成电路、现场可编程门阵列或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等,可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成等。
本申请实施例中,存储器可包括但不限于硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD)等非易失性存储器,随机存储记忆体(Random Access Memory,RAM)、可擦除可编程只读存储器(Erasable Programmable ROM,EPROM)、只读存储器(Read-Only Memory,ROM)或便携式只读存储器(Compact Disc Read-Only Memory,CD-ROM)等等。存储器是能够用于携带或存储具有指令或数据结构形式的程序代码,并能够由计算机(如本申请示出的通信装置等)读和/或写的任何存储介质,但不限于此。本申请实施例中的存储器还可以是电路或者其它任意能够实现存储功能的装置,用于存储程序指令和/或数据。
当上述通信装置为终端设备时,处理器1020主要用于对通信协议以及通信数据进行处理,以及对整个通信装置进行控制,执行软件程序,处理软件程序的数据。存储器1030主要用于存储软件程序和数据。收发器1010可以包括控制电路和天线,控制电路主要用于基带信号与射频信号的转换以及对射频信号的处理。天线主要用于收发电磁波形式的射频信号。输入输出装置,例如触摸屏、显示屏,键盘等主要用于接收用户输入的数据以及对用户输出数据。
当通信装置开机后,处理器1020可以读取存储器1030中的软件程序,解释并执行软件程序的指令,处理软件程序的数据。当需要通过无线发送数据时,处理器1020对待发送的数据进行基带处理后,输出基带信号至射频电路,射频电路将基带信号进行射频处理后将射频信号通过天线以电磁波的形式向外发送。当有数据发送到通信装置时,射频电路通过天线接 收到射频信号,将射频信号转换为基带信号,并将基带信号输出至处理器1020,处理器1020将基带信号转换为数据并对该数据进行处理。在另一种实现中,所述的射频电路和天线可以独立于进行基带处理的处理器而设置,例如在分布式场景中,射频电路和天线可以与独立于通信装置,呈拉远式的布置。
可理解,本申请实施例示出的通信装置还可以具有比图10更多的元器件等,本申请实施例对此不作限定。以上所示的处理器和收发器所执行的方法仅为示例,对于该处理器和收发器具体所执行的步骤可参照上文介绍的方法。
在另一种可能的实现方式中,图9所示的通信装置中,处理单元901可以是一个或多个逻辑电路,收发单元902可以是输入输出接口,又或者称为通信接口,或者接口电路,或接口等等。或者收发单元902还可以是发送单元和接收单元,发送单元可以是输出接口,接收单元可以是输入接口,该发送单元和接收单元集成于一个单元,例如输入输出接口。如图11所示,图11所示的通信装置包括逻辑电路1101和接口1102。即上述处理单元901可以用逻辑电路1101实现,收发单元902可以用接口1102实现。其中,该逻辑电路1101可以为芯片、处理电路、集成电路或片上系统(system on chip,SoC)芯片等,接口1102可以为通信接口、输入输出接口、管脚等。示例性的,图7是以上述通信装置为芯片为例出的,该芯片包括逻辑电路1101和接口1102。
本申请实施例中,逻辑电路和接口还可以相互耦合。对于逻辑电路和接口的具体连接方式,本申请实施例不作限定。
示例性的,当通信装置用于执行上述AMF执行的方法或功能或步骤时,接口1102,用于输入注册请求消息以及输出注册接受消息。
在一种可能的实现方式中,逻辑电路1101,用于确定允许UE接入缺省签约网络切片。
在一种可能的实现方式中,逻辑电路1101,具体用于配置第一信息,以及根据第一信息确定允许UE接入缺省签约网络切片。
在一种可能的实现方式中,逻辑电路1101,用于通过接口1102输出第一请求消息,以及输入第一响应消息;逻辑电路1101,用于根据第一指示信息确定允许UE接入缺省签约网络切片。
在一种可能的实现方式中,逻辑电路1101,具体用于根据UE的签约信息确定允许UE接入缺省签约网络切片。
在一种可能的实现方式中,接口1102,还用于输出第二请求消息,以及输入第二响应消息。
在一种可能的实现方式中,接口1102,还用于输出第三请求消息,以及输入第三响应消息。
在一种可能的实现方式中,接口1102,还用于输出订阅请求消息,输入第一通知消息,以及输出第二通知消息。
本申请实施例中,关于注册请求消息、注册响应消息、缺省签约网络切片、第一请求消息、第一响应消息、第二请求消息、第二响应消息、第三请求消息、第三响应消息、第一指示信息、第二指示信息、第三指示信息、第四指示信息、第五指示信息、第六指示信息、第七指示信息、订阅请求消息、第一通知消息、第二通知消息等的说明,可以参考上文所示的方法实施例,这里不再赘述。
示例性的,当通信装置用于执行上述UE执行的方法或功能或步骤时,接口1102,用于输 出注册请求消息,以及输入注册接受消息。
可理解,本申请实施例示出的通信装置可以采用硬件的形式实现本申请实施例提供的方法,也可以采用软件的形式实现本申请实施例提供的方法等,本申请实施例对此不作限定。
对于图11所示的各个实施例的具体实现方式,还可以参考上述各个实施例,这里不再详述。
本申请实施例还提供了一种无线通信系统,该无线通信系统包括AMF和UE,该AMF和UE可以用于执行前述任一实施例(如图4、图5a至图5c或图6至图8)中的方法。
本申请实施例还提供了一种无线通信系统,该无线通信系统包括AMF和NSACF,该AMF和该NSACF可以用于执行前述任一实施例(如图5a至图5c或图6至图8)中的方法。
本申请实施例还提供了一种无线通信系统,该无线通信系统包括AMF、UE和NSACF,该AMF、UE和NSACF可以用于执行前述任一实施例(如图4、图5a至图5c或图6至图8)中的方法。
此外,本申请还提供一种计算机程序,该计算机程序用于实现本申请提供的方法中由AMF执行的操作和/或处理。
本申请还提供一种计算机程序,该计算机程序用于实现本申请提供的方法中由UE执行的操作和/或处理。
本申请还提供一种计算机可读存储介质,该计算机可读存储介质中存储有计算机代码,当计算机代码在计算机上运行时,使得计算机执行本申请提供的方法中由AMF执行的操作和/或处理。
本申请还提供一种计算机可读存储介质,该计算机可读存储介质中存储有计算机代码,当计算机代码在计算机上运行时,使得计算机执行本申请提供的方法中由UE执行的操作和/或处理。
本申请还提供一种计算机程序产品,该计算机程序产品包括计算机代码或计算机程序,当该计算机代码或计算机程序在计算机上运行时,使得本申请提供的方法中由AMF执行的操作和/或处理被执行。
本申请还提供一种计算机程序产品,该计算机程序产品包括计算机代码或计算机程序,当该计算机代码或计算机程序在计算机上运行时,使得本申请提供的方法中由UE执行的操作和/或处理被执行。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口、装置或单元的间接耦合或通信连接,也可以是电的,机械的或其它的形式连接。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本申请实施例提供的方案的技术效果。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以是两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分,或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个可读存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的可读存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (30)

  1. 一种网络切片的准入控制方法,其特征在于,所述方法包括:
    接入和移动性管理网元接收来自终端设备的注册请求消息,所述注册请求消息携带所述终端设备请求接入的网络切片的标识信息;
    在所述终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于第一阈值的情况下,所述接入和移动性管理网元向所述终端设备发送携带第一网络切片的标识信息的注册接受消息,所述第一网络切片为允许所述终端设备接入的网络切片。
  2. 根据权利要求1所述的方法,其特征在于,所述第一网络切片为所述终端设备的缺省签约网络切片。
  3. 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:
    所述接入和移动性管理网元确定允许所述终端设备接入缺省签约网络切片。
  4. 根据权利要求3所述的方法,其特征在于,所述接入和移动性管理网元确定允许所述终端设备接入缺省签约网络切片,包括:
    所述接入和移动性管理网元配置第一信息,所述第一信息用于指示当所述终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于所述第一阈值时,允许所述终端设备接入所述缺省签约网络切片;
    所述接入和移动性管理网元根据所述第一信息确定允许所述终端设备接入所述缺省签约网络切片。
  5. 根据权利要求3所述的方法,其特征在于,所述接入和移动性管理网元确定允许所述终端设备接入的缺省签约网络切片,包括:
    所述接入和移动性管理网元向统一数据管理网元发送第一请求消息;
    所述接入和移动性管理网元接收来自所述统一数据管理网元的第一响应消息,所述第一响应消息携带所述第一网络切片的标识信息以及第一指示信息,所述第一指示信息用于指示当所述终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于第一阈值时,允许所述终端设备接入所述缺省签约网络切片;
    所述接入和移动性管理网元根据所述第一指示信息确定允许所述终端设备接入所述缺省签约网络切片。
  6. 根据权利要求3所述的方法,其特征在于,所述接入和移动性管理网元确定允许所述终端设备接入缺省签约网络切片,包括:
    所述接入和移动性管理网元根据所述终端设备的签约信息确定允许所述终端设备接入所述缺省签约网络切片,其中,所述终端设备的签约信息中包括第一指示信息,所述第一指示信息用于指示当所述终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于第一阈值时,允许所述终端设备接入所述缺省签约网络切片。
  7. 根据权利要求1-6任一项所述的方法,其特征在于,接入所述第一网络切片的终端设备的数量小于第二阈值。
  8. 根据权利要求1-7任一项所述的方法,其特征在于,所述方法还包括:
    所述接入和移动性管理网元向第一网元发送第二请求消息,所述第二请求消息携带所述终端设备请求接入的网络切片中需要执行准入控制的网络切片的标识信息和缺省签约网络切片的标识信息;
    所述接入和移动性管理网元接收来自所述第一网元的第二响应消息,所述第二响应消息携带第二指示信息和第三指示信息,所述第二指示信息用于指示所述终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于所述第一阈值,所述第三指示信息用于指示所述缺省签约网络切片接入的终端设备的数量小于第二阈值。
  9. 根据权利要求8所述的方法,其特征在于,所述第二请求消息还包括第四指示信息,所述第四指示信息用于指示当所述终端请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于所述第一阈值,触发对所述缺省签约网络切片的准入控制。
  10. 根据权利要求8或9所述的方法,其特征在于,所述第二请求消息还包括第五指示信息,所述第五指示信息用于指示所述第一网元从多个所述缺省签约网络切片中确定所述第一网络切片,或者,所述第五指示信息用于指示所述第一网元仅对多个所述缺省签约网络切片中的所述第一网络切片进行终端设备计数。
  11. 根据权利要求10所述的方法,其特征在于,所述第一网络切片为多个所述缺省签约网络切片中接入终端设备的数量最少的网络切片。
  12. 根据权利要求1-7任一项所述的方法,其特征在于,所述方法还包括:
    在所述终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于所述第一阈值的情况下,所述接入和移动性管理网元向第一网元发送第三请求消息,所述第三请求消息携带所述缺省签约网络切片的标识信息;
    所述接入和移动性管理网元接收来自所述第一网元的第三响应消息,所述第三响应消息携带第三指示信息,所述第三指示信息用于指示所述缺省签约网络切片接入的终端设备的数量小于第二阈值。
  13. 根据权利要求12所述的方法,其特征在于,所述第三请求消息还包括第六指示信息,所述第六指示信息用于指示所述第一网元从多个所述缺省签约网络切片中确定所述第一网络切片,或者,所述第六指示信息用于指示所述第一网元仅对多个所述缺省签约网络切片中的所述第一网络切片进行终端设备计数。
  14. 根据权利要求13所述的方法,其特征在于,所述第一网络切片为多个所述缺省签约网络切片中接入终端设备的数量最少的网络切片。
  15. 根据权利要求1-6任一项所述的方法,其特征在于,所述第一网络切片为不需要执行准入控制的网络切片。
  16. 根据权利要求1-15任一项所述的方法,其特征在于,所述方法还包括:
    所述接入和移动性管理网元向第一网元发送订阅请求消息,所述订阅请求消息携带所述终端设备请求接入的网络切片中需要执行准入控制的网络切片的标识信息和所述终端设备的标识信息;
    所述接入和移动性管理网元接收来自所述第一网元的第一通知消息,所述第一通知消息携带第七指示信息,所述第七指示信息用于指示所述终端设备请求接入的网络切片中需要执行准入控制的网络切片中第二网络切片接入的终端设备的数量小于所述第一阈值;
    所述接入和移动性管理网元向所述终端设备发送第二通知消息,所述第二通知消息携带所述第二网络切片的标识信息。
  17. 一种通信装置,其特征在于,所述装置包括:
    收发单元,用于接收来自终端设备的注册请求消息,所述注册请求消息携带所述终端设备请求接入的网络切片的标识信息;
    所述收发单元,还用于在所述终端设备请求接入的网络切片中需要执行准入控制的网络 切片接入的终端设备的数量大于或等于第一阈值的情况下,向所述终端设备发送携带第一网络切片的标识信息的注册接受消息,所述第一网络切片为允许所述终端设备接入的网络切片,且所述第一网络切片不包含于所述终端设备请求接入的网络切片中。
  18. 根据权利要求17所述的装置,其特征在于,所述第一网络切片为所述终端设备的缺省签约网络切片。
  19. 根据权利要求17或18所述的装置,其特征在于,所述装置还包括:
    处理单元,用于确定允许所述终端设备接入缺省签约网络切片。
  20. 根据权利要求19所述的装置,其特征在于,
    所述处理单元,具体用于配置第一信息,所述第一信息用于指示当所述终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于所述第一阈值时,允许所述终端设备接入所述缺省签约网络切片;
    所述接入和移动性管理网元根据所述第一信息确定允许所述终端设备接入所述缺省签约网络切片。
  21. 根据权利要求19所述的装置,其特征在于,
    所述处理单元,用于通过所述收发单元向统一数据管理网元发送第一请求消息;以及接收来自所述统一数据管理网元的第一响应消息,所述第一响应消息携带所述第一网络切片的标识信息以及第一指示信息,所述第一指示信息用于指示当所述终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于第一阈值时,允许所述终端设备接入所述缺省签约网络切片;
    所述处理单元,还用于根据所述第一指示信息确定允许所述终端设备接入所述缺省签约网络切片。
  22. 根据权利要求19所述的装置,其特征在于,
    所述处理单元,具体用于根据所述终端设备的签约信息确定允许所述终端设备接入所述缺省签约网络切片,其中,所述终端设备的签约信息中包括第一指示信息,所述第一指示信息用于指示当所述终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于第一阈值时,允许所述终端设备接入所述缺省签约网络切片。
  23. 根据权利要求17-22任一项所述的装置,其特征在于,接入所述第一网络切片的终端设备的数量小于第二阈值。
  24. 根据权利要求17-23任一项所述的装置,其特征在于,
    所述收发单元,还用于向第一网元发送第二请求消息,所述第二请求消息携带所述终端设备请求接入的网络切片中需要执行准入控制的网络切片的标识信息和所述缺省签约网络切片的标识信息;
    以及接收来自所述第一网元的第二响应消息,所述第二响应消息携带第二指示信息和第三指示信息,所述第二指示信息用于指示所述终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于所述第一阈值,所述第三指示信息用于指示所述缺省签约网络切片接入的终端设备的数量小于第二阈值。
  25. 根据权利要求17-24任一项所述的装置,其特征在于,
    所述收发单元,还用于在所述终端设备请求接入的网络切片中需要执行准入控制的网络切片接入的终端设备的数量大于或等于所述第一阈值的情况下,向第一网元发送第三请求消息,所述第三请求消息携带缺省签约网络切片的标识信息;
    所述收发单元,还接收来自所述第一网元的第三响应消息,所述第三响应消息携带第三 指示信息,所述第三指示信息用于指示所述缺省签约网络切片接入的终端设备的数量小于第二阈值。
  26. 根据权利要求17-22任一项所述的装置,其特征在于,所述第一网络切片为不需要执行准入控制的网络切片。
  27. 根据权利要求17-26任一项所述的装置,其特征在于,
    所述收发单元,还用于向第一网元发送订阅请求消息,所述订阅请求消息携带所述终端设备请求接入的网络切片中需要执行准入控制的网络切片的标识信息和所述终端设备的标识信息;
    以及接收来自所述第一网元的第一通知消息,所述第一通知消息携带第七指示信息,所述第七指示信息用于指示所述终端设备请求接入的网络切片中需要执行准入控制的网络切片中第二网络切片接入的终端设备的数量小于所述第一阈值;
    以及向所述终端设备发送第二通知消息,所述第二通知消息携带所述第二网络切片的标识信息。
  28. 一种通信装置,其特征在于,包括处理器和存储器;
    所述处理器用于存储计算机执行指令;
    所述处理器用于执行所述计算机执行指令,以使权利要求1-16任一项所述的方法被执行。
  29. 一种通信装置,其特征在于,包括逻辑电路和接口,所述逻辑电路和接口耦合;
    所述接口用于输入和/或输出代码指令,所述逻辑电路用于执行所述代码指令,以使权利要求1-16任一项所述的方法被执行。
  30. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质用于存储计算机程序,当所述计算机程序被执行时,权利要求1-16任一项所述的方法被执行。
PCT/CN2022/079817 2021-03-29 2022-03-09 网络切片的准入控制方法及装置 WO2022206315A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP22778499.8A EP4294087A1 (en) 2021-03-29 2022-03-09 Access control method and apparatus for network slice
US18/478,983 US20240031930A1 (en) 2021-03-29 2023-09-29 Network slice admission control method and apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110336606.2A CN115134869A (zh) 2021-03-29 2021-03-29 网络切片的准入控制方法及装置
CN202110336606.2 2021-03-29

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/478,983 Continuation US20240031930A1 (en) 2021-03-29 2023-09-29 Network slice admission control method and apparatus

Publications (1)

Publication Number Publication Date
WO2022206315A1 true WO2022206315A1 (zh) 2022-10-06

Family

ID=83375446

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/079817 WO2022206315A1 (zh) 2021-03-29 2022-03-09 网络切片的准入控制方法及装置

Country Status (4)

Country Link
US (1) US20240031930A1 (zh)
EP (1) EP4294087A1 (zh)
CN (1) CN115134869A (zh)
WO (1) WO2022206315A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11817971B2 (en) 2015-11-04 2023-11-14 Futurewei Technologies, Inc. System and method for VNF termination management

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024077582A1 (en) * 2022-10-14 2024-04-18 Nokia Shanghai Bell Co., Ltd. Security counter measure for distributed network slice admission control

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109842910A (zh) * 2017-11-28 2019-06-04 中国移动通信有限公司研究院 一种网络切片的处理方法及接入网网元
WO2020064242A1 (en) * 2018-09-27 2020-04-02 British Telecommunications Public Limited Company Network slice registration management
CN110999431A (zh) * 2017-06-17 2020-04-10 Lg电子株式会社 用于在无线通信系统中注册终端的方法及其设备
WO2020250005A1 (en) * 2019-06-10 2020-12-17 Nokia Technologies Oy Method and apparatus for enforcement of maximum number of user equipments per network slice in a communication system
GB2577526B (en) * 2018-09-27 2021-02-24 British Telecomm Network slice management

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110999431A (zh) * 2017-06-17 2020-04-10 Lg电子株式会社 用于在无线通信系统中注册终端的方法及其设备
CN109842910A (zh) * 2017-11-28 2019-06-04 中国移动通信有限公司研究院 一种网络切片的处理方法及接入网网元
WO2020064242A1 (en) * 2018-09-27 2020-04-02 British Telecommunications Public Limited Company Network slice registration management
GB2577526B (en) * 2018-09-27 2021-02-24 British Telecomm Network slice management
WO2020250005A1 (en) * 2019-06-10 2020-12-17 Nokia Technologies Oy Method and apparatus for enforcement of maximum number of user equipments per network slice in a communication system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11817971B2 (en) 2015-11-04 2023-11-14 Futurewei Technologies, Inc. System and method for VNF termination management

Also Published As

Publication number Publication date
CN115134869A (zh) 2022-09-30
EP4294087A1 (en) 2023-12-20
US20240031930A1 (en) 2024-01-25

Similar Documents

Publication Publication Date Title
US11751262B2 (en) Electronic apparatus, a central node apparatus and a network side apparatus, a transmission method and a configuration method
WO2019091228A1 (zh) 通信方法和网络设备
WO2022206315A1 (zh) 网络切片的准入控制方法及装置
WO2020108002A1 (zh) 一种传输策略确定方法、策略控制方法及装置
CN115766657A (zh) 一种获取边缘服务的方法和装置
US11259362B2 (en) Method for repeatedly transmitting data and device
WO2022147720A1 (zh) 波束指示方法、装置及通信设备
US10868869B2 (en) Method, apparatus and computer program
WO2022028276A1 (zh) 业务处理方法、信息指示方法、终端和网络设备
US20220225149A1 (en) Network API Capability Reporting Method, Apparatus, and System
WO2022222817A1 (zh) 一种边缘应用服务器的选择方法及装置
WO2021227600A1 (zh) 一种网络切片控制方法及通信装置
US20220394595A1 (en) Communication method, apparatus, and system
WO2023035925A1 (zh) 一种业务处理方法、装置和系统
WO2022171119A1 (zh) 通信方法及装置
WO2021023185A1 (zh) 一种接入限制检测方法和装置
US20160073266A1 (en) Resources in a Communication System
CN114514764B (zh) 设备、方法和计算机程序
US20230379687A1 (en) Network slice local switching at a distributed unit
WO2022067769A1 (zh) 通信方法和相关设备
WO2021185303A1 (zh) 一种订阅网络事件的方法和网络功能
WO2017206031A1 (zh) 信息传输方法及装置
WO2024040411A1 (zh) 一种实现多接入的方法及其装置
WO2022236448A1 (en) A method of mbs session creation, and system and apparatus thereof
WO2023213177A1 (zh) 一种通信方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22778499

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2022778499

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2022778499

Country of ref document: EP

Effective date: 20230913

NENP Non-entry into the national phase

Ref country code: DE