WO2023133871A1 - Procédé et appareil de communication - Google Patents
Procédé et appareil de communication Download PDFInfo
- Publication number
- WO2023133871A1 WO2023133871A1 PCT/CN2022/072228 CN2022072228W WO2023133871A1 WO 2023133871 A1 WO2023133871 A1 WO 2023133871A1 CN 2022072228 W CN2022072228 W CN 2022072228W WO 2023133871 A1 WO2023133871 A1 WO 2023133871A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message
- public network
- data information
- routing rule
- network element
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 229
- 238000004891 communication Methods 0.000 title claims abstract description 145
- 230000004044 response Effects 0.000 claims description 107
- 230000008569 process Effects 0.000 claims description 63
- 238000012545 processing Methods 0.000 claims description 59
- 230000015654 memory Effects 0.000 claims description 34
- 238000004590 computer program Methods 0.000 claims description 28
- 230000005540 biological transmission Effects 0.000 abstract description 112
- 102100021087 Regulator of nonsense transcripts 2 Human genes 0.000 description 93
- 101710028540 UPF2 Proteins 0.000 description 93
- 101100042631 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) SIN3 gene Proteins 0.000 description 89
- 230000006870 function Effects 0.000 description 88
- 101000579423 Homo sapiens Regulator of nonsense transcripts 1 Proteins 0.000 description 75
- 102100028287 Regulator of nonsense transcripts 1 Human genes 0.000 description 75
- 229920006235 chlorinated polyethylene elastomer Polymers 0.000 description 45
- 101150069124 RAN1 gene Proteins 0.000 description 38
- 101100355633 Salmo salar ran gene Proteins 0.000 description 38
- 239000013256 coordination polymer Substances 0.000 description 37
- 238000010586 diagram Methods 0.000 description 24
- 101150014328 RAN2 gene Proteins 0.000 description 23
- 101001090935 Homo sapiens Regulator of nonsense transcripts 3A Proteins 0.000 description 22
- 102100035026 Regulator of nonsense transcripts 3A Human genes 0.000 description 22
- 238000005516 engineering process Methods 0.000 description 18
- 238000007726 management method Methods 0.000 description 15
- 101150074586 RAN3 gene Proteins 0.000 description 13
- 238000000136 cloud-point extraction Methods 0.000 description 10
- 238000013523 data management Methods 0.000 description 9
- 230000005577 local transmission Effects 0.000 description 8
- 238000013461 design Methods 0.000 description 6
- 230000001360 synchronised effect Effects 0.000 description 5
- 102100022887 GTP-binding nuclear protein Ran Human genes 0.000 description 4
- 101150084062 RAN gene Proteins 0.000 description 4
- 101100411667 Arabidopsis thaliana RAN4 gene Proteins 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000003190 augmentative effect Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 101150119040 Nsmf gene Proteins 0.000 description 1
- 108010072866 Prostate-Specific Antigen Proteins 0.000 description 1
- -1 UPF4 Proteins 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000012517 data analytics Methods 0.000 description 1
- 238000013144 data compression Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000013439 planning Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000001356 surgical procedure Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/12—Reselecting a serving backbone network switching or routing node
Definitions
- the embodiment of the present application relates to the communication field, and more specifically relates to a communication method and device.
- the data information in the non-public network may be local data information or cross-domain data information.
- the data information in the non-public network is cross-domain data information, the data information needs to be transmitted in different non-public networks.
- Embodiments of the present application provide a communication method and device, which can enable terminal devices in different non-public networks to complete data transmission.
- a communication method is provided, the method is applied to a public network, and the method includes: a user plane network element in the public network receives data information from a first device in a first non-public network, and the public network communicate with the first non-public network through a wireless interface; the user plane network element sends the data information to the second device in the second non-public network according to a first routing rule, wherein the first routing rule is used for Indicates the relationship between the sub-address segment of the second device and the tunnel corresponding to the second device, and the public network communicates with the second non-public network through a wireless interface.
- different non-public networks can communicate with the public network through the wireless interface, and the user plane network elements in the public network receive information from the first non-public network through the wireless interface between the public network and the first non-public network. and forward the data to the second device in the second non-public network through the wireless interface between the public network and the second non-public network, so that the terminal device in the first non-public network and the second Terminal devices in the non-public network can perform data transmission based on the public network, realizing cross-domain transmission between terminal devices in the non-public network.
- the above technical solution improves universality and flexibility, and reduces costs.
- multiple tunnels can be established between the public network and multiple non-public networks, and the user plane network element in the public network can select the corresponding tunnel to forward data to the second device in the second non-public network according to the first routing rule , which not only realizes the correct forwarding of data, but also applies to more communication scenarios.
- the method further includes: receiving, by the user plane network element, the first routing rule from a control plane network element in the public network.
- the user plane network element sends the data information to the second device according to the first routing rule, including: the address of the user plane network element according to the data information and the first routing rule, and send the data information to the second device.
- the user plane network element sending the data information to the second device in the second non-public network includes: determining that the first device belongs to a device group member In some cases, the user plane network element sends the data information to the second device in the second non-public network.
- the user plane network element determines that the first device is a member of the device group according to the attribute of the first device.
- the attribute includes one or more of the following: a subaddress segment of the first device, DNN, session type, and S-NSSAI.
- terminal devices in different non-public networks when terminal devices in different non-public networks perform cross-domain data information transmission, they can perform wireless communication through the tunnel between the devices in the non-public network established by the public network and the public network, compared with the wireless communication through the wired private network.
- the method of cross-domain transmission through the network channel improves the universality and flexibility, and reduces the cost. Compared with the method of cross-domain transmission through a third-party server, it can improve the security of data transmission.
- a communication method is provided, the method is applied to a public network, and the method includes: a control plane network element in the public network determines a target routing rule, and the target routing rule includes a first routing rule and/or a second routing rule a routing rule, the first routing rule is used to indicate the relationship between the sub-address segment of the second device in the second non-public network and the tunnel corresponding to the second device, the second routing rule is used to indicate the relationship between the second device The relationship between the sub-address segment of the public network and the tunnel corresponding to the user plane network element in the public network, wherein the communication between the public network and the second non-public network is through a wireless interface; the control plane network element sends the target route rule.
- multiple tunnels can be established between the public network and multiple non-public networks, and the user plane network element in the public network can select the corresponding tunnel to the second network element in the second non-public network according to the first routing rule.
- the device forwards data, and the device in the non-public network can also select the corresponding tunnel to forward data to the user plane network element in the public network according to the second routing rule, so as to not only realize the correct forwarding of data, but also apply to more communication Scenes.
- the target routing rule includes a first routing rule
- the sending of the target routing rule by the control plane network element includes: the control plane network element sends the user plane network element Sending the first routing rule; and/or, the target routing rule includes a second routing rule
- the control plane network element sending the target routing rule includes: the control plane network element sending the first device in the first non-public network
- the second routing rule is sent, wherein the public network communicates with the first non-public network through a wireless interface.
- the control plane network element in the public network determines the target routing rule, including: the control plane network element according to the identifiers of the multiple devices and the addresses of the multiple devices The relationship between the segments is used to determine the target routing rule, wherein the multiple devices include the first device and the second device.
- the method further includes: the control plane network element receives N1 messages from multiple devices, The N1 message includes an N2 message, the N2 message is used to establish a wireless connection on the N2 interface, and the multiple devices include the first device and the second device; the control plane network element sends a response message to the N1 message to the multiple devices , the response message of the N1 message includes a response message of the N2 message, and the response message of the N2 message is used to indicate that the wireless connection of the N2 interface is successfully established.
- the N1 message further includes first indication information, where the first indication information is used to indicate to process the N2 message.
- the wireless communication between each non-public network and the public network can be completed through a wireless interface.
- wireless communication can be performed through the tunnel between the devices in the non-public network established by the public network and the public network.
- the way of cross-domain transmission through channels improves the universality and flexibility, and reduces the cost. Compared with the way of cross-domain transmission through third-party servers, it can improve the security of data transmission.
- a communication method is provided, the method is applied to a first non-public network, and the method includes: a first device in the first non-public network determines to send data to a second device in a second non-public network Information; the first device in the first non-public network sends the data information to the user plane network element in the public network; wherein, the first non-public network communicates with the public network through a wireless interface, and the public network and The second non-public network communicates through a wireless interface.
- terminal devices in different non-public networks transmit cross-domain data information
- they can communicate with public networks through wireless interfaces.
- sending the data information by the first device in the first non-public network to the user plane network element in the public network includes: the first device sends the data information according to the second route A rule for sending the data information to the user plane network element, wherein the second routing rule is used to indicate the relationship between the sub-address segment of the second device and the tunnel corresponding to the user plane network element in the public network.
- the method further includes: the first device receiving the second routing rule from a control plane network element in the public network.
- the first device sends the data information to the user plane network element according to the second routing rule, including: the first device sends the data information to the user plane network element according to the address and The second routing rule sends the data information to the user plane network element.
- the method before the first device in the first non-public network sends the data information to the user plane network element in the public network, the method further includes: the first The device sends an N1 message to the control plane network element in the public network, the N1 message includes an N2 message, and the N2 message is used to establish a wireless connection on the N2 interface; the first device receives the N1 message from the control plane network element A response message, the response message of the N1 message includes a response message of the N2 message, and the response message of the N2 message is used to indicate that the connection of the N2 interface is successfully established.
- the N1 message further includes first indication information, where the first indication information is used to indicate to process the N2 message.
- the wireless communication between each non-public network and the public network can be completed through a wireless interface.
- terminal devices in different non-public networks perform cross-domain data information transmission, they can communicate wirelessly through the tunnel between the devices in the non-public network established by the public network and the public network, compared with the cross-domain communication through wired private network channels.
- the way of transmission improves the universality and flexibility, and reduces the cost. Compared with the way of cross-domain transmission through third-party servers, it can improve the security of data transmission.
- a communication method is provided, the method is applied to a public network, and the method includes: a control plane network element of the public network receives an N1 message from a plurality of devices, the N1 message includes an N2 message, and the N2 message uses For establishing a wireless connection of the N2 interface, the multiple devices include a first device in the first non-public network and a second device in the second non-public network; the control plane network element sends the N1 message to the multiple devices A response message, the response message of the N1 message includes a response message of the N2 message, and the response message of the N2 message is used to indicate that the wireless connection of the N2 interface is successfully established.
- the N2 wireless interface connection between the non-public network and the public network can be established, so that the non-public network and the public network can communicate through the wireless interface, and subsequent terminal devices in different non-public networks perform cross-domain When data information is transmitted, it can also have the characteristics of strong universality, more flexibility, safety and low cost.
- the N1 message further includes first indication information, where the first indication information is used to indicate to process the N2 message.
- a communication method is provided, the method is applied to a first non-public network, and the method includes: a first device in the first non-public network sends an N1 message to a control plane network element in a public network, the The N1 message includes an N2 message, and the N2 message is used to establish a wireless connection on the N2 interface; the first device receives a response message of the N1 message from the control plane network element, and the response message of the N1 message includes a response message of the N2 message , the response message of the N2 message is used to indicate that the wireless connection of the N2 interface is successfully established.
- the N2 wireless interface connection between the non-public network and the public network can be established, so that the non-public network and the public network can communicate through the wireless interface, and subsequent terminal devices in different non-public networks perform cross-domain When data information is transmitted, it can also have the characteristics of strong universality, more flexibility, safety and low cost.
- the N1 message further includes first indication information, where the first indication information is used to indicate to process the N2 message.
- a communication device is provided, the device is applied to a public network, and the device includes: a transceiver unit and a processing unit, the transceiver unit is configured to receive data information from a first device in a first non-public network, The public network and the first non-public network communicate through a wireless interface; the processing unit is configured to determine a first routing rule, wherein the first routing rule is used to indicate the second device in the second non-public network The relationship between the sub-address segment and the tunnel corresponding to the second device; the transceiver unit is also used to send the data information to the second device according to the first routing rule, the public network and the second non-public network communicate through the wireless interface.
- the transceiving unit is configured to receive the first routing rule from a control plane network element in the public network.
- the transceiving unit is configured to send the data information to the second device according to the address of the data information and the first routing rule.
- the transceiving unit is configured to send the data information to the second device when it is determined that the first device belongs to a device group member.
- the processing unit is configured to determine that the first device is a member of the device group according to the attribute of the first device.
- the attribute includes one or more of the following: the subaddress segment of the first device, DNN, session type, and S-NSSAI.
- a communication device which is applied to a public network, and the device includes: a transceiver unit and a processing unit, the processing unit is configured to determine a target routing rule, and the target routing rule includes a first routing rule and/or or a second routing rule, the first routing rule is used to indicate the relationship between the sub-address segment of the second device in the second non-public network and the tunnel corresponding to the second device, the second routing rule is used to indicate the The relationship between the sub-address segment of the second device and the tunnel corresponding to the user plane network element in the public network, wherein the communication between the public network and the second non-public network is through a wireless interface; the transceiver unit is used for Send the destination routing rule.
- the transceiving unit is configured to send the first routing rule to the user plane network element; and/or, the transceiving unit is also configured to send the first routing rule to the first non- The first device in the public network sends the second routing rule, where the public network communicates with the first non-public network through a wireless interface.
- the processing unit is configured to determine the target routing rule according to the relationship between identifiers of multiple devices and address segments of the multiple devices, where the A plurality of devices includes the first device and the second device.
- the apparatus before the processing unit is configured to determine the target routing rule, the apparatus further includes: the transceiver unit, configured to receive N1 messages from multiple devices, the N1 The message includes an N2 message, and the N2 message is used to establish a wireless connection of the N2 interface, and the multiple devices include the first device and the second device; the transceiver unit is also used to send a response message to the N1 message to the multiple devices , the response message of the N1 message includes a response message of the N2 message, and the response message of the N2 message is used to indicate that the wireless connection of the N2 interface is successfully established.
- the transceiver unit configured to receive N1 messages from multiple devices, the N1 The message includes an N2 message, and the N2 message is used to establish a wireless connection of the N2 interface, and the multiple devices include the first device and the second device; the transceiver unit is also used to send a response message to the N1 message to the multiple devices , the response message of the N1 message includes a response message of the N
- the N1 message further includes first indication information, where the first indication information is used to indicate to process the N2 message.
- a communication device which is applied to a first non-public network, and the device includes: a transceiver unit and a processing unit, where the processing unit is configured to determine to send a message to a second device in a second non-public network Data information; the transceiver unit is configured to send the data information to the user plane network element in the public network; wherein, the first non-public network communicates with the public network through a wireless interface, and the public network and the second non-public network The public network communicates through the wireless interface.
- the transceiver unit is configured to send the data information to the user plane network element according to a second routing rule, where the second routing rule is used to indicate that the The relationship between the sub-address segment of the second device and the tunnel corresponding to the user plane network element in the public network.
- the transceiving unit is configured to receive the second routing rule from the control plane network element in the public network.
- the transceiving unit is configured to send the data information to the user plane network element according to the address of the data information and the second routing rule.
- the device before the transceiver unit is configured to send the data information to the user plane network element in the public network, the device further includes: the transceiver unit is also configured to send The control plane network element in the public network sends an N1 message, the N1 message includes an N2 message, and the N2 message is used to establish a wireless connection on the N2 interface; the transceiver unit is also used to receive the N1 message from the control plane network element The response message of the N1 message includes the response message of the N2 message, and the response message of the N2 message is used to indicate that the connection of the N2 interface is successfully established.
- the N1 message further includes first indication information, where the first indication information is used to indicate to process the N2 message.
- a communication device which is applied to a public network, and the device includes: a transceiver unit and a processing unit, the transceiver unit is configured to receive N1 messages from multiple devices, the N1 messages include N2 messages, The N2 message is used to establish a wireless connection of the N2 interface, and the multiple devices include a first device in the first non-public network and a second device in the second non-public network; the processing unit is configured to process the N1 message, Generate a response message to the N1 message; the transceiver unit is further configured to send a response message to the N1 message to the plurality of devices, the response message to the N1 message includes a response message to the N2 message, and the response message to the N2 message is used for Indicates that the wireless connection of the N2 interface is successfully established.
- the N1 message further includes first indication information, where the first indication information is used to indicate to process the N2 message.
- a communication device is provided, the device is applied to a first non-public network, and the device includes: a transceiver unit and a processing unit, the processing unit is used to generate an N1 message; the transceiver unit is used to send a message to the public network
- the control plane network element in the network sends the N1 message, the N1 message includes an N2 message, and the N2 message is used to establish a wireless connection on the N2 interface;
- the transceiver unit is also used to receive a response to the N1 message from the control plane network element message, the response message of the N1 message includes a response message of the N2 message, and the response message of the N2 message is used to indicate that the wireless connection of the N2 interface is successfully established;
- the processing unit is also used to process the response message of the N1 message.
- the N1 message further includes first indication information, where the first indication information is used to indicate to process the N2 message.
- a communication device in an eleventh aspect, includes: at least one processor, configured to execute a computer program or instruction stored in a memory, so as to perform the method in any possible implementation manner of the first aspect to the sixth aspect above .
- the apparatus further includes a memory for storing computer programs or instructions.
- the device further includes a communication interface, through which the processor reads the computer program or instructions stored in the memory.
- the device is a core network element.
- the device is a chip, a chip system or a circuit for a core network element.
- the present application provides a processor configured to execute the method provided in the foregoing aspects.
- the processor's output and reception, input and other operations can also be understood as the sending and receiving operations performed by the radio frequency circuit and the antenna, which is not limited in this application.
- a computer-readable storage medium stores program code for execution by a device, and the program code includes any one of the possible implementation manners for executing the first aspect to the sixth aspect above Methods.
- a computer program product including instructions is provided, and when the computer program product is run on a computer, the computer executes the method in any possible implementation manner of the first aspect to the sixth aspect above.
- FIG. 1 is a schematic diagram of a network architecture applied to an embodiment of the present application.
- Fig. 2 is a schematic diagram of another network architecture applied to the embodiment of the present application.
- Fig. 3 is a schematic diagram of another network architecture applied to the embodiment of the present application.
- Fig. 4 is a schematic scene diagram of a communication method provided according to an embodiment of the present application.
- Fig. 5 is a schematic scene diagram of a communication method provided according to another embodiment of the present application.
- Fig. 6 is a schematic scene diagram of a communication method provided according to another embodiment of the present application.
- Fig. 7 is a schematic scene diagram of a communication method provided according to another embodiment of the present application.
- Fig. 8 is a schematic scene diagram of a communication method provided according to another embodiment of the present application.
- Fig. 9 is a schematic architecture diagram of a communication method provided according to an embodiment of the present application.
- Fig. 10 is a schematic diagram of a communication method provided according to an embodiment of the present application.
- Fig. 11 is a schematic flowchart of a communication method provided according to an embodiment of the present application.
- Fig. 12 is a schematic flowchart of a communication method provided according to another embodiment of the present application.
- Fig. 13 is a schematic flowchart of a communication method provided according to another embodiment of the present application.
- Fig. 14 is a schematic flowchart of a communication method provided according to another embodiment of the present application.
- Fig. 15 is a schematic block diagram of a communication device provided by an embodiment of the present application.
- Fig. 16 is a schematic block diagram of another communication device provided by an embodiment of the present application.
- the technical solutions of the embodiments of the present application can be applied to various communication systems, such as: fifth generation (5th generation, 5G) or new radio (new radio, NR) system, long term evolution (long term evolution, LTE) system, LTE frequency Division duplex (frequency division duplex, FDD) system, LTE time division duplex (time division duplex, TDD) system, etc.
- 5G fifth generation
- NR new radio
- long term evolution long term evolution
- LTE frequency Division duplex frequency division duplex
- FDD frequency division duplex
- TDD time division duplex
- the technical solution provided by this application can also be applied to future communication systems, such as the sixth generation mobile communication system.
- the technical solution provided by this application can also be applied to device to device (device to device, D2D) communication, vehicle to everything (vehicle-to-everything, V2X) communication, machine to machine (machine to machine, M2M) communication, machine type Communication (machine type communication, MTC), and Internet of things (internet of things, IoT) communication system or other communication systems.
- D2D device to device
- V2X vehicle-to-everything
- M2M machine to machine
- M2M machine type Communication
- MTC machine type communication
- IoT Internet of things
- FIG. 1 the network architecture applicable to the embodiment of the present application is briefly introduced in conjunction with FIG. 1 , as follows.
- the network architecture takes the 5G system (the 5th generation system, 5GS) as an example.
- the network architecture may include but not limited to: access and mobility management function (access and mobility management function, AMF), unified data management (unified data management, UDM), radio access network (radio access network, RAN), policy Control function (policy control function, PCF), user equipment (user equipment, UE), user plane function (user plane function, UPF), data network (data network, DN), authentication service function (authentication server function, AUSF) , network slice selection function (network slice selection function, NSSF), application function (application function, AF), session management function (session management function, SMF) and so on.
- access and mobility management function access and mobility management function, AMF
- unified data management unified data management
- UDM radio access network
- policy Control function policy control function
- PCF policy control function
- user equipment user equipment
- UE user plane function
- UPF data network
- data network data network
- DN authentication service function
- authentication server function authentication server
- UE can be called terminal equipment, access terminal, subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user device.
- a terminal device may be a device that provides voice/data to a user, for example, a handheld device with a wireless connection function, a vehicle-mounted device, and the like.
- some terminals are: mobile phone (mobile phone), tablet computer, notebook computer, palmtop computer, mobile internet device (mobile internet device, MID), wearable device, virtual reality (virtual reality, VR) device, augmented reality (augmented reality, AR) equipment, wireless terminals in industrial control, wireless terminals in self driving, wireless terminals in remote medical surgery, smart grid Wireless terminals in transportation safety, wireless terminals in smart city, wireless terminals in smart home, cellular phones, cordless phones, session initiation protocol , SIP) phones, wireless local loop (wireless local loop, WLL) stations, personal digital assistants (personal digital assistant, PDA), handheld devices with wireless communication capabilities, computing devices or other processing devices connected to wireless modems, Wearable devices, terminal devices in a 5G network, or terminal devices in a future evolving public land mobile network (PLMN), etc., are not limited in this
- the terminal device may also be a wearable device.
- Wearable devices can also be called wearable smart devices, which is a general term for the application of wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes.
- a wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable devices are not only a hardware device, but also achieve powerful functions through software support, data interaction, and cloud interaction.
- Generalized wearable smart devices include full-featured, large-sized, complete or partial functions without relying on smart phones, such as smart watches or smart glasses, etc., and only focus on a certain type of application functions, and need to cooperate with other devices such as smart phones Use, such as various smart bracelets and smart jewelry for physical sign monitoring.
- the terminal device can also be the terminal device in the IoT system.
- IoT is an important part of the development of information technology in the future. Its main technical feature is to connect items to the network through communication technology, so as to realize Interconnection, an intelligent network that interconnects things.
- a certain air interface technology such as NR or LTE technology
- a certain air interface technology may also be used to communicate with each other between terminal devices.
- the device for realizing the function of the terminal device may be the terminal device, or may be a device capable of supporting the terminal device to realize the function, such as a chip system or a chip, and the device may be installed in the terminal device.
- the system-on-a-chip may be composed of chips, or may include chips and other discrete devices.
- RAN It can provide authorized users in a specific area with the function of accessing the communication network. Specifically, it can include wireless network equipment in the 3rd generation partnership project (3rd generation partnership project, 3GPP) network, and can also include non-3GPP (non-3GPP ) access point in the network. For the convenience of description, the RAN device is used below.
- 3rd generation partnership project 3rd generation partnership project, 3GPP
- non-3GPP non-3GPP
- RAN equipment may adopt different radio access technologies.
- 3GPP access technologies for example, wireless access technologies used in third generation (3rd generation, 3G), fourth generation (4th generation, 4G) or 5G systems
- non- 3GPP (non-3GPP) access technology refers to the access technology that complies with the 3GPP standard specifications.
- the access network equipment in the 5G system is called the next generation Node Base station (gNB) or RAN equipment.
- Non-3GPP access technologies may include air interface technology represented by access point (AP) in wireless fidelity (WiFi), worldwide interoperability for microwave access (WiMAX), code Multiple access (code division multiple access, CDMA), etc.
- the RAN device may allow non-3GPP technology interconnection and intercommunication between the terminal device and the 3GPP core network.
- the RAN device can be responsible for functions such as radio resource management, quality of service (QoS) management, data compression and encryption on the air interface side.
- QoS quality of service
- the RAN equipment provides access services for the terminal equipment, and then completes the forwarding of control signals and user data between the terminal equipment and the core network.
- RAN equipment may include but not limited to: macro base station, micro base station (also called small station), radio network controller (radio network controller, RNC), node B (Node B, NB), base station controller (base station controller) , BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved NodeB, or home Node B, HNB), baseband unit (baseband unit, BBU), AP in WiFi system, wireless relay Node, wireless backhaul node, transmission point (transmission point, TP) or transmission and reception point (transmission and reception point, TRP), etc., can also be gNB or transmission point (TRP or TP) in the 5G (eg, NR) system , one or a group (including multiple antenna panels) antenna panels of a base station in a 5G system, or it can also be a network node that constitutes a gNB or a transmission point, such as a distributed unit (DU), or a next-generation communication Base stations
- AMF mainly used for functions such as access control, mobility management, attachment and detachment.
- SMF mainly used for user plane network element selection, user plane network element redirection, Internet protocol (internet protocol, IP) address allocation for terminal equipment, session establishment, modification and release, and QoS control.
- IP Internet protocol
- UPF mainly used for receiving and forwarding user plane data.
- the UPF can receive user plane data from the DN, and send the user plane data to the terminal device through the AN device.
- UPF can also receive user plane data from terminal equipment through AN equipment and forward it to DN.
- PCF A unified policy framework mainly used to guide network behavior, and provide policy rule information for control plane network elements (such as AMF, SMF, etc.).
- AF It is mainly used to provide services to the 3GPP network, such as interacting with the PCF for policy control.
- the AF may be a third-party functional entity, or an application service deployed by an operator, such as an IP multimedia subsystem (IP multimedia subsystem, IMS) voice call service.
- IP multimedia subsystem IP multimedia subsystem
- IMS IP multimedia subsystem
- a multi-access edge computing (MEC) platform or an application server can serve as an AF to communicate with the 5G core network.
- MEC multi-access edge computing
- UDM mainly used for UE subscription data management, including storage and management of UE ID, UE access authorization, etc.
- DN mainly used for the operator's network that provides data services for the UE.
- the Internet Internet
- a third-party service network IP multimedia service (IP multi-media service, IMS) network, and the like.
- IP multimedia service IP multi-media service, IMS
- AUSF mainly used for user authentication, etc.
- NSSF It is mainly used to determine the network slice instance that the UE is allowed to access according to the slice selection auxiliary information and subscription information of the UE.
- network elements can communicate through the interfaces shown in the figure.
- the UE and the AMF can communicate through the N1 interface.
- the RAN and AMF can communicate through the N2 interface.
- Communication between RAN and UPF can be carried out through N3 interface.
- the SMF and UPF can communicate through the N4 interface.
- the relationship between other interfaces and each network element is shown in FIG. 1 , and for the sake of brevity, details are not described here one by one.
- the UE and the AF have established an application layer connection.
- the AF is a video server
- the application layer connection established between the UE and the AF is used for the UE to request the AF to play a VR video.
- the application layer connection between the UE and the AF can be sent through the PDU session established by the UE on the 5G network, that is, the UE uses the IP address corresponding to the PDU session to communicate with the AF.
- the network element communicating with the 5G core network and the video server are the same network element, but in actual deployment, they may also be different network elements, and this application does not make any limitation on this.
- FIG. 2 shows a schematic diagram of another network architecture applied to this embodiment of the present application.
- the network architecture may include but not limited to: UE, RAN, UPF, DN, AUSF, AMF, SMF, network data analysis function (network data analytics function, NWDAF), NSSF, capability exposure function (network exposure function, NEF), network storage function (network repository function, NRF), PCF, UDM, AF, etc.
- NWDAF is a data-aware analysis network element, which automatically perceives and analyzes the network based on network data, and participates in the whole life cycle of network planning, construction, operation and maintenance, network optimization, and operation, making the network easy to maintain and control, and improving Efficient use of network resources to improve user experience.
- NWDAF collects information such as user connection management, mobility management, session management, and access services, and uses reliable analysis and prediction models to evaluate and analyze different types of users, build user profiles, and determine user movement trajectories and services Use habits, predict user behavior, and optimize user mobility management parameters and radio resource management parameters based on analysis and prediction data.
- NRF can also be called a network storage device, a network storage function network element, or a network storage function entity): it is mainly used to support the service discovery function.
- a network element discovery request is received from a network element function or a service communication proxy (SCP), and the network element discovery request information may be fed back.
- SCP service communication proxy
- the NRF is also responsible for maintaining information about available network functions and the services they each support. It can also be understood as a network storage device.
- the discovery process is a process in which the required network element function (network function, NF) realizes the addressing process of a specific NF or a specific service with the help of NRF, and the NRF provides the IP address or fully qualified domain name (fully qualified domain name) of the corresponding NF instance or NF service instance , FQDN) or uniform resource identifier (unified resource identifier, URI).
- NRF can also realize the discovery process across PLMNs by providing network identification (such as PLMN ID).
- PLMN ID network identification
- each network element needs to be registered in the NRF, and some network element functions can be registered in the NRF when running for the first time.
- the network storage function device may be a core network device.
- NEF can also be called network opening equipment, network opening function entity, network opening function network element, network capability opening function entity, network capability opening function equipment, network capability opening function network element, network capability opening equipment, etc.): mainly used to support Opening of capabilities and events, such as for safely opening services and capabilities provided by 3GPP network functions to the outside.
- the communication between some network elements in Figure 2 is the same as that in Figure 1.
- the UE communicates with the AMF through the N1 interface
- the RAN communicates with the AMF through the N2 interface
- the RAN communicates with the UPF through the N3 interface
- the UPF communicates with the SMF through the N4 interface.
- the UPF communicates with the DN through the N6 interface.
- control plane functions such as AMF, SMF, PCF, UDM, NSSF, AF, and AUSF can interact not only through the interface shown in Figure 1, but also through the service interface shown in Figure 2.
- the service interface provided by AMF may be Namf.
- the service interface provided by the SMF may be Nsmf.
- the service interface provided by the PCF may be Npcf.
- the service interface provided by UDM can be Nudm.
- the service interface provided by NSSF can be Nnssf.
- the service interface provided by AF can be Naf.
- the service interface provided by AUSF can be Nausf.
- the network elements in Fig. 2 can also use the service interface to interact.
- the service interface provided by the NEF may be Nnef.
- the service interface provided by the NRF may be Nnrf.
- the service interface provided by NWDAF can be Nnwdaf.
- Figure 3 shows a schematic diagram of another network architecture applied to the embodiment of the present application
- the network architecture takes a non-3GPP system as an example.
- the trusted non-3GPP access network equipment can directly access the local public land mobile network (home public land mobile network, HPLMN)
- the untrusted non-3GPP access network equipment can communicate with the HPLMN through the security tunnel established by the security gateway.
- the security gateway may be an evolved packet data gateway (EPDG) or a non-3GPP interworking function (N3IWF) network element.
- EPDG evolved packet data gateway
- N3IWF non-3GPP interworking function
- the UE can access the local public land mobile network (home public land mobile network, HPLMN) through the 3GPP access network equipment, or access the HPLMN through the security tunnel established by the untrusted non-3GPP access network equipment and the security gateway, for example :
- HPLMN home public land mobile network
- the UE can establish communication with the AMF through the N1 interface.
- AMF communicates with SMF through N11 interface
- SMF communicates with UPF through N4 interface
- UPF communicates with DN through N6 interface.
- Communication among other devices in Fig. 3 is as follows: 3GPP access network devices communicate with UPF through N3 interface, and communicate with AMF through N2 interface.
- N3IWF communicates with AMF through N2 interface, communicates with UPF through N3 interface, communicates with untrusted non-3GPP access network equipment through Y2 interface, and communicates with UE equipment through NWu.
- the UE communicates with untrusted non-3GPP access network equipment through the Y1 interface.
- the present application is not limited to the system architecture shown in FIG. 3 , and the communication system to which the communication method of the present application can be applied may include more or less devices or network elements. In addition to interacting with untrusted non-3GPP access network equipment, it can also interact with other equipment or network elements.
- the devices or network elements in FIG. 3 may be hardware, or functionally divided software, or a combination of the above two.
- FIGS. 1 to 3 are only illustrative, and the network architecture applicable to the embodiments of the present application is not limited thereto. Any network architecture capable of realizing the functions of the above-mentioned network elements is applicable to Example of this application.
- network elements shown in Figures 1 to 3 can be understood as network elements for implementing different functions, for example Network slices can be combined on demand.
- These network elements can be independent devices, or can be integrated in the same device to achieve different functions, or can be network elements in hardware devices, or software functions running on dedicated hardware, or platforms (for example, cloud The virtualization function instantiated on the platform), this application does not limit the specific form of the above network elements.
- non-public network non-public network, NPN.
- NPN can include two types according to whether the core network is independent: independent non-public network (standalone non-public network, SNPN) and public network integrated non-public network (public network integrated non-public network, PNI-NPN).
- independent non-public network standalone non-public network
- PNI-NPN public network integrated non-public network
- the network does not depend on the PLMN network and is operated by the operator of the SNPN.
- PNI-NPN The network partially depends on the PLMN network and is operated by traditional operators.
- PNI-NPN can be further divided into two types: (1) closed access group (closed access group, CAG), this type of non-public network is part of the public network PLMN network, only for specific services/users Services; (2) Slicing, utilizing the slicing characteristics defined by 5G to use dedicated slices to provide services for specific services/users.
- CAG closed access group
- 5G dedicated slices
- local area network (5G-local area network, LAN).
- a LAN can be a communication network that connects various devices within a local geographic area to allow users to communicate with each other and share computing resources such as printers and storage devices.
- the above-mentioned partial geographic range can be a family, a school, a company, or a government department, etc., and various devices can be computers, external devices, and databases, etc. No limit.
- AF network elements can be grouped based on the configured attributes of each UE, which include but not limited to: session type, data network name (data network name, DNN) and single-network slice selection support information (single-network slice selection assistance information, S-NSSAI).
- the PCF network element can update some parameters in each attribute through the UCU process.
- Each UE group uses a Generic Public Subscription Identifier (Generic Public Subscription Identifier, GPSI) as unique identification information.
- GPSI Generic Public Subscription Identifier
- the UPF network element can provide local routing information of each UE group.
- the ways that UPF network elements provide local routing information include but are not limited to: (1) N6 mode, that is, to transmit data information to DN; (2) N19 mode, that is, data information Direct forwarding between session anchors (protocol data unit session anchor, PSA) without passing through DN; (3) local switch (local switch) mode, that is, data information is directly forwarded within a single PSA without passing through DN.
- FIG. 4 is a schematic scene diagram of a communication method provided according to an embodiment of the present application.
- the first non-public network includes: terminal devices (such as UE1, UE2, UE3), the first device, and DN1
- the second non-public network includes terminal devices (such as UE4, UE5, UE6), the second The device, and DN2, perform data transmission between the first non-public network and the second non-public network through a wired dedicated network channel and/or a third-party server.
- the first device or the second device may be a device including one or more network elements, for example, the first device or the second device includes RAN and UPF, and the RAN and UPF send the service data from the terminal device to the DN, and then Complete business data transmission within the non-public network.
- the DN1 of the first non-public network sends the service data to the DN2, so as to complete the data transmission between the first non-public network and the second non-public network.
- DN2 sends the received service data to the second device, and the second device sends the received service data to terminal devices (such as UE4, UE5, UE6) in the second non-public network, so that the The terminal device can process the cross-domain service data from the first non-public network.
- the wired private network channel is to connect non-public networks from different local area networks through wired methods. This method has weak universality, poor flexibility and high cost.
- a third-party server such as a public cloud, can indirectly implement data transmission between UE devices in different local area networks, but this method has poor security.
- the present application provides a communication method. Through this method, the present application can enable the data transmission of terminal devices in different local area networks to ensure the security of data information, and at the same time have strong universality, excellent flexibility and The characteristics of low cost.
- the public network can establish a group of devices in the non-public network, such as being recorded as a LAN group, and the members of the LAN group can communicate wirelessly through the tunnel established by the public network, thereby realizing Data transmission from end devices.
- the division of LAN groups may be based on the attributes of each device in the non-public network.
- the public network can divide LAN groups according to DNN, session type, and S-NSSAI.
- the public network may divide LAN groups according to the address segments of each device. The embodiment of the present application does not limit this.
- one LAN group corresponds to one address segment, that is, in the same LAN group, the address segments of each device are the same, for example, if the address segment corresponding to a LAN group is 192.168.0.0/16, it belongs to The address segment of all devices in this LAN group is 192.168.0.0/16.
- Fig. 5 is a schematic scene diagram of a communication method provided according to another embodiment of the present application.
- three non-public networks are taken as an example, which are recorded as a first non-public network, a second non-public network, and a third non-public network.
- the devices in the first non-public network are marked as the first device, DN1, UE1, and the coverage of the first device includes coverage area 1;
- the devices in the second non-public network are marked as the second device, DN2, UE2,
- the coverage of the second device includes the coverage area 2;
- the devices in the third non-public network are denoted as the third device, DN3, UE3, and the coverage of the third device includes the coverage area 3.
- the devices (such as the first device, the second device, and the third device) in each non-public network may be devices including physical function modules, or devices including logical function modules.
- network elements such as RAN, UPF, and customer premise equipment (customer premise equipment, CPE) can be deployed as physical function modules/logic function modules in devices in each non-public network.
- CPE customer premise equipment
- network elements such as CPE1, RAN1, and UPF1 can be deployed in the first device as physical functional modules. At this time, CPE1 and RAN1 communicate through the Nx interface, CPE1 and UPF1 communicate through the Ny interface, and RAN1 and UPF1 communicate through the Ny interface. N3* interface communication.
- network elements such as CPE1, RAN1, and UPF1 can be deployed in the first device as logic function modules. At this time, CPE1 and RAN1 communicate through the internal interface Nx, and CPE1 and UPF1 communicate through the internal interface Ny. RAN1 and UPF1 Communicate between them through the internal interface N3*.
- Network elements such as CPE2, RAN2, and UPF2 can also be deployed in the second device as physical function modules/logical function modules, and network elements such as CPE3, RAN3, and UPF3 can also be deployed in the third device as physical function modules/logical function modules.
- the interface communication between the network elements of the second device and the third device is similar to that of the first device, and will not be repeated here.
- the first device, the second device, and the third device form a group of two, and the public network in a LAN group establishes a tunnel between each device and the public network. At this time, each device corresponds to two public network tunnel. Combining with several possible situations, the following describes the manner in which devices in a LAN group perform wireless communication through a public network tunnel.
- UE1 can send cross-domain data information to RAN1, RAN1 sends the data information to UPF1, UPF1 sends the data information to CPE1, and CPE1 transmits the data information through the first
- the tunnel corresponding to the group of a device and the second device sends the data information to the public network
- the public network sends the data information to CPE2 through the tunnel established between the second device and the public network
- CPE2 sends the received data information to UPF2
- UPF2 sends the data information to RAN2
- RAN2 sends the data information to UE2, thereby completing the cross-domain data information transmission between UE1 and UE2.
- UE1 can send cross-domain data information to RAN1, RAN1 sends the data information to UPF1, UPF1 sends the data information to CPE1, and CPE1 passes the The tunnel corresponding to the group of a device and the third device sends the data information to the public network, and the public network sends the data information to CPE3 through the tunnel established between the third device and the public network, and CPE3 sends the received data information to UPF3 , UPF3 sends the data information to RAN3, and RAN3 sends the data information to UE3, thereby completing the cross-domain data information transmission between UE1 and UE3.
- UE2 can send cross-domain data information to RAN2, RAN2 sends the data information to UPF2, UPF2 sends the data information to CPE2, and CPE2 passes the The tunnel corresponding to the group of the second device and the third device sends the data information to the public network, and the public network sends the data information to CPE3 through the tunnel established between the third device and the public network, and CPE3 sends the received data information to UPF3 , UPF3 sends the data information to RAN3, and RAN3 sends the data information to UE3, thereby completing the cross-domain data information transmission between UE2 and UE3.
- wireless communication between UEs in different non-public networks can be realized by establishing wireless interface connections between the public network and multiple non-public networks.
- CPEs of multiple devices receive radio interface connection requests from RANs and forward the requests to the public network, thereby establishing a connection between the public network and multiple non-public networks.
- the multiple devices include a first device, a second device, and a third device.
- local data information transmission can also be performed in a non-public network.
- the UE may send local data information to the RAN, and the RAN sends the received data information to the UPF, and the UPF sends the data information to the DN.
- the UE1 may send local data information to the RAN, and the RAN sends the received data information to the UPF, and the UPF sends the data information to the DN.
- the local data information may be sent to RAN1, RAN1 sends the received data information to UPF1, and UPF1 sends the data information to DN1, thereby completing the transmission of local data information in the first non-public network.
- DNs in different non-public networks can also communicate wirelessly through the tunnel of the public network.
- DN1 in the first non-public network sends data information to CPE1, and CPE1 can send the data information to CPE2 through the tunnel established in the public network, and then CPE2 sends the data information to the second non-public network.
- the specific forwarding process is similar to the above situation, and will not be carried out here repeat.
- the devices in the non-public network established by the public network such as the first device, the second device, and the For example, the tunnel between the third device
- the public network such as the first device, the second device, and the For example, the tunnel between the third device
- the way that the third-party server performs cross-domain transmission can improve the security of data transmission.
- Fig. 6 is a schematic scene diagram of a communication method provided according to another embodiment of the present application.
- taking three non-public networks as an example they are recorded as a first non-public network, a second non-public network, and a third non-public network.
- the devices in the first non-public network are marked as the first device, DN1, UE1, and the coverage of the first device includes coverage area 1;
- the devices in the second non-public network are marked as the second device, DN2, UE2,
- the coverage of the second device includes the coverage area 2;
- the devices in the third non-public network are denoted as the third device, DN3, UE3, and the coverage of the third device includes the coverage area 3.
- the devices (such as the first device, the second device, and the third device) in each non-public network may be devices including physical function modules, or devices including logical function modules.
- network elements such as RAN, UPF, and CPE may be deployed as physical function modules/logic function modules in devices in each non-public network.
- network elements such as CPE1, RAN1, and UPF1 can be deployed in the first device as physical functional modules. At this time, CPE1 and RAN1 communicate through the Nx interface, CPE1 and UPF1 communicate through the Ny interface, and RAN1 and UPF1 communicate through the Ny interface. N3* interface communication.
- network elements such as CPE1, RAN1, and UPF1 can be deployed in the first device as logic function modules. At this time, CPE1 and RAN1 communicate through the internal interface Nx, and CPE1 and UPF1 communicate through the internal interface Ny. RAN1 and UPF1 Communicate between them through the internal interface N3*.
- Network elements such as CPE2, RAN2, and UPF2 can also be deployed in the second device as physical function modules/logical function modules, and network elements such as CPE3, RAN3, and UPF3 can also be deployed in the third device as physical function modules/logical function modules.
- the interface communication between the network elements of the second device and the third device is similar to that of the first device, and will not be repeated here.
- the first device, the second device, and the third device are in the same group, and the public network in a LAN group establishes a tunnel between each device and the public network. At this time, each device corresponds to a public network tunnel. Combining with several possible situations, the following describes the manner in which devices in a LAN group perform wireless communication through a public network tunnel.
- UE1 can send cross-domain data information to RAN1, RAN1 sends the data information to UPF1, UPF1 sends the data information to CPE1, and CPE1 transmits the data information through the first
- the tunnel established between a device and the public network sends the data information to the public network, and the public network sends the data information to CPE2 through the tunnel established between the second device and the public network, and CPE2 sends the received data information to UPF2, UPF2 sends the data information to RAN2, and RAN2 sends the data information to UE2, thereby completing the cross-domain data information transmission between UE1 and UE2.
- UE1 can send cross-domain data information to RAN1, RAN1 sends the data information to UPF1, UPF1 sends the data information to CPE1, and CPE1 passes the The tunnel established between a device and the public network sends the data information to the public network, and the public network sends the data information to CPE3 through the tunnel established between the third device and the public network, and CPE3 sends the received data information to UPF3, UPF3 sends the data information to RAN3, and RAN3 sends the data information to UE3, thereby completing the cross-domain data information transmission between UE1 and UE3.
- UE2 can send cross-domain data information to RAN2, RAN2 sends the data information to UPF2, UPF2 sends the data information to CPE2, and CPE2 passes the The tunnel established between the second device and the public network sends the data information to the public network, and the public network sends the data information to CPE3 through the tunnel established between the third device and the public network, and CPE3 sends the received data information to UPF3, UPF3 sends the data information to RAN3, and RAN3 sends the data information to UE3, thereby completing the cross-domain data information transmission between UE2 and UE3.
- wireless communication between UEs in different non-public networks can be realized by establishing wireless interface connections between the public network and multiple non-public networks.
- CPEs of multiple devices receive radio interface connection requests from RANs and forward the requests to the public network, thereby establishing a connection between the public network and multiple non-public networks.
- the multiple devices include a first device, a second device, and a third device.
- the multiple devices may also perform local data information transmission.
- the UE may send local data information to the RAN, and the RAN sends the received data information to the UPF, and the UPF sends the data information to the DN.
- the UE1 may send local data information to the RAN, and the RAN sends the received data information to the UPF, and the UPF sends the data information to the DN.
- the local data information may be sent to RAN1, RAN1 sends the received data information to UPF1, and UPF1 sends the data information to DN1, thereby completing the transmission of local data information in the first non-public network.
- DNs in different non-public networks can also communicate wirelessly through the tunnel of the public network.
- DN1 in the first non-public network sends data information to CPE1, and CPE1 can send the data information to CPE2 through the tunnel established in the public network, and then CPE2 sends the data information to the second non-public network.
- the specific forwarding process is similar to the above situation, and will not be carried out here repeat.
- the devices in the non-public network established by the public network such as the first device, the second device, and the For example, the tunnel between the third device
- the public network such as the first device, the second device, and the For example, the tunnel between the third device
- the way that the third-party server performs cross-domain transmission can improve the security of data transmission.
- Fig. 7 is a schematic scene diagram of a communication method provided according to another embodiment of the present application.
- taking two non-public networks as an example they are recorded as a first non-public network and a second non-public network.
- the devices in the first non-public network are marked as the first device, UE1, second device, UE2, DN1, the coverage of the first device includes the coverage area 1, and the coverage of the second device includes the coverage area 2, where , DN1 uses CPE1 to communicate;
- the devices in the second non-public network are recorded as the third device, UE3, the fourth device, UE4, DN2, the coverage of the third device includes coverage area 3, and the coverage of the fourth device includes coverage Area 4, where DN2 uses CPE2 for communication.
- the devices in each non-public network may be devices including physical function modules, or devices including logical function modules. equipment.
- network elements such as RAN, UPF, and CPE can be deployed as physical function modules/logical function modules in devices in non-public networks. Let me repeat.
- the first device and the third device form a group
- the first device, the second device, and the fourth device form a group
- CPE1 and CPE2 form a group.
- the public network in a LAN group establishes a tunnel between each device and the public network, and each device corresponds to one or two public network tunnels. Combining with several possible situations, the following describes the manner in which devices in a LAN group perform wireless communication through a public network tunnel.
- UE1 can send the data information to the first device, and the first device sends the public
- the network sends the data information
- the public network sends the data information to the third device through the tunnel established between the third device and the public network
- the third device sends the received data information to UE3, thereby completing the communication between UE1 and UE3.
- the data forwarding process of each network element in the first device and the third device is similar to that shown in FIG. 5 and FIG. 6 , and will not be repeated here.
- UE1 can send the data information to the first device, and the first device corresponds to the group of the first device, the second device, and the fourth device.
- the data information is sent to the public network through the tunnel established between the fourth device and the public network, and the public network sends the data information to the fourth device through the tunnel established between the fourth device and the public network, and the fourth device sends the received data information to UE4, thereby completing UE1 and the public network.
- the data forwarding process of each network element in the first device and the fourth device is similar to FIG. 5 and FIG. 6 , and will not be repeated here.
- UE2 can send the data information to the second device, and the second device transmits the data information to the public network through the tunnel established between the second device and the public network.
- the public network sends the data information to the fourth device through the tunnel established between the fourth device and the public network, and the fourth device sends the received data information to UE4, thus completing the cross-connection between UE2 and UE4 Domain data information transmission, wherein, the data forwarding process of each network element in the second device and the fourth device is similar to that shown in FIG. 5 and FIG. 6 , and will not be repeated here.
- DN1 can send the data information to CPE1, and CPE1 sends the data information to the public network through the tunnel established between CPE1 and the public network.
- the network sends the data information to CPE2 through the tunnel established between CPE2 and the public network, and CPE2 sends the received data information to DN2, thereby completing the cross-domain data information transmission between DN1 and DN2.
- wireless communication between UEs in different non-public networks can be realized by establishing wireless interface connections between the public network and multiple non-public networks.
- CPEs of multiple devices receive radio interface connection requests from RANs and forward the requests to the public network, thereby establishing a connection between the public network and multiple non-public networks.
- the multiple devices include a first device, a second device, a third device, and a fourth device.
- Fig. 8 is a schematic scene diagram of a communication method provided according to another embodiment of the present application.
- taking two non-public networks as an example they are recorded as a first non-public network and a second non-public network.
- the devices in the first non-public network are marked as the first device, UE1, second device, UE2, DN1, the coverage of the first device includes the coverage area 1, and the coverage of the second device includes the coverage area 2, where , DN1 uses CPE1 to communicate;
- the devices in the second non-public network are recorded as the third device, UE3, the fourth device, UE4, DN2, the coverage of the third device includes coverage area 3, and the coverage of the fourth device includes coverage Area 4, where DN2 uses CPE2 for communication.
- the devices in each non-public network may be devices including physical function modules, or devices including logical function modules. equipment.
- network elements such as RAN, UPF, and CPE can be deployed as physical function modules/logical function modules in devices in non-public networks. Let me repeat.
- the first device, the second device, the third device, the fourth device, CPE1, and CPE2 are in the same group, and the public network in a LAN group respectively establishes a tunnel between each device and the public network.
- Each device corresponds to a public network tunnel.
- UE1 can send the data information to the first device, and the first device transmits the data information to the public network through the tunnel established between the first device and the public network.
- the public network sends the data information to the third device through the tunnel established between the third device and the public network, and the third device sends the received data information to UE3, thus completing the cross-connection between UE1 and UE3
- the data forwarding process of each network element in the first device and the third device is similar to that shown in FIG. 5 and FIG. 6 , and will not be repeated here.
- UE1 can send the data information to the first device, and the first device transmits the data information to the public network through the tunnel established between the first device and the public network.
- the public network sends the data information to the fourth device through the tunnel established between the fourth device and the public network, and the fourth device sends the received data information to UE4, thus completing the cross-connection between UE1 and UE4 Domain data information transmission, wherein, the data forwarding process of each network element in the first device and the fourth device is similar to that shown in FIG. 5 and FIG. 6 , and will not be repeated here.
- UE1 can send the data information to the first device, and the first device transmits the data information to the public network through the tunnel established between the first device and the public network.
- the public network sends the data information to CPE2 through the tunnel established between CPE2 and the public network, and CPE2 sends the received data information to DN2, thereby completing the cross-domain data information transmission between UE1 and DN2, where , the data forwarding process of each network element in the first device is similar to FIG. 5 and FIG. 6 , and will not be repeated here.
- the situation that UE2 or DN1 in the first non-public network performs cross-domain data information transmission with UE3, UE4, and DN2 in the second non-public network is similar to the above three situations, and will not be repeated here. repeat.
- wireless communication between UEs in different non-public networks can be realized by establishing wireless interface connections between the public network and multiple non-public networks.
- CPEs of multiple devices receive radio interface connection requests from RANs and forward the requests to the public network, thereby establishing a connection between the public network and multiple non-public networks.
- the multiple devices include a first device, a second device, a third device, and a fourth device.
- the devices in the non-public network established by the public network such as the first device, the second device, and the Such as the third device, or the fourth device
- the tunnel between the public network for wireless communication compared with the way of cross-domain transmission through wired private network channels, it improves the universality and flexibility, and reduces the cost , compared with the method of cross-domain transmission through a third-party server, the security of data transmission can be improved.
- FIG. 5 to FIG. 8 There may be one or more devices in the non-public network.
- One or more LAN groups can be established in the network, and there can be one or more tunnels corresponding to each device in the non-public network, which is not limited in this application.
- the wireless communication between the non-public networks and the public network can be completed through a wireless interface.
- terminal devices in different non-public networks perform cross-domain data information transmission, they can perform wireless communication through the tunnel between the devices in the non-public network established by the public network and the public network, compared to through wired private
- the method of cross-domain transmission through the network channel improves the universality and flexibility, and reduces the cost. Compared with the method of cross-domain transmission through a third-party server, it can improve the security of data transmission.
- Fig. 9 is a schematic architecture diagram of a communication method provided according to an embodiment of the present application.
- taking two non-public networks as an example they are recorded as a first non-public network and a second non-public network.
- the equipment in the first non-public network is recorded as the first equipment, terminal equipment (such as UE1, UE2, UE3), and DN1, wherein, DN1 uses CPE3 to communicate;
- the equipment in the second non-public network is recorded as the second equipment, terminal equipment (such as UE4, UE5, UE6), and DN2, where DN2 uses CPE4 for communication.
- the public network includes a control plane (control plane, CP), RAN3, UPF3, PSA, UPF4, and RAN4.
- the CP may be a device including one or more network elements, such as: AMF, SMF, and devices in each non-public network (such as the first device, and the second device) may be devices including physical function modules, It can also be a device including logical function modules.
- network elements such as RAN, UPF, and CPE may be deployed as physical function modules/logic function modules in devices in each non-public network.
- network elements such as CPE1, RAN1, and UPF1 can be deployed in the first device as physical function modules/logical function modules
- network elements such as CPE2, RAN2, and UPF2 can be deployed in the second device as physical function modules/logical function modules.
- the specific deployment of each network element is similar to that shown in Figure 5 and Figure 6, and will not be repeated here.
- the first device and the second device form a group
- CPE3 and CPE4 form a group.
- the public network establishes a tunnel between each device and the public network. At this time, each device corresponds to A public network tunnel.
- UE1-UE3 and UE4-UE6 transmit cross-domain data information
- UE1-UE3 sends cross-domain data information to RAN1
- RAN1 sends the data information to UPF1
- UPF1 sends the data information to CPE1
- CPE1 sends the data information to RAN3 in the public network through the tunnel established between the first device and the public network
- RAN3 sends the data information to UPF3
- UPF3 sends the data information to PSA
- PSA sends the data information to UPF4
- UPF4 sends the data information to RAN4
- RAN4 sends the data information to CPE2 through the tunnel established between the second device and the public network
- CPE2 sends the data information to UPF2
- UPF2 sends the received data information to RAN2, RAN2
- the data information is sent to UE4-UE6, thereby completing the cross-domain data information transmission between UE1-UE3 and UE4-UE6.
- DN1 and DN2 transmit cross-domain data information
- CPE3 sends the data information to the public network through the tunnel established between CPE3 and the public network.
- the network sends the data information to CPE4, and CPE4 sends the received data information to DN2, thereby completing the cross-domain data information transmission between DN1 and DN2.
- the forwarding path of the data information in the public network is similar to the above situation. This will not be repeated here.
- wireless communication between UEs in different non-public networks can be realized by establishing wireless interface connections between the public network and multiple non-public networks.
- CPE1 and CPE2 receive wireless interface connection requests from RAN1 and RAN2 respectively, and forward the request to the CP of the public network, thereby establishing a public network Connected to the wireless interface between the first non-public network and the second non-public network.
- FIG. 9 does not impose any restrictions on the actual architecture of the embodiment of the present application.
- There may be one or more devices in a non-public network and a LAN may be established in a public network. groups, and multiple LAN groups can also be established.
- the wireless communication between the non-public networks and the public network can be completed through a wireless interface.
- terminal devices in different non-public networks perform cross-domain data information transmission, they can perform wireless communication through the tunnel between the devices in the non-public network established by the public network and the public network, compared to through wired private
- the method of cross-domain transmission through the network channel improves the universality and flexibility, and reduces the cost. Compared with the method of cross-domain transmission through a third-party server, it can improve the security of data transmission.
- Fig. 10 is a schematic diagram of a communication method provided according to an embodiment of the present application.
- the devices in the first non-public network include the first device
- the devices in the public network include user plane network elements
- the devices in the second non-public network include the second device.
- the second non-public network is not limited to a specific non-public network, and any non-public network that can be used as a target non-public network may be called a second non-public network.
- the second device is not limited to a specific device, and any device that can be used as a target non-public network can be called a second device, which is not limited in this embodiment of the present application.
- network elements such as CPE, RAN, and UPF can be deployed in the first device as physical functional modules.
- the communication between the CPE and the RAN is through the Nx interface
- the communication between the CPE and the UPF is through the Ny interface
- the communication between the RAN and the UPF communicate through the N3* interface.
- network elements such as CPE, RAN, and UPF can be deployed in the first device as logic function modules.
- the communication between the CPE and the RAN is through the internal interface Nx
- the communication between the CPE and the UPF is through the internal interface Ny.
- the RAN and the UPF Communicate between them through the internal interface N3*.
- the second device is similar to the first device, which will not be repeated here.
- the devices in the non-public network may also include terminal devices (such as UE) and DN, and the devices in the public network may also include control plane network elements (such as SMF, PCF, AMF), which is not limited in this application.
- terminal devices such as UE
- DN terminal devices
- control plane network elements such as SMF, PCF, AMF
- a user plane network element receives data information from a first device.
- the data information is cross-domain data information. That is, the destination device of the data information is a device in a non-public network (such as the second non-public network) other than the first non-public network.
- a non-public network such as the second non-public network
- the first device determines that the data information is cross-domain data information according to local preconfiguration. For example, the first device may pre-configure forwarding rules. When the address of the data information received by the first device from the UE is different from the sub-address segment of the first device, it indicates that the data information is cross-domain data information; when the first device The address of the received data information from the UE is the same as the sub-address segment of the first device, indicating that the data information is local data information, and the first device sends the local data information to the DN in the first non-public network , the local transmission of data information can be completed.
- the first device determines that the data information is cross-domain data information according to the address of the data information and the second routing rule, where the second routing rule is used to indicate the sub-address segment of the second device and the second routing rule. Relationship between tunnels corresponding to user plane network elements. For example, if the first device determines that the address of the data information is the same as the sub-address segment of the second device, it indicates that the data information is cross-domain data information.
- the address of the data information should be compared with the sub-address segment that can be used as the destination device. If the address of the data information is the same as the sub-address of a certain destination device If the segments are the same, it can be determined that the data information is sent to the non-public network corresponding to the destination device; on the contrary, if the address of the data information is different from the sub-address segment that can be used as the destination device, it means that the data information is local data information , at this time, the first device sends the local data information to the DN in the first non-public network, and then the local transmission of the data information can be completed.
- the above-mentioned second routing rule may be generated by a control plane network element (such as SMF, PCF), or the second routing rule may be predefined by a protocol, which is not limited in this embodiment of the present application.
- a control plane network element such as SMF, PCF
- the second routing rule may be predefined by a protocol, which is not limited in this embodiment of the present application.
- the first device when the tunnel between the first device and the user plane network element is unique, the first device sends data information to the user plane network element through the tunnel.
- the first device sends the data information to the user plane network element according to the second routing rule. For example, the first device determines the sub-address segment of the second device that is the same as the address of the data information, and according to the relationship between the sub-address segment of the second device and the tunnel corresponding to the user plane network element, it can determine The tunnel used when the network element on the user plane sends the data information, and then the first device can send the data information to the network element on the user plane through the tunnel.
- the user plane network element sends data information to the second device.
- the user plane network element sends data information to the second device when it is determined that the first device belongs to a device group member.
- the user plane network element determines that the first device is a device group member according to the attribute of the first device.
- the attribute may be DNN, session type, S-NSSAI, or the attribute may also be the sub-address segment of the first device, which is not limited in this application.
- the user plane network element when the tunnel between the user plane network element and the second device is unique, the user plane network element sends data information to the second device through the tunnel.
- the user plane network element sends the data information to the second device based on the first routing rule.
- the first routing rule is used to indicate the relationship between the sub-address segment of the second device and the tunnel corresponding to the second device. For example, if the user plane network element determines that the address of the data information is the same as the sub-address segment of the second device, then according to the relationship between the sub-address segment of the second device and the tunnel corresponding to the second device, it is determined that the user plane network element sends the data information to the second device. The tunnel used by the second device to send the data information.
- the address of the data information should be compared with the sub-address segment that can be used as the destination device. If the address of the data information is the same as the sub-address segment of a certain device If they are the same, it can be determined that the data information is sent to the non-public network corresponding to the device, and then according to the relationship between the subaddress segment of the device and the tunnel corresponding to the device, it can be determined that when the user plane network element sends the data information to the device tunnel.
- the communication method shown in FIG. 10 further includes that the second device sends the received data information to the UE in the second non-public network, thereby completing the communication between the first non-public network and the second non-public network. data transmission.
- multiple devices before the user plane network element receives the data information from the first device, multiple devices send an N1 message to the control plane network element in the public network, and the multiple devices receive a response message to the N1 message from the control plane network element , wherein the multiple devices include a first device and a second device.
- the N1 message includes an N2 message, and the N2 message is used to establish the connection of the N2 wireless interface between multiple devices and the control plane network element.
- the N1 message may be used to instruct the control plane network element to process the N2 message.
- the N1 message itself can be used to instruct the control plane network element to process the N2 message, that is, if the N1 message includes the N2 message, the N1 message is used to instruct the control plane network element to process the N2 message.
- the N1 message further includes first indication information, where the first indication information is used to instruct the control plane network element to process the N2 message.
- the response message of the N1 message may include a response message of the N2 message, and the response message of the N2 message is used to indicate that the connection of the N2 wireless interface between multiple devices and the control plane network element is successfully established.
- the N2 wireless interface connection between the non-public network and the public network can be established, and then the non-public network and the public network can communicate through the wireless interface.
- terminal devices in different non-public networks transmit cross-domain data information, compared with the way of cross-domain transmission through wired private network channels, the universality and flexibility are improved, and the cost is reduced.
- the way that the third-party server performs cross-domain transmission can improve the security of data transmission.
- Figure 10 describes a schematic diagram of a communication method provided by the embodiment of the present application, and the application of a communication method provided by the embodiment of the present application in specific application scenarios will be further described below in conjunction with Figures 11 to 14 .
- Fig. 11 is a schematic flowchart of a communication method provided according to an embodiment of the present application.
- the devices in the first non-public network include the first device and UE, where the first device includes RAN, UPF, and CPE, and the devices in the public network include AMF.
- the CPE initiates an N1NAS connection establishment request to the AMF, and the AMF establishes an N1NAS connection with the CPE according to the request of the CPE.
- the network element in the first device completes basic information configuration.
- the basic information may include, but not limited to, for example: basic operating parameters, address configuration, and so on.
- the CPE establishes a default user plane, and the RAN and UPF obtain basic information from the OAM through the default user plane of the CPE to complete configuration of the basic information.
- the UE sends registration request information to the RAN.
- the registration request information can be used to establish the N1NAS connection between the UE and the AMF.
- the RAN selects the AMF.
- the RAN may select an AMF in the same area as the UE according to the location information of the UE.
- the RAN may be connected to one or more AMFs, and the one or more AMFs are located in different locations in the public network. At this time, the RAN may select an AMF in the same area as the UE according to the location information of the UE.
- the RAN sends an N2 message to the CPE.
- the N2 message is used to establish the connection of the N2 radio interface between the RAN and the AMF.
- the CPE sends an N1 message to the AMF.
- the N1 message may include an N2 message.
- the N1 message may be used to instruct the control plane network element to process the N2 message.
- the N1 message itself can be used to instruct the control plane network element to process the N2 message, that is, if the N1 message includes the N2 message, the N1 message is used to instruct the control plane network element to process the N2 message.
- the N1 message further includes first indication information, where the first indication information is used to instruct the control plane network element to process the N2 message.
- the AMF sends a response message of the N1 message to the CPE.
- the response message of the N1 message may include the response message of the N2 message.
- the response message of the N2 message is used to represent the successful establishment of the connection of the N2 radio interface between the RAN and the AMF, and the response message of the N1 message may be used to instruct the CPE to send the response message of the N2 message to the RAN.
- the response message of the N1 message itself can be used to instruct the CPE to send the response message of the N2 message to the RAN, that is, if the response message of the N1 message includes the response message of the N2 message, the response message of the N1 message It is used to instruct the CPE to send the response message of the N2 message to the RAN.
- the response message of the N1 message further includes second indication information, where the second indication information is used to instruct the CPE to send the response message of the N2 message to the RAN.
- the CPE sends a response message of the N2 message to the RAN.
- the RAN After receiving the response message of the N2 message, the RAN confirms that the wireless connection of the N2 interface between the RAN and the AMF has been established.
- the UE can send an N1 message to the RAN; the RAN sends an N2 message to the CPE, the N2 message includes the N1 message sent by the UE; the CPE sends an N1 message to the AMF, the N1 message includes the N2 message and the N1 message sent by the UE, and the AMF According to the N1 message sent by the CPE, an N1NAS connection is established with the UE.
- the N2 wireless interface connection between the RAN in the non-public network and the AMF in the public network can be established, so that the non-public network and the public network can communicate through the wireless interface.
- the terminal equipment of the terminal device when used for cross-domain data information transmission, it improves the universality and flexibility, and reduces the cost.
- the way of transmission can improve the security of data transmission.
- Fig. 12 is a schematic flowchart of a communication method provided according to another embodiment of the present application.
- the devices in the first non-public network include a first device, UE1, and DN, where the first device includes RAN1, UPF1, and CPE1.
- the devices in the public network include CP and UPF2, wherein the CP includes SMF, PCF, unified data management (unified data management, UDM), and unified database (unified data repository, UDR).
- the devices in the second non-public network include the second device and UE2, where the second device includes RAN2, UPF3, and CPE2.
- the second non-public network is not limited to a specific non-public network, and any non-public network that can be used as a target non-public network may be called a second non-public network.
- the second device is not limited to a specific device, and CPE2 is not limited to a specific network element. Any device that can be used as a destination non-public network can be called a second device. This is not limited.
- a wireless connection of the N4 interface is established between the UPF1 and the SMF.
- the AF sends group establishment request information to the CP.
- the group building request information includes a group identifier, identifiers of multiple devices, and routing information, where the routing information includes a relationship between identifiers of multiple devices and addresses of multiple devices, and the multiple devices include a first device and a second device.
- the routing information includes the relationship between identifiers of multiple CPEs and addresses of multiple CPEs, where the multiple CPEs include CPE1 and CPE2.
- the CP establishes a device group.
- the CP groups the multiple devices according to their attributes, for example, the CP may group the multiple devices according to DNN, session type, and S-NSSAI. For another example, the CP may group the multiple devices according to the address segments of the multiple devices. This application is not limited to this.
- the plurality of devices includes a first device and a second device.
- the address segment of the multiple devices may include the address of one device, or may include the addresses of multiple devices, which is not limited in this embodiment of the present application.
- UDM or UDR stores group information.
- the public network establishes a tunnel between the first device in the first non-public network and the public network.
- the public network may also establish a tunnel between the second device in the second non-public network and the public network, so that the first non-public network and the second non-public network can pass through
- the tunnel established by the public network completes the data transmission.
- the CP determines the target routing rule.
- the SMF determines the target routing rule according to the routing information.
- the target routing rule includes a first routing rule and/or a second routing rule, wherein the first routing rule is used to indicate the relationship between the sub-address segment of the second device and the tunnel corresponding to the second device, and the second routing rule uses Indicates the relationship between the sub-address segment of the second device and the tunnel corresponding to UPF2.
- the PCF may determine the target routing rule according to the routing information.
- the target routing rule includes a first routing rule and/or a second routing rule, wherein the first routing rule is used to indicate the relationship between the sub-address segment of the second device and the tunnel corresponding to the second device, and the second routing rule uses Indicates the relationship between the sub-address segment of the second device and the tunnel corresponding to UPF2.
- the PCF sends the determined target routing rules to the SMF.
- first routing rule and/or second routing rule may be generated by SMF or PCF, or the first routing rule and/or second routing rule may be predefined by the protocol, which is not made in this embodiment of the present application. Any restrictions.
- the relationship between the sub-address segment of the second device indicated by the second routing rule and the tunnel corresponding to UPF2 does not refer to the relationship between the sub-address segment of a certain device and the tunnel corresponding to UPF2.
- the sub-address segment that can be used as the destination device can be called the sub-address segment of the second device, that is to say, the relationship between the sub-address segment of the second device indicated by the second routing rule and the tunnel corresponding to UPF2 is The relationship between multiple sub-address segments that can be used as destination devices and the tunnel corresponding to UPF2.
- the relationship between the sub-address segment of the second device indicated by the first routing rule and the tunnel corresponding to the second device does not refer to the relationship between the sub-address segment of a certain device and the tunnel corresponding to the device.
- any sub-address segment that can be used as the destination device can be called the sub-address segment of the second device, that is, the distance between the sub-address segment of the second device indicated by the first routing rule and the tunnel corresponding to the second device.
- the relationship between is the relationship between multiple address segments that can be used as the destination device and the tunnel corresponding to the destination device.
- the CP sends the first routing rule to UPF2.
- the SMF when the SMF determines that there are more than two device group members, the SMF sends the first routing rule to UPF2.
- the CP sends the second routing rule to UPF1.
- the SMF determines that the number of device groups to which the first device belongs is more than one, the SMF sends the second routing rule to UPF1.
- the CP may first send the first routing rule to UPF2, and then send the second routing rule to UPF1; or, the CP may first send the second routing rule to UPF1. routing rules, and then send the first routing rule to UPF2; or, the CP sends the first routing rule to UPF2 and sends the second routing rule to UPF1 at the same time.
- UPF1 determines that the data information is cross-domain data information. That is, the destination device of the data information is a device in a non-public network (such as the second non-public network) other than the first non-public network.
- UPF1 determines that the data information is cross-domain data information according to local pre-configuration. For example, UPF1 can pre-configure forwarding rules. When the address of the data information is different from the sub-address segment of the first device, it means that the data information is cross-domain data information; when the address of the data information is the same as the sub-address segment of the first device, It means that the data information is local data information, and at this time UPF1 sends the local data information to the DN in the first non-public network, and then the local transmission of the data information can be completed.
- UPF1 can pre-configure forwarding rules. When the address of the data information is different from the sub-address segment of the first device, it means that the data information is cross-domain data information; when the address of the data information is the same as the sub-address segment of the first device, It means that the data information is local data information, and at this time UPF1 sends the local data information to the DN in the first non-public network, and
- UPF1 determines that the data information is cross-domain data information according to the address of the data information and the second routing rule. For example, if UPF1 determines that the address of the data information is the same as the sub-address segment of the second device, it indicates that the data information is cross-domain data information, and according to the relationship between the sub-address segment of the second device and the tunnel corresponding to UPF2, it can Determine the tunnel when CPE1 sends the data information to UPF2.
- the address of the data information should be compared with the sub-address segment that can be used as the destination device. If the address of the data information is the same as the sub-address of a certain destination device If the segments are the same, it can be determined that the data information is sent to the non-public network corresponding to the destination device; on the contrary, if the address of the data information is different from the sub-address segment that can be used as the destination device, it means that the data information is local data information , at this time UPF1 sends the local data information to the DN in the first non-public network, and the local transmission of the data information can be completed.
- UPF1 sends data information to CPE1.
- UPF1 sends third indication information to CPE1.
- the third indication information is used to indicate the tunnel when CPE1 sends the data information to UPF2.
- UPF1 may first send data information to CPE1, and then send third indication information to CPE1; or, UPF1 may simultaneously send data information and the third instruction information to CPE1. 3. Instructions.
- CPE1 sends data information to UPF2.
- CPE1 when there is only one tunnel between CPE1 and UPF2, CPE1 sends data information to UPF2 through the tunnel.
- CPE1 sends data information to UPF2 according to the tunnel indicated by the third indication information.
- UPF2 determines that the first device is a member of the device group.
- UPF2 determines that the first device is a device group member according to the attribute of the first device.
- the attribute may be DNN, session type, and S-NSSAI.
- the attribute may be the sub-address segment of the first device, which is not limited in this application.
- the communication method shown in FIG. 12 further includes: UPF2 sends the data information to CPE2, CPE2 sends the received data information to UPF3, UPF3 sends the data information to RAN2, and RAN2 sends the data information to UE2, thereby Complete data transmission between the first non-public network and the second non-public network.
- UPF2 when there is only one tunnel between UPF2 and CPE2, UPF2 sends data information to CPE2 through the tunnel.
- UPF2 sends the data information to CPE2 based on the first routing rule. For example, if UPF2 determines that the address of the data information is the same as the sub-address segment of the second device, then according to the relationship between the sub-address segment of the second device and the tunnel corresponding to the second device, determine the time when UPF2 sends the data information to CPE2 tunnel.
- the address of the data information should be compared with the sub-address segment that can be used as the destination device. If the address of the data information is the same as the sub-address segment of a certain device If they are the same, it can be determined that the data information is sent to the non-public network corresponding to the device, and then according to the relationship between the subaddress segment of the device and the tunnel corresponding to the device, it is determined that when UPF2 sends data information to the CPE in the device tunnel.
- Fig. 13 is a schematic flowchart of a communication method provided according to another embodiment of the present application.
- the devices in the first non-public network include a first device, UE1, and DN, where the first device includes RAN1, UPF1, and CPE1.
- the devices in the public network include CP and UPF2, wherein the CP includes SMF, PCF, unified data management (unified data management, UDM), and unified database (unified data repository, UDR).
- the devices in the second non-public network include the second device and UE2, where the second device includes RAN2, UPF3, and CPE2.
- the second non-public network is not limited to a specific non-public network, and any non-public network that can be used as a target non-public network may be called a second non-public network.
- the second device is not limited to a specific device, and CPE2 is not limited to a specific network element. Any device that can be used as a destination non-public network can be called a second device. This is not limited.
- a wireless connection of the N4 interface is established between the UPF1 and the SMF.
- the AF sends group establishment request information to the CP.
- the group building request information includes a group identifier, identifiers of multiple devices, and routing information, where the routing information includes a relationship between identifiers of multiple devices and addresses of multiple devices, and the multiple devices include a first device and a second device.
- the routing information includes the relationship between identifiers of multiple CPEs and addresses of multiple CPEs, where the multiple CPEs include CPE1 and CPE2.
- the CP establishes a device group.
- the CP groups the multiple devices according to their attributes, for example, the CP may group the multiple devices according to DNN, session type, and S-NSSAI. For another example, the CP may group the multiple devices according to the address segments of the multiple devices. This application is not limited to this.
- the plurality of devices includes a first device and a second device.
- the address segment of the multiple devices may include the address of one device, or may include the addresses of multiple devices, which is not limited in this embodiment of the present application.
- UDM or UDR stores group information.
- the public network establishes a tunnel between the first device in the first non-public network and the public network.
- the public network may also establish a tunnel between the second device in the second non-public network and the public network, so that the first non-public network and the second non-public network can pass through
- the tunnel established by the public network completes the data transmission.
- the CP determines the target routing rule.
- the SMF determines the target routing rule according to the routing information.
- the target routing rule includes a first routing rule and/or a second routing rule and/or a third routing rule, where the first routing rule is used to indicate the distance between the sub-address segment of the second device and the tunnel corresponding to the second device.
- the second routing rule is used to indicate the sub-address segment of the second device
- the third routing rule is used to indicate the relationship between the sub-address segment of the second device and the tunnel corresponding to UPF2.
- the PCF may determine the target routing rule according to the routing information.
- the target routing rule includes a first routing rule and/or a second routing rule and/or a third routing rule, where the first routing rule is used to indicate the distance between the sub-address segment of the second device and the tunnel corresponding to the second device.
- the second routing rule is used to indicate the sub-address segment of the second device, and the third routing rule is used to indicate the relationship between the sub-address segment of the second device and the tunnel corresponding to UPF2.
- the PCF sends the determined target routing rules to the SMF.
- first routing rule and/or the second routing rule and/or the third routing rule may be generated by SMF or PCF, or the first routing rule and/or the second routing rule and/or the third routing rule It may be predefined by the protocol, which is not limited in this embodiment of the application.
- the relationship between the sub-address segment of the second device indicated by the third routing rule and the tunnel corresponding to UPF2 does not refer to the relationship between the sub-address segment of a certain device and the tunnel corresponding to UPF2.
- the sub-address segment that can be used as the destination device can be called the sub-address segment of the second device, that is to say, the relationship between the sub-address segment of the second device indicated by the second routing rule and the tunnel corresponding to UPF2 is The relationship between multiple sub-address segments that can be used as destination devices and the tunnel corresponding to UPF2.
- sub-address segment of the second device indicated by the second routing rule does not refer to the sub-address segment of a certain device, and any sub-address segment that can be used as a destination device can be called a sub-address segment of the second device. address segment.
- the relationship between the sub-address segment of the second device indicated by the first routing rule and the tunnel corresponding to the second device does not refer to the relationship between the sub-address segment of a certain device and the tunnel corresponding to the device.
- any sub-address segment that can be used as the destination device can be called the sub-address segment of the second device, that is, the distance between the sub-address segment of the second device indicated by the first routing rule and the tunnel corresponding to the second device.
- the relationship between is the relationship between multiple address segments that can be used as the destination device and the tunnel corresponding to the destination device.
- the CP sends the first routing rule to UPF2.
- the SMF when the SMF determines that there are more than two device group members, the SMF sends the first routing rule to UPF2.
- the CP sends the second routing rule to UPF1.
- the SMF sends the second routing rule to UPF1.
- the CP sends the third routing rule to the CPE1.
- the SMF determines that the number of device groups to which the first device belongs is more than one, the SMF sends the third routing rule to CPE1.
- the CP may first send the first routing rule to UPF2, then send the second routing rule to UPF1, and finally send the third routing rule to CPE1; or , the CP can first send the second routing rule to UPF1, then send the first routing rule to UPF2, and finally send the third routing rule to CPE1; or, the CP sends the first routing rule to UPF2, the second routing rule to UPF1, and the CPE1 sends the third routing rule at the same time.
- RAN1 sends the data information to UPF1.
- UPF1 determines that the data information is cross-domain data information. That is, the destination device of the data information is a device in a non-public network (such as the second non-public network) other than the first non-public network.
- UPF1 determines that the data information is cross-domain data information according to local pre-configuration. For example, UPF1 can pre-configure forwarding rules. When the address of the data information is different from the sub-address segment of the first device, it means that the data information is cross-domain data information; when the address of the data information is the same as the sub-address segment of the first device, It means that the data information is local data information, and at this time, UPF1 sends the local data information to the DN in the first non-public network, and then the local transmission of the data information can be completed.
- UPF1 can pre-configure forwarding rules. When the address of the data information is different from the sub-address segment of the first device, it means that the data information is cross-domain data information; when the address of the data information is the same as the sub-address segment of the first device, It means that the data information is local data information, and at this time, UPF1 sends the local data information to the DN in the first non-public network
- UPF1 determines that the data information is cross-domain data information according to the address of the data information and the second routing rule. For example, if UPF1 determines that the address of the data information is the same as the sub-address segment of the second device, it indicates that the data information is cross-domain data information.
- the address of the data information should be compared with the sub-address segment that can be used as the destination device. If the address of the data information is the same as the sub-address of a certain destination device If the segments are the same, it can be determined that the data information is sent to the non-public network corresponding to the destination device; on the contrary, if the address of the data information is different from the sub-address segment that can be used as the destination device, it means that the data information is local data information , at this time UPF1 sends the local data information to the DN in the first non-public network, and the local transmission of the data information can be completed.
- UPF1 sends data information to CPE1.
- CPE1 sends data information to UPF2.
- CPE1 when there is only one tunnel between CPE1 and UPF2, CPE1 sends data information to UPF2 through the tunnel.
- CPE1 sends data information to UPF2 according to the third routing rule. For example, CPE1 determines the sub-address segment of the second device that is the same as the address of the data information, and according to the relationship between the sub-address segment of the second device and the tunnel corresponding to UPF2, it can determine the tunnel when CPE1 sends the data information to UPF2 , and then CPE1 sends data information to UPF2 through the tunnel.
- CPE1 determines the sub-address segment of the second device that is the same as the address of the data information, and can compare the address of the data information with the sub-address segment that can be used as the destination device. segment is the same, it can be determined that the data information is sent to the non-public network corresponding to the device, and then according to the relationship between the sub-address segment of the device and the tunnel corresponding to UPF2, the tunnel when CPE1 sends the data information to UPF2 can be determined .
- UPF2 determines that the first device is a member of the device group.
- UPF2 determines that the first device is a device group member according to the attribute of the first device.
- the attribute may be DNN, session type, and S-NSSAI.
- the attribute may be the sub-address segment of the first device, which is not limited in this application.
- the communication method shown in FIG. 13 further includes: UPF2 sends the data information to CPE2, CPE2 sends the received data information to UPF3, UPF3 sends the data information to RAN2, and RAN2 sends the data information to UE2, thereby Complete data transmission between the first non-public network and the second non-public network.
- UPF2 when there is only one tunnel between UPF2 and CPE2, UPF2 sends data information to CPE2 through the tunnel.
- UPF2 sends the data information to CPE2 based on the first routing rule. For example, if UPF2 determines that the address of the data information is the same as the sub-address segment of the second device, then according to the relationship between the sub-address segment of the second device and the tunnel corresponding to the second device, determine the time when UPF2 sends the data information to CPE2 tunnel.
- the address of the data information should be compared with the sub-address segment that can be used as the destination device. If the address of the data information is the same as the sub-address segment of a certain device If they are the same, it can be determined that the data information is sent to the non-public network corresponding to the device, and then according to the relationship between the subaddress segment of the device and the tunnel corresponding to the device, it is determined that when UPF2 sends data information to the CPE in the device tunnel.
- Fig. 14 is a schematic flowchart of a communication method provided according to another embodiment of the present application.
- the devices in the first non-public network include a first device, UE1, and DN, where the first device includes RAN1, UPF1, and CPE1.
- the devices in the public network include CP and UPF2, wherein the CP includes SMF, PCF, unified data management (unified data management, UDM), and unified database (unified data repository, UDR).
- the devices in the second non-public network include the second device and UE2, where the second device includes RAN2, UPF3, and CPE2.
- the second non-public network is not limited to a specific non-public network, and any non-public network that can be used as a target non-public network may be called a second non-public network.
- the second device is not limited to a specific device, and CPE2 is not limited to a specific network element. Any device that can be used as a destination non-public network can be called a second device. This is not limited.
- S1400-S1405 are similar to S1200-S1205 in FIG. 12 , and will not be repeated here.
- the CP sends the second routing rule to the CPE1.
- the SMF determines that the number of device groups to which the first device belongs is more than one, the SMF sends the second routing rule to UPF1.
- the CP may first send the first routing rule to UPF2, and then send the second routing rule to CPE1; or, the CP may first send the second routing rule to CPE1. routing rules, and then send the first routing rule to UPF2; or, the CP sends the first routing rule to UPF2 and sends the second routing rule to CPE1 at the same time.
- UPF1 sends the data information to CPE1.
- CPE1 determines that the data information is cross-domain data information. That is, the destination device of the data information is a device in a non-public network (such as the second non-public network) other than the first non-public network.
- CPE1 determines that the data information is cross-domain data information according to local preconfiguration. For example, CPE1 can pre-configure forwarding rules. When the address of the data information is different from the sub-address segment of the first device, it means that the data information is cross-domain data information; when the address of the data information is the same as the sub-address segment of the first device, It means that the data information is local data information. At this time, CPE1 sends the local data information to UPF1, and UPF1 sends the local data information to the DN in the first non-public network to complete the local transmission of the data information.
- CPE1 determines that the data information is cross-domain data information according to the address of the data information and the second routing rule. For example, if CPE1 determines that the address of the data information is the same as the sub-address segment of the second device, it indicates that the data information is cross-domain data information.
- the address of the data information should be compared with the sub-address segment that can be used as the destination device. If the address of the data information is the same as the sub-address of a certain destination device If the segments are the same, it can be determined that the data information is sent to the non-public network corresponding to the destination device; on the contrary, if the address of the data information is different from the sub-address segment that can be used as the destination device, it means that the data information is local data information , at this time, CPE1 sends the local data information to UPF1, and UPF1 sends the local data information to the DN in the first non-public network, thus completing the local transmission of the data information.
- CPE1 when there is only one tunnel between CPE1 and UPF2, CPE1 sends data information to UPF2 through the tunnel.
- CPE1 sends data information to UPF2 according to the second routing rule. For example, CPE1 determines the tunnel when CPE1 sends the data information to UPF2 according to the relationship between the sub-address segment of the second device and the tunnel corresponding to UPF2, and sends the data information to UPF2 through the tunnel.
- UPF2 determines that the first device is a member of the device group.
- UPF2 determines that the first device is a device group member according to the attribute of the first device.
- the attribute may be DNN, session type, and S-NSSAI.
- the attribute may be the sub-address segment of the first device, which is not limited in this application.
- the communication method shown in FIG. 14 further includes: UPF2 sends the data information to CPE2, CPE2 sends the received data information to UPF3, UPF3 sends the data information to RAN2, and RAN2 sends the data information to UE2, thereby Complete data transmission between the first non-public network and the second non-public network.
- UPF2 when there is only one tunnel between UPF2 and CPE2, UPF2 sends data information to CPE2 through the tunnel.
- UPF2 sends the data information to CPE2 based on the first routing rule. For example, if UPF2 determines that the address of the data information is the same as the sub-address segment of the second device, then according to the relationship between the sub-address segment of the second device and the tunnel corresponding to the second device, determine the time when UPF2 sends the data information to CPE2 tunnel.
- the address of the data information should be compared with the sub-address segment that can be used as the destination device. If the address of the data information is the same as the sub-address segment of a certain device If they are the same, it can be determined that the data information is sent to the non-public network corresponding to the device, and then according to the relationship between the subaddress segment of the device and the tunnel corresponding to the device, it is determined that when UPF2 sends data information to the CPE in the device tunnel.
- the first device mainly includes RAN1, UPF1, and CPE1 as an example for illustration, and the present application is not limited thereto.
- the first device may also include other network elements or devices.
- one device group corresponds to one address segment
- multiple devices belonging to the same device group have the same address segment
- the sub-address segments corresponding to multiple devices belonging to the same device group are Differently, the sub-address segments of the multiple devices belong to the address segment of the device.
- the address segment of the device group can be 192.168.0.0/16
- the sub-address segment of the first device can be 192.168.1.0/24
- the sub-address segment of the second device The address segment may be 192.168.2.0/24, wherein the sub-address segment 192.168.1.0/24 of the first device and the sub-address segment 192.168.2.0/24 of the second device both belong to the address segment 192.168.0.0/1 of the device group.
- the network element with the access and mobility management function may correspond to the AMF, or may correspond to other similar devices for performing the AMF function
- the network element with the session management function may correspond to the SMF, or It can correspond to other similar devices for performing SMF functions.
- the user plane function network element can correspond to UPF, and can also correspond to other similar devices for performing UPF functions.
- Other network elements are similar to this, and the embodiments of this application will not make specific limited.
- the embodiments of the present application further provide corresponding devices, and the device includes corresponding modules for executing the foregoing method embodiments.
- the module can be software, or hardware, or a combination of software and hardware. It can be understood that the technical features described in the above method embodiments are also applicable to the following device embodiments.
- Fig. 15 is a schematic block diagram of a communication device provided by an embodiment of the present application.
- the apparatus 1500 includes a transceiver unit 1510 and a processing unit 1520 .
- the transceiver unit 1510 may be used to implement corresponding communication functions.
- the transceiver unit 1510 may also be called a communication interface or a communication unit.
- the processing unit 1520 may be configured to implement corresponding processing functions, such as determining a first routing rule and/or a second routing rule.
- the device 1500 further includes a storage unit, which can be used to store instructions and/or data, and the processing unit 1520 can read the instructions and/or data in the storage unit, so that the device implements the foregoing method embodiments Actions of devices or network elements in the network.
- a storage unit which can be used to store instructions and/or data
- the processing unit 1520 can read the instructions and/or data in the storage unit, so that the device implements the foregoing method embodiments Actions of devices or network elements in the network.
- the apparatus 1500 may be a user plane network element in any one of the embodiments shown in FIG. 12 to FIG. 14 , or may be a component (such as a chip) of the user plane network element.
- the device 1500 can implement the steps or processes corresponding to the execution of the user plane network element in any one of the embodiments shown in FIG. 12 to FIG. 14 , wherein the transceiver unit 1510 can be used to execute any one of the embodiments shown in FIG.
- the processing unit 1520 may be configured to perform operations related to processing of the user plane network element in any one of the embodiments shown in FIG. 12 to FIG. 14 .
- the transceiver unit 1510 is configured to receive data information from a first device in a first non-public network, and the public network communicates with the first non-public network through a wireless interface; the processing unit 1520, For determining a first routing rule, where the first routing rule is used to indicate the relationship between the sub-address segment of the second device in the second non-public network and the tunnel corresponding to the second device; the transceiver unit 1510 further It is used for sending the data information to the second device according to the first routing rule, and the public network communicates with the second non-public network through a wireless interface.
- the transceiving unit 1510 is configured to receive the first routing rule from a control plane network element in the public network.
- the transceiving unit 1510 is configured to send the data information to the second device according to the address of the data information and the first routing rule.
- the transceiving unit 1510 is configured to send the data information to the second device when it is determined that the first device belongs to a device group member.
- the processing unit 1520 is configured to determine that the first device is a member of the device group according to the attribute of the first device.
- the attribute includes one or more of the following: the sub-address segment of the first device, DNN, session type, and S-NSSAI.
- the apparatus 1500 may be the control plane network element in any one of the embodiments shown in FIG. 12 to FIG. 14 , or may be a component (such as a chip) of the control plane network element.
- the device 1500 can implement the steps or processes corresponding to the execution of the control plane network element in any one of the embodiments shown in FIG. 12 to FIG.
- the processing unit 1520 may be configured to perform the processing related operations of the control plane network element in any one of the embodiments shown in FIG. 12 to FIG. 14 .
- the processing unit 1520 is configured to determine a target routing rule, where the target routing rule includes a first routing rule and/or a second routing rule, where the first routing rule is used to indicate the The relationship between the subaddress segment of the second device and the tunnel corresponding to the second device, the second routing rule is used to indicate the relationship between the subaddress segment of the second device and the tunnel corresponding to the user plane network element in the public network
- the relationship between the public network and the second non-public network communicates through a wireless interface; the transceiver unit 1510 is configured to send the target routing rule.
- the transceiver unit 1510 is configured to send the first routing rule to the user plane network element; and/or the transceiver unit 1510 is further configured to send the second route to the first device in the first non-public network A rule, wherein, the public network and the first non-public network communicate through a wireless interface.
- the processing unit 1520 is configured to determine the target routing rule according to the relationship between identifiers of multiple devices and address segments of the multiple devices, where the multiple devices include the first device and the second equipment.
- the device further includes: a transceiver unit 1510, configured to receive an N1 message from multiple devices, where the N1 message includes an N2 message, and the N2 message is used to establish an N2 message.
- the wireless connection of the interface, the multiple devices include the first device and the second device; the transceiver unit 1510 is further configured to send a response message of the N1 message to the multiple devices, the response message of the N1 message includes the response message of the N2 message A response message, the response message of the N2 message is used to indicate that the wireless connection of the N2 interface is successfully established.
- the N1 message further includes first indication information, where the first indication information is used to indicate to process the N2 message.
- the apparatus 1500 may be the first device in any one of the embodiments shown in FIG. 12 to FIG. 14 , or may be a component (such as a chip) of the first device.
- the apparatus 1500 can implement the steps or processes corresponding to the execution of the first device in any one of the embodiments shown in FIG. 12 to FIG. 14, wherein the transceiver unit 1510 can be used to execute any one of the embodiments shown in FIG.
- the processing unit 1520 may be configured to perform operations related to processing of the first device in any one of the embodiments shown in FIG. 12 to FIG. 14 .
- the processing unit 1520 is configured to determine to send the data information to the second device in the second non-public network; the transceiver unit 1510 is configured to send the data information to the user plane network element in the public network; wherein , the first non-public network communicates with the public network through a wireless interface, and the public network communicates with the second non-public network through a wireless interface.
- the transceiver unit 1510 is configured to send the data information to the user plane network element according to a second routing rule, where the second routing rule is used to indicate that the sub-address segment of the second device is different from that in the public network The relationship between the tunnels corresponding to the user plane network elements.
- the transceiving unit 1510 is configured to receive the second routing rule from the control plane network element in the public network.
- the transceiving unit 1510 is configured to send the data information to the user plane network element according to the address of the data information and the second routing rule.
- the device further includes: the transceiver unit 1510 is also used to send an N1 message to the control plane network element in the public network , the N1 message includes an N2 message, and the N2 message is used to establish a wireless connection on the N2 interface; the transceiver unit 1510 is further configured to receive a response message of the N1 message from the control plane network element, and the response message of the N1 message includes the A response message of the N2 message, where the response message of the N2 message is used to indicate that the connection of the N2 interface is successfully established.
- the N1 message further includes first indication information, where the first indication information is used to indicate to process the N2 message.
- the apparatus 1500 may be the control plane network element in the embodiment shown in FIG. 11 , or may be a component (such as a chip) of the control plane network element.
- the device 1500 can implement the steps or processes corresponding to the execution of the network elements of the control plane in the embodiment shown in FIG.
- the processing unit 1520 may be configured to perform processing-related operations of the control plane network element in the embodiment shown in FIG. 11 .
- the transceiver unit 1510 is configured to receive an N1 message from multiple devices, where the N1 message includes an N2 message, where the N2 message is used to establish a wireless connection on the N2 interface, and the multiple devices include a first non-public The first device in the network and the second device in the second non-public network; the processing unit 1520 is configured to process the N1 message and generate a response message to the N1 message; the transceiver unit 1510 is also configured to send the response message to the multiple devices A response message of the N1 message, the response message of the N1 message includes a response message of the N2 message, and the response message of the N2 message is used to indicate that the wireless connection of the N2 interface is successfully established.
- the N1 message further includes first indication information, where the first indication information is used to indicate to process the N2 message.
- the apparatus 1500 may be the first device in the embodiment shown in FIG. 11 , or may be a component (such as a chip) of the first device.
- the apparatus 1500 can implement the steps or processes corresponding to the first device in the embodiment shown in FIG.
- the unit 1520 may be configured to perform processing-related operations of the first device in the embodiment shown in FIG. 11 .
- the processing unit 1520 is configured to generate an N1 message; the transceiver unit 1510 is configured to send the N1 message to a control plane network element in the public network, the N1 message includes an N2 message, and the N2 message is used to establish Wireless connection of the N2 interface; the transceiver unit 1510 is also configured to receive a response message of the N1 message from the control plane network element, the response message of the N1 message includes a response message of the N2 message, and the response message of the N2 message is used for Indicating that the wireless connection of the N2 interface is successfully established; the processing unit 1520 is also configured to process a response message of the N1 message.
- the N1 message further includes first indication information, where the first indication information is used to indicate to process the N2 message.
- the apparatus 1500 here is embodied in the form of functional units.
- the term "unit” here may refer to an application specific integrated circuit (ASIC), an electronic circuit, a processor for executing one or more software or firmware programs (such as a shared processor, a dedicated processor, or a group processor, etc.) and memory, incorporated logic, and/or other suitable components to support the described functionality.
- ASIC application specific integrated circuit
- the device 1500 can be specifically the SMF in any one of the embodiments shown in FIG. 12 to FIG. 14 , and can be used to implement any of the implementations shown in FIG.
- the device 1500 can be specifically UPF2 in any one of the embodiments shown in Figure 12 to Figure 14, and can be used to execute any one of the embodiments shown in Figure 12 to Figure 14
- the various processes and/or steps corresponding to CPE1; the device 1500 may specifically be the AMF in the embodiment shown in FIG.
- the CPE in the embodiment shown in FIG. 11 which can be used to execute various processes and/or steps corresponding to the CPE in the embodiment shown in FIG. 11 ;
- the device 1500 can be specifically the RAN in the embodiment shown in FIG. 11 , and can It is used to execute various processes and/or steps corresponding to the RAN in the embodiment shown in FIG. 11 ; to avoid repetition, details are not repeated here.
- the apparatus 1500 in each of the above solutions has the function of implementing the corresponding steps performed by the network element (such as SMF, or AMF, or UPF, or RAN, or CPE) in the above methods.
- the functions described above may be implemented by hardware, or may be implemented by executing corresponding software on the hardware.
- the hardware or software includes one or more modules corresponding to the above functions; for example, the transceiver unit can be replaced by a transceiver (for example, the sending unit in the transceiver unit can be replaced by a transmitter, and the receiving unit in the transceiver unit can be replaced by a receiver computer), and other units, such as a processing unit, may be replaced by a processor to respectively perform the sending and receiving operations and related processing operations in each method embodiment.
- transceiver unit 1510 may also be a transceiver circuit (for example, may include a receiving circuit and a sending circuit), and the processing unit may be a processing circuit.
- the apparatus in FIG. 15 may be the network element or device in the foregoing embodiments, or may be a chip or a chip system, such as a system on chip (system on chip, SoC).
- the transceiver unit may be an input-output circuit or a communication interface;
- the processing unit is a processor or a microprocessor or an integrated circuit integrated on the chip. It is not limited here.
- this embodiment of the present application provides another communication device 1600 .
- the apparatus 1600 includes a processor 1610, and the processor 1610 is configured to execute computer programs or instructions stored in the memory 1620, or read data/signaling stored in the memory 1620, so as to execute the methods in the foregoing method embodiments.
- processors 1610 there are one or more processors 1610.
- the apparatus 1600 further includes a memory 1620, and the memory 1620 is used for storing computer programs or instructions and/or data.
- the memory 1620 can be integrated with the processor 1610, or can also be set separately.
- the apparatus 1600 further includes a transceiver 1630, and the transceiver 1630 is used for receiving and/or sending signals.
- the processor 1610 is configured to control the transceiver 1630 to receive and/or send signals.
- the apparatus 1600 is used to implement the operations performed by the network element in the foregoing method embodiments.
- the processor 1610 is configured to execute the computer programs or instructions stored in the memory 1620, so as to implement related operations of the user plane network elements in the various method embodiments above. For example, the method performed by the user plane network element in any one of the embodiments shown in FIG. 12 to FIG. 14 .
- the processor 1610 is configured to execute computer programs or instructions stored in the memory 1620, so as to implement related operations of the control plane network elements in the foregoing method embodiments. For example, the method executed by the control plane network element in any one of the embodiments shown in FIG. 12 to FIG. 14 .
- the processor 1610 is configured to execute the computer programs or instructions stored in the memory 1620, so as to implement related operations of the first device in each method embodiment above. For example, the method executed by the first device in any one of the embodiments shown in FIG. 12 to FIG. 14 .
- the processor 1610 is configured to execute computer programs or instructions stored in the memory 1620, so as to implement related operations of the control plane network elements in the foregoing method embodiments. For example, the method performed by the control plane network element in the embodiment shown in FIG. 11 .
- the processor 1610 is configured to execute the computer programs or instructions stored in the memory 1620, so as to implement related operations of the first device in each method embodiment above. For example, the method executed by the first device in the embodiment shown in FIG. 11 .
- processors mentioned in the embodiment of the present application may be a central processing unit (central processing unit, CPU), and may also be other general purpose processors, digital signal processors (digital signal processor, DSP), application specific integrated circuits ( application specific integrated circuit (ASIC), off-the-shelf programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
- a general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.
- the memory mentioned in the embodiments of the present application may be a volatile memory and/or a nonvolatile memory.
- the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
- the volatile memory may be random access memory (RAM).
- RAM random access memory
- RAM can be used as an external cache.
- RAM includes the following multiple forms: static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (synchronous DRAM, SDRAM), Double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (synchlink DRAM, SLDRAM) and direct Memory bus random access memory (direct rambus RAM, DR RAM).
- the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic devices, discrete gate or transistor logic devices, or discrete hardware components
- the memory storage module may be integrated in the processor.
- memories described herein are intended to include, but are not limited to, these and any other suitable types of memories.
- the embodiments of the present application further provide a computer-readable storage medium, on which computer instructions for implementing the methods executed by the network element or device in the foregoing method embodiments are stored.
- the computer when the computer program is executed by a computer, the computer can implement the methods performed by the user plane network element in each embodiment of the foregoing method.
- the computer when the computer program is executed by a computer, the computer can implement the methods executed by the network element of the control plane in each embodiment of the above methods.
- the computer when the computer program is executed by a computer, the computer can implement the method executed by the first device in each of the foregoing method embodiments.
- the embodiments of the present application further provide a computer program product, including instructions, and when the instructions are executed by a computer, the methods executed by the network element or device in the foregoing method embodiments are implemented.
- the disclosed devices and methods may be implemented in other ways.
- the device embodiments described above are only illustrative.
- the division of the units is only a logical function division. In actual implementation, there may be other division methods.
- multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented.
- the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
- the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
- the computer may be a personal computer, a server, or a network device.
- the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server, or data center by wired (eg, coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.).
- the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
- the available medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, DVD), or a semiconductor medium (for example, a solid state disk (SSD), etc.
- the aforementioned available medium includes but Not limited to: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disk and other media that can store program codes.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Les modes de réalisation de la présente demande concernent un procédé et un appareil de communication. Le procédé est appliqué à un réseau public. Le procédé de communication comprend les étapes suivantes : un élément de réseau de plan utilisateur dans un réseau public reçoit des informations de données en provenance d'un premier dispositif dans un premier réseau non public, le réseau public étant en communication avec le premier réseau non public au moyen d'une interface sans fil ; et l'élément de réseau de plan utilisateur envoie les informations de données à un second dispositif dans un second réseau non public selon une première règle de routage, la première règle de routage étant utilisée pour indiquer la relation entre un segment de sous-adresse du second dispositif et un tunnel correspondant au second dispositif, et le réseau public étant en communication avec le second réseau non public au moyen de l'interface sans fil. Au moyen du procédé, lorsque des dispositifs terminaux dans différents réseaux non publics effectuent une transmission d'informations de données inter-domaines, non seulement les caractéristiques d'universalité élevée, de bonne flexibilité et de faible coût sont obtenues, mais la sécurité des informations de données peut également être assurée.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2022/072228 WO2023133871A1 (fr) | 2022-01-17 | 2022-01-17 | Procédé et appareil de communication |
CN202280084103.3A CN118402280A (zh) | 2022-01-17 | 2022-01-17 | 通信方法和装置 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2022/072228 WO2023133871A1 (fr) | 2022-01-17 | 2022-01-17 | Procédé et appareil de communication |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023133871A1 true WO2023133871A1 (fr) | 2023-07-20 |
Family
ID=87279846
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/072228 WO2023133871A1 (fr) | 2022-01-17 | 2022-01-17 | Procédé et appareil de communication |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN118402280A (fr) |
WO (1) | WO2023133871A1 (fr) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110474884A (zh) * | 2019-07-24 | 2019-11-19 | 北京百度网讯科技有限公司 | 以太坊网络系统及通信方法、设备及计算机可读存储介质 |
CN110972218A (zh) * | 2018-09-30 | 2020-04-07 | 华为技术有限公司 | 一种通信方法及装置 |
CN112312489A (zh) * | 2019-07-31 | 2021-02-02 | 华为技术有限公司 | 传输数据的方法、通信装置和通信系统 |
WO2021018652A1 (fr) * | 2019-07-29 | 2021-02-04 | Sony Corporation | Dispositif de communication, équipement d'infrastructure, élément de réseau central, et procédés |
CN112689306A (zh) * | 2019-10-17 | 2021-04-20 | 华为技术有限公司 | 一种数据传输的方法、通信设备及通信系统 |
US20210184875A1 (en) * | 2019-03-29 | 2021-06-17 | Ofinno, Llc | Charging Control for Non-Public Network |
WO2021249430A1 (fr) * | 2020-06-12 | 2021-12-16 | 华为技术有限公司 | Procédé de communication et dispositif associé |
-
2022
- 2022-01-17 CN CN202280084103.3A patent/CN118402280A/zh active Pending
- 2022-01-17 WO PCT/CN2022/072228 patent/WO2023133871A1/fr unknown
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110972218A (zh) * | 2018-09-30 | 2020-04-07 | 华为技术有限公司 | 一种通信方法及装置 |
US20210184875A1 (en) * | 2019-03-29 | 2021-06-17 | Ofinno, Llc | Charging Control for Non-Public Network |
CN110474884A (zh) * | 2019-07-24 | 2019-11-19 | 北京百度网讯科技有限公司 | 以太坊网络系统及通信方法、设备及计算机可读存储介质 |
WO2021018652A1 (fr) * | 2019-07-29 | 2021-02-04 | Sony Corporation | Dispositif de communication, équipement d'infrastructure, élément de réseau central, et procédés |
CN112312489A (zh) * | 2019-07-31 | 2021-02-02 | 华为技术有限公司 | 传输数据的方法、通信装置和通信系统 |
CN112689306A (zh) * | 2019-10-17 | 2021-04-20 | 华为技术有限公司 | 一种数据传输的方法、通信设备及通信系统 |
WO2021249430A1 (fr) * | 2020-06-12 | 2021-12-16 | 华为技术有限公司 | Procédé de communication et dispositif associé |
Non-Patent Citations (2)
Title |
---|
LG ELECTRONICS, LG UPLUS: "KI #2, Conclusion update to resolve EN on RRC_Inactive", SA WG2 MEETING #142E (E-MEETING) S2-2008559, 9 November 2020 (2020-11-09), XP051952602 * |
NOKIA, NOKIA SHANGHAI BELL, ETRI: "(TP for NPN BL CR for 38.300) Mobility aspects of NPN", 3GPP TSG-RAN WG3#106 R3-197777, 25 November 2019 (2019-11-25), XP051831002 * |
Also Published As
Publication number | Publication date |
---|---|
CN118402280A (zh) | 2024-07-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2022048394A1 (fr) | Procédé de connexion réseau, procédé de déconnexion réseau et appareil de communication | |
US20230319556A1 (en) | Key obtaining method and communication apparatus | |
WO2023160199A1 (fr) | Procédé et appareil d'accès à un réseau de communication | |
WO2023124457A1 (fr) | Procédé et appareil de sélection de réseau | |
WO2022194262A1 (fr) | Procédé et appareil de communication de sécurité | |
US20240244497A1 (en) | Communication method and apparatus | |
WO2022199451A1 (fr) | Procédé et appareil de commutation de session | |
CN113595911B (zh) | 数据转发方法、装置、电子设备及存储介质 | |
WO2022170798A1 (fr) | Procédé de détermination de stratégie et appareil de communication | |
WO2023124875A1 (fr) | Procédé et appareil de communication | |
WO2023133871A1 (fr) | Procédé et appareil de communication | |
EP4391648A1 (fr) | Procédé et appareil de communication | |
US20240340709A1 (en) | Communication method and apparatus | |
WO2023185620A1 (fr) | Procédé et appareil de communication | |
WO2023160394A1 (fr) | Procédé et appareil de communication | |
WO2024067200A1 (fr) | Procédé, appareil et système de communication | |
EP4447577A1 (fr) | Procédé et appareil de communication de diffusion | |
US20240244031A1 (en) | Communication method and apparatus | |
WO2023185657A1 (fr) | Procédé de communication et appareil de communication | |
US20240357623A1 (en) | Broadcast communication method and apparatus | |
WO2024032290A1 (fr) | Procédé et appareil d'établissement de session, dispositif de réseau et support de stockage | |
WO2023142717A1 (fr) | Procédé et appareil pour déterminer une politique de sélection d'itinéraire d'équipement utilisateur | |
WO2023116556A1 (fr) | Procédé et appareil de commutation de session | |
US20240236840A1 (en) | Information transmission method and apparatus | |
WO2023197737A1 (fr) | Procédé d'envoi de message, procédé de gestion de pin, appareil de communication et système de communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22919519 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |