WO2023142815A1 - 通信的方法和装置 - Google Patents

通信的方法和装置 Download PDF

Info

Publication number
WO2023142815A1
WO2023142815A1 PCT/CN2022/141395 CN2022141395W WO2023142815A1 WO 2023142815 A1 WO2023142815 A1 WO 2023142815A1 CN 2022141395 W CN2022141395 W CN 2022141395W WO 2023142815 A1 WO2023142815 A1 WO 2023142815A1
Authority
WO
WIPO (PCT)
Prior art keywords
network element
information
terminal
request message
target terminal
Prior art date
Application number
PCT/CN2022/141395
Other languages
English (en)
French (fr)
Inventor
周晓云
宗在峰
廖婷
郑小春
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023142815A1 publication Critical patent/WO2023142815A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data

Definitions

  • the embodiments of the present application relate to the communication field, and more specifically, to a communication method and device.
  • Passive internet of things has large-scale deployment application scenarios, including but not limited to:
  • Logistics and warehousing including goods inventory and tracking, high-value goods (such as vaccines) transportation process environment and goods status monitoring;
  • Passive IoT has simple functions and needs to rely on external incentives to send information.
  • the incentives generally come from card readers.
  • the current deployment method of card readers has the characteristics of short communication distance between card readers and terminals and difficult management. As a result, the scope and scale of scenarios applicable to the operation of passive IoT terminals are relatively small. How to realize the operation of passive IoT terminals in a large-scale and large-coverage environment has become an urgent problem to be solved.
  • the embodiment of the present application provides a communication method, so as to realize the operation on the terminal.
  • a communication method is provided, and the method may be executed by an access network device, or may also be executed by a chip, a chip system or a circuit in the access network device, which is not limited in the present application.
  • the execution by the access network device is taken as an example for description below.
  • the method includes:
  • the access network device receives a first request message, where the first request message is used to request a first operation on the target terminal, where the first request message includes identification information of the target terminal and indication information of the first operation.
  • the access network device sends a first query request to the target terminal according to the first request message, where the first query request is used to acquire identification information of the target terminal.
  • the access network device receives first identification information from a first target terminal, where the first target terminal is one of the target terminals.
  • the access network device sends an operation request message to the first target terminal, where the operation request message is used to request the first target terminal to perform the first operation.
  • the access network device receives a first execution result from the first target terminal, where the first execution result is an execution result of executing the first operation.
  • the access network device can perform an inventory on the target terminal based on the first request message (for example, send a query request and an operation request), thereby implementing an inventory of the terminal by the access network device.
  • the access network devices with card reader functions can cover a larger range of terminals, in order to realize the inventory of terminals in a large-scale and large-coverage environment.
  • the first request message further includes an operation parameter corresponding to the first operation
  • the operation request message further includes the operation parameter
  • the first request message received by the access network device may also include the operating parameters corresponding to the first operation, so that the operation request message issued by the access network device may include the operating parameters corresponding to the first operation , so that the target terminal receiving the operation request can specify how to perform the operation and avoid operation errors.
  • the method further includes: sending the mobility management The functional network element sends a first message, where the first message includes the first identification information and the first execution result.
  • the access network device receives the address of the first receiving network element, where the address is the address at which the first receiving network element receives information, and the access network device sends the first message to the first receiving network element according to the address, The first message includes the first identification information and the first execution result.
  • the access network device receives the first tunnel information, where the first tunnel information is used to indicate the user plane port for receiving the information by the second receiving network element, and the access network device sends the information to the second receiving network element according to the first tunnel information
  • the element sends a first message, where the first message includes the first identification information and the first execution result.
  • the access network device after the access network device completes the inventory of a certain target terminal, it can report the inventory result of the target terminal (for example, the first identification information and the first execution result), and there may be multiple reporting methods (such as , report through the network element of the mobility management function, directly report to the first receiving network element or report through the tunnel), so as to improve the flexibility of the solution.
  • the inventory result of the target terminal for example, the first identification information and the first execution result
  • multiple reporting methods such as , report through the network element of the mobility management function, directly report to the first receiving network element or report through the tunnel
  • the method further includes: the access network device sending a second query request to the target terminal, where the second query request is used to obtain identification information of the target terminal
  • the access network device receives second identification information from a second target terminal, where the second target terminal is one of the target terminals except the first target terminal; the access network device sends the first target terminal to the first target terminal
  • An operation request message the access network device receives a second execution result from the second target terminal, where the second execution result is an execution result of executing the first operation.
  • the access network device may complete an inventory of multiple target terminals covered by the access network device based on the first request message.
  • the method further includes: sending the mobility management The functional network element sends a second message, the second message includes the first identification information and the first execution result, the second identification information and the second execution result; or, the access network device receives the first received An address of a network element, where the address is the address at which the first receiving network element receives information; the access network device sends a second message to the first receiving network element according to the address, and the second message includes the first identification information and the first execution result, the second identification information, and the second execution result; or, the access network device receives first tunnel information, where the first tunnel information is used to indicate the user plane where the second receiving network element receives the information port; the access network device sends a second message to the second receiving network element according to the first tunnel information, and the second message includes the first identification information and the first execution result, the second identification information and the The second execution result.
  • the access network device After the access network device completes the inventory of multiple target terminals, it can report the inventory results of the multiple target terminals, and there are multiple reporting methods, which improves the flexibility of the solution.
  • the first receiving network element includes a capability opening network element or a terminal management function network element.
  • the second receiving network element includes a user plane function network element or a terminal management function user plane function. network element.
  • the method before the access network device receives the first tunnel information, the method further includes: the access network device sends a second request to a mobility management function network element message, the second request message is used to request to acquire the first tunnel information.
  • the above-mentioned first tunnel information may be delivered due to a request of the access network device, giving the access network device an initiative.
  • the method further includes: the access network device receiving a first association identifier, where the first association identifier is used to associate the first request message with the first message Or for associating the first request message with the second message, where the first message and/or the second message includes the first association identifier.
  • the first request message further includes at least one of the following information: first indication information, operation interval duration indication information, operation start time indication information, Operation timeout indication information, wherein the first indication information is used to indicate the area where the access network device sends the query request to the target terminal, and the operation interval duration indication information is used to indicate the interval between two adjacent operations
  • first indication information is used to indicate the area where the access network device sends the query request to the target terminal
  • operation interval duration indication information is used to indicate the interval between two adjacent operations
  • the operation start time indication information is used to indicate the start time of the first operation
  • the operation timeout time indication information is used to indicate the end time of the last operation.
  • different information may be included in the inventory request message, so as to provide more information related to inventory and improve inventory performance.
  • the The method further includes: the access network device operates the target terminal again, wherein the interval between the start time of the operation again and the end time of the operation once is the duration.
  • the identification information of the target terminal includes at least one of the following information: indication information of any target terminal among the target terminals, and the identification information of the target terminal belongs to The value interval of the target terminal, the list of identifiers of the target terminal, the group identifier of the terminal group to which the target terminal belongs, the identifier information of the user to which the target terminal belongs, or the identifier information of the application to which the target terminal belongs.
  • the identification information of the target terminal can be in many different forms, which increases the flexibility of the solution.
  • the first operation includes at least one of the following operations: terminal identification query, read, write, inactivation, lock, block write, block erase, access, encryption , or decrypt.
  • the method further includes: the access network device sending first information, where the first information is used to indicate that an operation on the target terminal is completed.
  • a communication method is provided, which can be executed by a functional network element of the terminal management control plane, or can also be executed by a chip, a chip system, or a circuit in a functional network element of the terminal management control plane. This is not limited.
  • the execution by the functional network element of the terminal management control plane is taken as an example for description below.
  • the method includes:
  • the terminal management control plane function network element receives a third request message from the application application function network element of the application, where the third request message is used to request the first operation on the target terminal, and the third request message includes information about the application, the identification information of the target terminal and indication information of the first operation; the terminal management control plane functional network element sends a first request message to the access network device, where the first request message is used to request the target terminal to perform the first operation, Wherein, the first request message includes identification information of the target terminal and indication information of the first operation.
  • the access network device may be triggered to perform an inventory of the target terminal through the first request message, so as to implement the access network device to inventory the terminal.
  • access network devices with card reader functions can cover a larger range of terminals, in order to realize the inventory of terminals in a large-scale and large-coverage environment.
  • the method before the terminal management control plane functional network element sends the first request message to the access network device, the method further includes: the label management control plane functional network element Determine the terminal management user plane function network element according to the application information; the terminal management control plane function network element sends a fourth request message to the terminal management user plane function network element, and the fourth request message is used to request to obtain the first tunnel information
  • the first tunnel information is used to indicate the first tunnel information of the terminal management user plane function network element receiving data; the terminal management control plane function network element receives the first tunnel information from the terminal management user plane function network element.
  • the label management control plane function network element can obtain the first tunnel information from the terminal management user plane function network element, so as to transmit data through the tunnel.
  • the method before the terminal management control plane functional network element sends the first request message to the access network device, the method further includes: the label management control plane functional network element Determine the terminal management user plane function network element according to the application information; the terminal management control plane function network element determines first tunnel information, and the first tunnel information is used to indicate the terminal management user plane function network element to receive data first For tunnel information, the terminal management control plane functional network element sends the first tunnel information to the terminal management user plane functional network element.
  • the label management control plane function network element can determine the first tunnel information by itself, so as to transmit data through the tunnel.
  • the first request message further includes the first tunnel information.
  • the label management control plane function network element can send the first tunnel information to the access network device, so that the access network device can report the inventory result through the tunnel.
  • the first request message further includes an address of the terminal management control plane functional network element for receiving the notification message.
  • the label management control plane function network element can send the address of the label management control plane function network element receiving the notification message to the access network device, so as to avoid data transmission errors.
  • the third request message further includes the second tunnel information of the data received by the server of the application; or, the terminal management control plane functional network element The information determines the second tunnel information; wherein, the second tunnel information is a user plane port through which the server of the application receives data.
  • the method further includes: the terminal management control plane functional network element sending the second tunnel information to the terminal management user plane functional network element.
  • the method further includes: the terminal management control plane functional network element receiving a first message from the access network device, the first message including the target terminal The first identification information of the first target terminal and the first execution result corresponding to the first target terminal; the terminal management control plane function network element sends the first message to the terminal management user plane function network element;
  • the terminal management control plane function network element receives the second message from the access network device, the second message includes the first identification information of the first target terminal among the target terminals and the first execution corresponding to the first target terminal The result, and the second identification information of the second target terminal and the second execution result corresponding to the second target terminal; the terminal management control plane function network element sends the second message to the terminal management user plane function network element.
  • the access network device can report inventory results in different ways, improving the flexibility of the solution.
  • the third request message further includes at least one of the following information: second indication information, operating parameters corresponding to the first operation, and operation interval duration indication information, operation start time indication information, and operation timeout time indication information, wherein, the second indication information is used to indicate the area where the first operation is to be performed, and the operation interval duration indication information is used to indicate the interval between two adjacent operations.
  • the duration of the interval the operation start time indication information is used to indicate the start time of the first operation
  • the operation timeout time indication information is used to indicate the end time of the last operation
  • the first request message also includes at least one of the following information: first indication information, operation parameters corresponding to the first operation, indication information of the operation interval duration, indication information of the operation start time, indication of the operation timeout time Information, the first indication information is used to indicate the area where the access network device sends the query request to the target terminal.
  • different information may be included in the inventory request message, so as to provide more information related to inventory and improve inventory performance.
  • the method further includes: the terminal management control plane functional network element receiving first information from the access network device, where the first information is used to indicate the The target terminal completes an operation; the terminal management control plane function network element triggers the release of the first tunnel information according to the first information.
  • the application information includes an identifier of the application or a data network access identifier of the application.
  • the applied information can be in many different forms, which increases the flexibility of the solution.
  • a third aspect provides a communication method, which can be executed by a communication system including the access network device in the first aspect and the terminal management control plane functional network element in the second aspect.
  • the method includes:
  • the application function network element of the application sends a third request message to the terminal management function network element, where the third request message is used to request the first operation on the target terminal, and the third request message includes the application information, the target terminal identification information and indication information of the first operation;
  • the terminal management function network element sends a first request message to the access network device, where the first request message is used to request the target terminal to perform the first operation, where the first request message includes identification information of the target terminal and instruction information for the first operation;
  • the access network device sends a query request message and an operation request message to the target terminal, where the query request is used to obtain identification information of the target terminal, and the operation request message is used to request the target terminal to perform the first operation;
  • the access network device sends identification information of one or more of the target terminals and an execution result of the first operation performed by one or more of the target terminals to the terminal management function network element;
  • the terminal management function network element sends the identification information of one or more of the target terminals and an execution result of executing the first operation by one or more of the target terminals to the application.
  • the access network device can perform an inventory on the target terminal based on the first request message (for example, send a query request and an operation request), thereby implementing an inventory of the terminal by the access network device.
  • the access network devices with card reader functions can cover a larger range of terminals, in order to realize the inventory of terminals in a large-scale and large-coverage environment.
  • the terminal management function network element includes a terminal management control plane function network element and a terminal management user plane function network element, and the application function network element of the application sends a terminal management function network element
  • the network element sending the third request message includes: the application function network element of the application sends the third request message to the terminal management control plane function network element; the method also includes: the terminal management control plane function network element according to the application The information determines the terminal management user plane function network element; the terminal management function network element sends the first request message to the access network device, including: the terminal management control plane function network element sends the first request message to the access network device.
  • the method before the terminal management control plane functional network element sends the first request message to the access network device, the method further includes:
  • the label management control plane functional network element determines the terminal management user plane functional network element according to the application information; the terminal management control plane functional network element sends a fourth request message to the terminal management user plane functional network element, and the fourth request The message is used to request to obtain the first tunnel information, and the first tunnel information is used to indicate the first tunnel information of the terminal management user plane function network element to receive data; the terminal management control plane function network element receives data from the terminal management function user plane The first tunnel information of the network element; the first request message also includes the first tunnel information.
  • the method before the terminal management control plane functional network element sends the first request message to the access network device, the method further includes:
  • the label management control plane functional network element determines the terminal management user plane functional network element according to the application information; the terminal management control plane functional network element determines first tunnel information, and the first tunnel information is used to instruct the terminal management user plane
  • the functional network element receives the first tunnel information of the data; the terminal management control plane functional network element sends the first tunnel information to the terminal management user plane functional network element; the first request message also includes the first tunnel information.
  • the first request message further includes an address of the terminal management control plane functional network element for receiving the notification message.
  • the third request message further includes the second tunnel information of the data received by the server of the application; or, the terminal management control plane functional network element The information determines second tunnel information; wherein the second tunnel information is a user plane port through which the server of the application receives data.
  • the method further includes: the terminal management control plane functional network element sending the second tunnel information to the terminal management user plane functional network element.
  • the method further includes: the terminal management control plane functional network element receiving a first message from the access network device, the first message including the target terminal The first identification information of the first target terminal and the first execution result corresponding to the first target terminal; the terminal management control plane function network element sends the first message to the terminal management user plane function network element;
  • the terminal management control plane function network element receives the second message from the access network device, the second message includes the first identification information of the first target terminal among the target terminals and the first execution corresponding to the first target terminal The result, and the second identification information of the second target terminal and the second execution result corresponding to the second target terminal; the terminal management control plane function network element sends the second message to the terminal management user plane function network element.
  • the terminal management user plane function network element receives a first message from the access network device, and the first message includes the first target in the target terminal The first identification information of the terminal and the first execution result corresponding to the first target terminal;
  • the terminal management user plane function network element receives the second message from the access network device, and the second message includes the first identification information of the first target terminal among the target terminals and the first target terminal corresponding to the first target terminal.
  • the terminal management user plane function network element sends the first data to the application server of the application according to the second tunnel information.
  • the application information includes an identifier of the application or a data network access identifier of the application.
  • a communication device in a fourth aspect, includes a processor, configured to implement the functions of the access network device in the method described in the first aspect above.
  • the communication apparatus may further include a memory coupled to the processor, and the processor is configured to implement the function of the access network device in the method described in the first aspect above.
  • the memory is used to store program instructions and data.
  • the memory is coupled with the processor, and the processor can call and execute the program instructions stored in the memory, so as to implement the functions of the access network device in the method described in the first aspect above.
  • the communication device may further include a communication interface, and the communication interface is used for the communication device to communicate with other devices.
  • the communication interface is a transceiver, an input/output interface, or a circuit.
  • the communication device includes: a processor and a communication interface, configured to implement the functions of the access network device in the method described in the first aspect above, specifically including:
  • the processor communicates with the outside through the communication interface
  • the processor is used to run a computer program, so that the device implements any one of the methods described in the first aspect above.
  • the external may be an object other than the processor, or an object other than the device.
  • the communication device is a chip or a chip system.
  • the communication interface may be an input/output interface, interface circuit, output circuit, input circuit, pin or related circuit on the chip or chip system.
  • the processor may also be embodied as a processing circuit or logic circuit.
  • a communication device configured to implement the function of the terminal management control plane function network element in the method described in the second aspect above.
  • the communication device may further include a memory, the memory is coupled to the processor, and the processor is configured to implement the function of the terminal management control plane function network element in the method described in the second aspect above.
  • the memory is used to store program instructions and data.
  • the memory is coupled to the processor, and the processor can call and execute the program instructions stored in the memory, so as to realize the function of the terminal management control plane function network element in the method described in the second aspect above.
  • the communication device may further include a communication interface, and the communication interface is used for the communication device to communicate with other devices.
  • the transceiver may be a communication interface, or an input/output interface.
  • the communication device includes: a processor and a communication interface, configured to implement the functions of the terminal management control plane function network element in the method described in the second aspect above, specifically including:
  • the processor communicates with the outside through the communication interface
  • the processor is used to run a computer program, so that the device implements any one of the methods described in the second aspect above.
  • the external may be an object other than the processor, or an object other than the device.
  • the communication interface may be an input/output interface, interface circuit, output circuit, input circuit, pin or related circuit on the chip or chip system wait.
  • the processor may also be embodied as a processing circuit or logic circuit.
  • a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a communication device, the communication device realizes any of the possible implementations of the first aspect to the second aspect. method.
  • a computer program product including an instruction is provided, and when the instruction is executed by a computer, the communication device implements the method in any possible implementation manner of the first aspect to the second aspect.
  • An eighth aspect provides a communication system, including the communication device described in the fourth aspect and the communication device described in the fifth aspect.
  • FIG. 1 are schematic diagrams of application scenarios applicable to the embodiments of the present application.
  • Fig. 2 is a schematic diagram of a management method of a passive IoT tag.
  • Fig. 3 is a schematic flowchart of a communication method provided by an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of another communication method provided by an embodiment of the present application.
  • FIG. 5 are schematic diagrams of the network architecture provided by the embodiment of the present application.
  • FIG. 6 is a schematic flowchart of another communication method provided by an embodiment of the present application.
  • FIG. 7 is a schematic flowchart of another communication method provided by an embodiment of the present application.
  • FIG. 8 are schematic diagrams of the network architecture provided by the embodiment of the present application.
  • FIG. 9 is a schematic flowchart of another communication method provided by an embodiment of the present application.
  • FIG. 10 is a schematic flowchart of another communication method provided by an embodiment of the present application.
  • FIG. 11 are schematic diagrams of the network architecture provided by the embodiment of the present application.
  • Fig. 12 is a schematic block diagram of a communication device provided according to an embodiment of the present application.
  • Fig. 13 is another schematic block diagram of a communication device provided according to an embodiment of the present application.
  • FIG. 14 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • the technical solutions of the embodiments of the present application can be applied to various communication systems, such as: the fifth generation (5th generation, 5G) system or new radio (new radio, NR), long term evolution (long term evolution, LTE) system, LTE frequency Division duplex (frequency division duplex, FDD) system, LTE time division duplex (time division duplex, TDD), etc.
  • 5G fifth generation
  • NR new radio
  • long term evolution long term evolution
  • LTE frequency Division duplex frequency division duplex
  • FDD frequency division duplex
  • TDD time division duplex
  • the technical solution provided by this application can also be applied to future communication systems, such as the sixth generation mobile communication system.
  • the technical solution of the embodiment of the present application can also be applied to device to device (device to device, D2D) communication, vehicle-to-everything (V2X) communication, machine to machine (machine to machine, M2M) communication, machine Type communication (machine type communication, MTC), and Internet of things (internet of things, IoT) communication system or other communication systems.
  • D2D device to device
  • V2X vehicle-to-everything
  • M2M machine to machine
  • MTC machine Type communication
  • IoT Internet of things
  • the technical solution of the embodiment of the present application can be applied to the 5G network architecture shown in (a) in Figure 1 and/or (b) in Figure 1, and of course can also be used in future network architectures, such as the sixth generation (6th generation generation, 6G) network architecture, etc., which are not specifically limited in this embodiment of the present application.
  • 5G 5G based on point-to-point interfaces in combination with (a) in Figure 1 and (b) in Figure 1.
  • System framework and 5G system framework based on service interface.
  • FIG. 1 shows a schematic architecture diagram of a 5G system 200a to which the embodiment of the present application is applicable.
  • Figure 1 is a schematic diagram of a 5G network architecture based on a point-to-point interface.
  • the network architecture may include but not limited to the following network elements (or called functional network elements, functional entities, nodes, devices, etc.):
  • User equipment user equipment, UE
  • wireless access network equipment
  • access and mobility management function access and mobility management function
  • AMF access and mobility management function
  • SMF session management function
  • UPF user plane function
  • policy control function policy control function
  • PCF policy control function
  • UDM unified data management
  • application function application function, AF
  • NSSF network slice selection function
  • authentication server function authentication server function
  • UDM network exposure function
  • NEF network exposure function
  • a terminal that communicates with (R)AN can also be called terminal equipment, access terminal, subscriber unit, subscriber station, mobile station, mobile station (mobile station, MS), mobile terminal (mobile terminal) terminal, MT), remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or user device.
  • a terminal device may be a device that provides voice/data connectivity to users, for example, a handheld device with a wireless connection function, a vehicle-mounted device, and the like.
  • examples of some terminals can be: mobile phone (mobile phone), tablet computer (pad), computer with wireless transceiver function (such as notebook computer, palmtop computer, etc.), mobile internet device (mobile internet device, MID), virtual reality (virtual reality, VR) equipment, augmented reality (augmented reality, AR) equipment, wireless terminals in industrial control (industrial control), wireless terminals in self driving (self driving), wireless in remote medical (remote medical) Terminals, wireless terminals in smart grid, wireless terminals in transportation safety, wireless terminals in smart city, wireless terminals in smart home, cellular phones, cordless Telephones, session initiation protocol (SIP) phones, wireless local loop (WLL) stations, personal digital assistants (PDAs), handheld devices with wireless communication capabilities, computing devices, or connected Other processing devices to wireless modems, vehicle-mounted devices, wearable devices, terminal devices in the 5G network or terminal devices in the future evolution of the public land mobile network (PLMN), etc.
  • PLMN public land mobile network
  • the terminal device may also be a terminal device in an Internet of Things (Internet of things, IoT) system.
  • IoT Internet of things
  • IoT is an important part of the development of information technology in the future. Its main technical feature is to connect objects to the network through communication technology, so as to realize the intelligent network of human-machine interconnection and object interconnection. IoT technology can achieve massive connections, deep coverage, and terminal power saving through, for example, narrow band (NB) technology.
  • NB narrow band
  • the terminal device may be any device that can access the network.
  • a certain air interface technology may be used to communicate with each other between the terminal device and the access network device.
  • the user equipment can be used as a base station.
  • a user equipment may act as a scheduling entity, which provides sidelink signals between user equipments in V2X or D2D, etc.
  • a cell phone and an automobile communicate with each other using sidelink signals. Communication between cellular phones and smart home devices without relaying communication signals through base stations.
  • (R)AN It is used to provide network access functions for authorized user equipment in a specific area, and can use transmission tunnels with different service qualities according to the level of user equipment and business requirements.
  • (R)AN can manage wireless resources, provide access services for user equipment, and then complete the forwarding of control signals and user equipment data between user equipment and the core network.
  • (R)AN can also be understood as a base station in a traditional network.
  • the access network device in the embodiment of the present application may be any communication device with a wireless transceiver function for communicating with the user equipment.
  • the access network equipment includes but not limited to: evolved Node B (evolved Node B, eNB), radio network controller (radio network controller, RNC), Node B (Node B, NB), base station controller (base station controller) , BSC), base transceiver station (base transceiver station, BTS), home base station (home evolved Node B, HeNB, or home Node B, HNB), baseband unit (baseBand unit, BBU), wireless fidelity (wireless fidelity, WIFI ) system in the access point (access point, AP), wireless relay node, wireless backhaul node, transmission point (transmission point, TP) or transmission and reception point (transmission and reception point, TRP), etc., can also be 5G , such as, NR, gNB in the system, or, transmission point (TRP or TP), one or a group (including multiple antenna panels
  • a gNB may include a centralized unit (CU) and a DU.
  • the gNB may also include an active antenna unit (AAU).
  • the CU implements some functions of the gNB, and the DU implements some functions of the gNB.
  • the CU is responsible for processing non-real-time protocols and services, and realizing the functions of radio resource control (radio resource control, RRC) and packet data convergence protocol (packet data convergence protocol, PDCP) layer.
  • the DU is responsible for processing physical layer protocols and real-time services, realizing the functions of the radio link control (radio link control, RLC) layer, media access control (media access control, MAC) layer and physical (physical, PHY) layer.
  • the AAU implements some physical layer processing functions, radio frequency processing and related functions of active antennas. Since the information of the RRC layer will eventually become the information of the PHY layer, or be transformed from the information of the PHY layer, under this architecture, high-level signaling, such as RRC layer signaling, can also be considered to be sent by the DU , or, sent by DU+AAU.
  • the access network device may be a device including one or more of a CU node, a DU node, and an AAU node.
  • the CU can be divided into access network devices in the access network (radio access network, RAN), and the CU can also be divided into access network devices in the core network (core network, CN). Do limited.
  • User plane network element used for packet routing and forwarding and quality of service (QoS) processing of user plane data.
  • QoS quality of service
  • the user plane network element may be a UPF network element, which may include an intermediate user plane function (intermediate user plane function, I-UPF) network element, an anchor user Plane function (PDU Session anchor user plane function, PSA-UPF) network element.
  • I-UPF intermediate user plane function
  • PSA-UPF anchor user Plane function
  • the user plane network element may still be a UPF network element, or may have other names, which are not limited in this application.
  • Data network a network used to provide data transmission.
  • the data network may still be a DN, or may have other names, which are not limited in this application.
  • the terminal equipment accesses the network, it can establish a protocol data unit (protocol data unit, PDU) session, and access the DN through the PDU session, and can communicate with the application function network element deployed in the DN (application function network element such as for the application server) interaction.
  • PDU protocol data unit
  • the network can select the UPF that accesses the DN as the PDU Session Anchor (PSA) according to the network policy, and access it through the N6 interface of the PSA Application function network element.
  • PSA PDU Session Anchor
  • Access and mobility management network element mainly used for mobility management and access management, etc., and can be used to implement functions other than session management in the mobility management entity (MME) function, For example, functions such as lawful interception and access authorization/authentication.
  • MME mobility management entity
  • the access management network element may be an AMF network element.
  • the access management network element may still be an AMF network element, or may have other names, which are not limited in this application.
  • Session management network element mainly used for session management, network interconnection protocol (internet protocol, IP) address allocation and management of terminal equipment, selection of manageable terminal equipment plane functions, termination points of policy control and charging function interfaces, and downlink Data Notification etc.
  • IP network interconnection protocol
  • the session management network element may be an SMF network element, and may include an intermediate session management function (intermediate session management function, I-SMF) network element, an anchor session Management function (anchor session management function, A-SMF) network element.
  • I-SMF intermediate session management function
  • A-SMF anchor session management function
  • the session management network element may still be an SMF network element, or may have other names, which are not limited in this application.
  • Policy control network element a unified policy framework used to guide network behavior, and provide policy rule information for control plane functional network elements (such as AMF, SMF network elements, etc.).
  • the policy control network element may be a policy and charging rules function (policy and charging rules function, PCRF) network element.
  • policy control network element may be a PCF network element.
  • the policy control network element may still be a PCF network element, or may have other names, which are not limited in this application.
  • Data management network element used to process terminal device identification, access authentication, registration, and mobility management.
  • the data management network element may be a UDM network element or a UDR network element.
  • the unified data management may still be UDM, UDR network element, or may have other names, which are not limited in this application.
  • the UDM or UDR network element in this embodiment of the present application may refer to a user database. Can exist as a single logical repository for storing user data.
  • Application function network elements can interact with 5G systems through application function network elements, and are used to access network open function network elements or interact with policy frameworks for policy control, etc.
  • the application function network element may be an application function, AF network element.
  • the application function network element may still be an AF network element, or may have other names, which are not limited in this application.
  • Network slice selection network element mainly includes the following functions: select a group of network slice instances for the UE, determine the allowed network slice selection assistance information (network slice selection assistance information, NSSAI), and determine the AMF set that can serve the UE, etc.
  • NSSAI network slice selection assistance information
  • the network element selected for network slicing may be an NSSF network element.
  • the network element selected for network slicing may still be an NSSF network element, or may have other names, which are not limited in this application.
  • Authentication service network element used for authentication services, generating keys to realize two-way authentication of terminal equipment, and supporting a unified authentication framework.
  • the authentication service network element may be an AUSF network element.
  • the authentication service function network element may still be an AUSF network element, or may have other names, which are not limited in this application.
  • Network opening function network element used to provide customized functions for network opening.
  • the network exposure function network element may be a network exposure function (network exposure function, NEF) network element.
  • NEF network exposure function
  • the network exposure function network element is still It may be an NEF network element, or may have other names, which are not limited in this application.
  • the 5G communication system can also open 5GC-supported capabilities to external application function network elements through NEF network elements, such as providing small data transmission capabilities.
  • the above-mentioned network element or function may be a network element in a hardware device, a software function running on dedicated hardware, or a virtualization function instantiated on a platform (for example, a cloud platform).
  • the above-mentioned network elements or functions can be divided into one or more services, and further, there may also be services that exist independently of network functions.
  • an instance of the above-mentioned function, or an instance of a service included in the above-mentioned function, or a service instance existing independently of the network function may be referred to as a service instance.
  • the AF network element may be referred to as AF
  • the NEF network element may be referred to as NEF
  • the AMF network element may be referred to as AMF. That is, the AF described in the subsequent application can be replaced by an application function network element, the NEF can be replaced by a network opening function network element, and the AMF can be replaced by an access and mobility management network element.
  • the above-mentioned network element or functional network element may be a network element in a hardware device, or a software function running on dedicated hardware, or a virtualization function instantiated on a platform (for example, a cloud platform).
  • the above-mentioned network elements or functions can be divided into one or more services, and further, there may also be services that exist independently of network functions.
  • an instance of the above-mentioned function, or an instance of a service included in the above-mentioned function, or a service instance existing independently of the network function may be referred to as a service instance.
  • N1 the interface between the AMF and the terminal, which can be used to transmit QoS control rules and the like to the terminal.
  • N2 the interface between the AMF and the RAN, which can be used to transfer radio bearer control information from the core network side to the RAN.
  • N3 the interface between the RAN and the UPF, mainly used to transfer the uplink and downlink user plane data between the RAN and the UPF.
  • N4 The interface between SMF and UPF, which can be used to transfer information between the control plane and the user plane, including controlling the distribution of forwarding rules, QoS control rules, traffic statistics rules, etc. Information reporting.
  • N5 the interface between the AF and the PCF, which can be used for sending application service requests and reporting network events.
  • N6 the interface between UPF and DN, used to transfer the uplink and downlink user data flow between UPF and DN.
  • N7 the interface between PCF and SMF, which can be used to deliver protocol data unit (protocol data unit, PDU) session granularity and service data flow granularity control policy.
  • protocol data unit protocol data unit
  • PDU protocol data unit
  • N8 The interface between AMF and UDM, which can be used for AMF to obtain subscription data and authentication data related to access and mobility management from UDM, and for AMF to register terminal current mobility management related information with UDM.
  • N9 a user plane interface between UPF and UPF, used to transmit uplink and downlink user data flows between UPFs.
  • N10 the interface between SMF and UDM, which can be used for SMF to obtain session management-related subscription data from UDM, and for SMF to register terminal current session-related information with UDM.
  • N11 the interface between SMF and AMF, which can be used to transfer PDU session tunnel information between RAN and UPF, transfer control messages sent to terminals, transfer radio resource control information sent to RAN, etc.
  • N12 the interface between AMF and AUSF, which can be used for AMF to initiate an authentication process to AUSF, which can carry SUCI as a subscription identifier;
  • N13 the interface between UDM and AUSF, which can be used for AUSF to obtain user authentication vector from UDM to execute the authentication process.
  • FIG. 1 shows a schematic architecture diagram of a 5G system 200b to which this embodiment of the present application applies.
  • FIG. 1 is a schematic diagram of a 5G network architecture based on a service interface.
  • the network architecture may include but not limited to the following network elements (or called functional network elements, functional entities, nodes, devices, etc.):
  • UE UE, (R)AN, AMF network element, SMF network element, UPF network element, PCF network element, UDM network element, AF network element, DN, NSSF, AUSF, UDM, NEF network element, UDR, etc.
  • Nnssf, Nudr, Nausf, Nnef, Namf, Npcf, Nsmf, Nudm, and Naf in (b) in Figure 1 are the service interfaces provided by the above-mentioned NSSF, UDR, AUSF, NEF, AMF, PCF, SMF, UDM, and AF, respectively , which is used to call the corresponding service-oriented operation.
  • N1, N2, N3, N4, and N6 are interface serial numbers. The meanings of these interface serial numbers may refer to the meanings defined in the third generation partnership project (3rd generation partnership project, 3GPP) standard agreement, and no limitation is made here.
  • the AMF, SMF, UPF, PCF, NEF, etc. shown in (a) in Figure 1 or (b) in Figure 1 can be understood as network elements for implementing different functions, for example, they can be combined into Network slicing. These network elements can be independent devices, or can be integrated in the same device to achieve different functions, or can be network elements in hardware devices, or software functions running on dedicated hardware, or platforms (for example, cloud The virtualization function instantiated on the platform), this application does not limit the specific form of the above network elements.
  • passive tag inventory that is, radio frequency identification (radio frequency identification, RFID)
  • RFID radio frequency identification
  • Logistics and warehousing including goods inventory and tracking, high-value goods (such as vaccines) transportation process environment and goods status monitoring;
  • RFID has the prospect of large-scale deployment and is predicted to cover hundreds of billions of devices in the future.
  • the passive or semi-passive functions are simple, so that RFID needs to rely on external incentives to send information.
  • the incentives generally come from card readers (or readers).
  • the current deployment method of card readers exists in card readers.
  • the communication distance with the tag is short, and the tag management is difficult.
  • the scope and scale of scenarios applicable to the inventory of passive IoT tags are relatively small.
  • FIG. 2 An inventory method of passive IoT tags is shown in Figure 2, and Figure 2 is a schematic diagram of a management method of passive IoT tags.
  • the communication distance between the card reader and the tag is short, and the device where the card reader is deployed cannot manage tags in a wide range.
  • the P-IoT Tag shown in Figure 2 means a passive IoT tag; the card reader means a reader (or reader, interrogator) in radio frequency identification technology for reading (and sometimes writing) tag information
  • the device; the application server can be understood as an AF network element.
  • the card reader performs management operations such as reading (read), writing (write), access (access), and inactivation (kill) on passive IoT tags according to the instructions of the application server.
  • management operations such as reading (read), writing (write), access (access), and inactivation (kill) on passive IoT tags according to the instructions of the application server.
  • the scope and scale of scenarios that this passive IoT tag inventory method is applicable to are relatively small.
  • the embodiment of this application is based on the 5G communication system architecture described in (a) in FIG. 1 or (b) in FIG. 1, and realizes the unified management of passive IoT by the base station by integrating the new air interface technology of the card reader in the base station. In order to realize the inventory of passive IoT terminals in a large-scale and large-coverage environment.
  • the method provided in the embodiment of the present application may be applied to a 5G communication system, for example, the communication system shown in (a) in FIG. 1 or (b) in FIG. 1 .
  • this embodiment of the present application does not limit the applicable scenarios of the method, for example, it is also applicable to other network architectures including network elements capable of implementing corresponding functions.
  • the 6th generation communication the 6th generation, 6G system architecture, etc.
  • the names of the various network elements used above in the embodiments of the present application may keep the same function in the future communication system, but the names will be changed.
  • PDU Packet data unit
  • a PDU session is an association between a terminal device and a DN, and is used to provide a PDU connection service.
  • the UE accesses the network, it establishes a PDU session, and accesses the external DN through the PDU session, and interacts with the application server deployed in the DN.
  • the network can select the UPF of the access DN as the anchor (that is, PSA UPF) according to the network policy, and access the application server through the N6 interface of the PSA UPF.
  • the 5G system can also open the capability supported by the 5G core network (5G core, 5GC) to the external AF through the NEF network element.
  • 5G core network 5G core, 5GC
  • Radio frequency identification technology is a new automatic identification technology developed in the 1980s.
  • Radio frequency identification technology is a technology that uses radio frequency signals to achieve non-contact information transmission through spatial coupling (alternating magnetic field or electromagnetic field) and achieve identification through the transmitted information. purpose technology.
  • RFID is a simple wireless system for controlling, detecting and tracking objects.
  • the wireless system consists of a card reader (or called reader, reader, interrogator, etc.) and many terminals (or called transponder).
  • the RFID card reader communicates wirelessly with the RFID terminal through the antenna, and can read or write the terminal identification code and memory data.
  • a typical card reader consists of a high frequency module (transmitter and receiver), a control unit and a reader antenna.
  • the terminal is composed of coupling elements and chips, each terminal has a unique electronic code, which is attached to the object to identify the target object; the card reader (Reader) is used to read (and sometimes write) terminal information
  • the device can be designed as a handheld RFID reader or a fixed reader.
  • the reader uses three basic operations to manage the terminal group (tag population) within its effective reading area of the reader.
  • Each of these operations can include multiple commands. Operations are defined as follows:
  • the set of commands used for selection operations includes the Select command.
  • the command set used for inventory operations includes Query, Query Adjust, Query Rep, ACK and NAK commands.
  • the card reader can perform core operations, such as reading, writing, locking or killing the terminal; security-related operations, such as authenticating the terminal; or file-related operations, such as opening a specific file in the terminal memory.
  • the command set used for access operation includes Req_RN and Authentication (Authenticate) commands.
  • the terminal management function network element involved in the embodiment of this application may be a newly added functional network element independently established in the 5G core network (5G core, 5GC), or it may be jointly established with the existing network elements in the 5GC network element (for example, co-located with NEF or AMF), among them, the co-location of terminal management function network element with an existing network element can be understood as the enhancement of the function of an existing network element, so that the existing network element Network elements have terminal management functions.
  • the network element with the terminal management function is used to realize the forwarding and processing of the terminal inventory request message.
  • the specific forwarding and processing methods will be described in detail in the following embodiments and will not be repeated here.
  • the embodiments shown below do not specifically limit the specific structure of the execution subject of the method provided by the embodiment of the present application, as long as the program that records the code of the method provided by the embodiment of the present application can be run to provide the method according to the embodiment of the present application.
  • the execution subject of the method provided by the embodiment of the present application may be a core network device, or a functional module in the core network device that can call a program and execute the program.
  • for indicating can be understood as “enabling”, and “enabling” can include direct enabling and indirect enabling.
  • enabling can include direct enabling and indirect enabling.
  • information for enabling A it may include that the information directly enables A or indirectly enables A, but it does not mean that A must be carried in the information.
  • the information enabled by the information is called the information to be enabled.
  • the information to be enabled can be directly enabled.
  • the to-be-enabled information may also be indirectly enabled by enabling other information, where there is an association relationship between the other information and the to-be-enabled information.
  • specific information can also be enabled by means of a pre-agreed (for example, protocol-specified) arrangement order of each information, thereby reducing the enabling overhead to a certain extent.
  • common parts of each information can be identified and enabled uniformly, so as to reduce the enabling overhead caused by enabling the same information separately.
  • pre-configuration may include pre-definition, for example, protocol definition.
  • predefinition for example, protocol definition.
  • "predefine” can be realized by pre-saving corresponding codes, tables or other methods that can be used to indicate related information in the device (for example, including each network element), and this application does not limit its specific implementation.
  • the "storage" mentioned in the embodiment of the present application may refer to saving in one or more memories.
  • the one or more memories may be provided independently, or may be integrated in an encoder or decoder, a processor, or a communication device.
  • a part of the one or more memories may also be provided separately, and a part may be integrated in a decoder, a processor, or a communication device.
  • the type of the storage may be any form of storage medium, which is not limited in this application.
  • the "protocol” involved in the embodiment of this application may refer to a standard protocol in the communication field, for example, it may include 5G protocol, new radio (new radio, NR) protocol and related protocols applied in future communication systems. Applications are not limited to this.
  • the access network device is referred to as RAN
  • the mobility management function network element is AMF
  • the terminal management control plane function network element is called terminal management function network element-CP
  • the terminal management user plane function network element is called terminal
  • the session management function network element is SMF
  • the application function network element is AF
  • the user plane function network element is UPF
  • the terminal is UE as an example for illustration.
  • Fig. 3 is a schematic flowchart of a communication method provided by an embodiment of the present application. The communication method will be described in detail below in conjunction with each step.
  • the RAN receives the first request message from the network element with the terminal management function, or in other words, the network element with the terminal management function sends the first request message to the RAN.
  • the terminal management function network element sends the first request message to the RAN, including the following possible ways:
  • the terminal management function network element directly sends the first request message to the RAN, the terminal management function network element sends the first request message to the RAN through the AMF, and the terminal management function network element-CP sends the first request message to the RAN (for example, the terminal management function network element
  • the element-CP sends the first request message to the RAN after receiving the third request message from the AF)
  • the terminal management function network element-CP sends the first request message to the RAN through the AMF (for example, the terminal management function network element-CP is in After receiving the third request message from the AF, send the first request message to the RAN through the AMF).
  • the first request message is used to request a first operation on the target terminal, and the first request message includes identification information of the target terminal and indication information of the first operation.
  • the first request message may be interpreted as a request message requesting the RAN to take inventory of terminals, and may be called: an inventory request message.
  • inventory refers to performing a first operation on a target terminal.
  • the identification information of the target terminal is used to indicate the target terminal to be inventoried, and the identification information of the target terminal includes but is not limited to:
  • the terminals to be inventoried include three terminals, and the identifiers of the three terminals are respectively terminal #1, terminal #2, and terminal #3, and the above-mentioned identification information of the target terminal may be a terminal identification list, such as terminal #1 , Terminal #2 and Terminal 3.
  • the terminals to be inventoried include three terminals whose identifiers are 100, 101, and 102 respectively, and the above-mentioned identifier information of the target terminal may be a range of terminal identifiers, for example, 100-102.
  • the identifiers of the three terminals are terminal #1, terminal #2, and terminal #3 respectively.
  • the instruction information of any one of the target terminals refers to taking inventory of all these three terminals.
  • the terminals to be inventoried include three terminals, and the three terminals belong to a terminal group, and the group identifier of the terminal group is terminal group #1, and the above-mentioned identification information of the target terminal may be the group identifier of the terminal group to which the target terminal belongs , eg, Terminal Group #1.
  • the terminals to be inventoried include three terminals, and the three terminals belong to a user whose user ID is user #1.
  • the above-mentioned identification information of the target terminal may be the identification of the user to which the target terminal belongs, for example, user 1.
  • the terminals to be inventoried include three terminals, and the three terminals all belong to passive terminals or all belong to semi-passive terminals.
  • the above identification information of the target terminal may be a passive terminal or a semi-passive terminal.
  • the terminals to be inventoried include three terminals, the three terminals belong to an application, and the application identifier of the application is application #1, and the above identification information of the target terminal may be the identification of the application to which the target terminal belongs, for example, application # 1.
  • the indication information of the first operation is used to indicate the first operation to be performed, including but not limited to:
  • the identifier of the first operation The identifier of the first operation, the value interval to which the identifier of the first operation belongs, the list of identifiers of the first operation, the group identifier of the operation group to which the first operation belongs, and the like.
  • the operations to be performed include an operation, and the identifier of the operation is operation #1, and the indication information of the above-mentioned first operation may be the identifier of the first operation, for example, operation #1.
  • the operations to be performed include three operations, and the identifiers of the three operations are respectively operation #1, operation #2, and operation #3, and the indication information of the above-mentioned first operation may be an identifier list of operations, such as, operation #1, operation #2 and operation 3.
  • the operations to be performed include three operations, and the three operations belong to an operation group, and the group identifier of the operation group is operation group #1, and the indication information of the above-mentioned first operation may be the group identifier of the operation group to which the operation belongs , eg, Action Group #1.
  • the above-mentioned first operation may include one or more operations, and in the case that the first operation includes multiple operations (for example, operation #1 and operation #2), the instruction information of the above-mentioned first operation may include respectively Indication information indicating the multiple operations (for example, indication information indicating operation #1 and indication information indicating operation #2).
  • the first operation includes at least one of the following:
  • Query terminal identification read, write, kill, lock, block write, block erase, access, encryption, decryption, etc.
  • the identification information of the target terminal may not be included in the first request message, for example, the identification information of the area is included in the first request message, indicating that the terminal in a certain area is to be inventoried; also for example, The first request message only triggers an inventory, and specifically, target terminals for an inventory may be all terminals covered by the RAN.
  • the first request message may not include the indication information of the first operation, for example, the AF does not have a command to execute the operation; for another example, the default operation is to query the terminal ID, and no additional operation instructions are required. instruct.
  • the RAN After the RAN receives the above-mentioned first request message, the RAN performs an inventory process, and the method flow shown in FIG. 3 also includes:
  • the RAN sends a first query message to the target terminal, or in other words, the target terminal receives the first query message from the RAN.
  • the target terminals include a first target terminal, a second target terminal, ..., an Nth target terminal as shown in FIG. 3 .
  • the first query message is used to acquire the identification information of the target terminal.
  • the RAN after receiving the first request message, the RAN triggers an inventory process, which specifically includes:
  • the RAN sends radio frequency information to all terminals in the coverage area, so as to provide incentive signals to all terminals in the coverage area of the RAN, so that the terminals can send signals to the RAN.
  • the RAN sends a selection message to all terminals in the coverage area, and the selection message is used to select a terminal (ie, a target terminal) to be inventoried among all terminals, and the target terminal of the selection message is determined according to the first request message;
  • the RAN sends a query request message to the selected terminal among all the terminals, where the query request message is used to obtain the identifier of the selected terminal, and the selected terminal is the terminal to be inventoried among the all terminals.
  • the selected target terminal initiates a random access process, and one terminal device succeeds in random access, which is the first target terminal in this embodiment.
  • the specific random access process may be: the RAN includes the first random number in the first query message, and the selected target terminal locally sets the second random number according to the first random number. If the second random number set by a terminal is 0, the terminal sends the third random number to the RAN. If the RAN can correctly receive the third random number, the RAN sends the third random number to the terminal device. When the terminal receives the third random number, the terminal device determines that the random access is successful. After the terminal confirms that the randomization is successful, it sends the identification information of the terminal to the RAN;
  • the RAN receives the identification information sent from the first target terminal.
  • the RAN can obtain the first identification information of the first target terminal to be inventoried through the first query request, and the method flow shown in FIG. 3 also includes:
  • the RAN receives first identification information from the first target terminal, or in other words, the first target terminal sends the first identification information to the RAN.
  • the first target terminal is one of the target terminals to be inventoried.
  • the first target terminal is a random target terminal among the target terminals to be inventoried, or in other words, the first target terminal is any target terminal among the target terminals to be inventoried.
  • the RAN obtains the first After identifying the information, there is no need to send an operation request message corresponding to the indication information of the first operation to the first target terminal; or,
  • the method flow shown in FIG. 3 further includes:
  • the RAN sends an operation request message to the first target terminal, or in other words, the first target terminal receives the operation request message from the RAN.
  • the operation request message is used to request the first target terminal to perform the first operation.
  • the first target terminal executes a first operation to obtain a first execution result.
  • the execution result includes the read data.
  • the execution result is an indication of success or failure.
  • the method flow shown in FIG. 3 further includes:
  • the first target terminal sends the first execution result to the RAN, or in other words, the RAN receives the first execution result from the first target terminal.
  • the RAN needs to complete the inventory of all target terminals.
  • the target terminals to be inventoried include multiple target terminals
  • the RAN needs to continue the inventory of other target terminals in sequence after receiving the first execution result of the first target terminal The target terminal until an inventory is completed, wherein "sequentially" should be understood as sending a query request (also called a query repeat request) after receiving the execution result of a target terminal, and repeating this until an inventory is completed. That is to say, the RAN needs to execute the above S320 to S350 for each target terminal among the target terminals to be inventoried.
  • the method flow shown in Figure 3 also includes:
  • the RAN sends at least one second query request to the target terminal, or in other words, the target terminal receives at least one second query request from the RAN.
  • the RAN sending at least one second query request to the target terminal is: the RAN sends at least one second query request to the target terminal.
  • the query requests after inventorying the first target terminal are collectively referred to as the second query request.
  • the specific process is as follows: the RAN sends a query repeat request to the target terminal, and the first target terminal exits the inventory process after receiving the query repeat request, that is, no longer responds to the operation request of the target terminal. After receiving the query repeat request, other target terminals initiate a random access process, and one of the terminal devices succeeds in random access, which is the second target terminal in this embodiment.
  • the specific random access process may be: other target terminals subtract 1 from the previously set second random number, and if the second random number of a target terminal device is reduced to 0, the target terminal sends a fourth random number to the RAN. If the RAN can correctly receive the fourth random number, the RAN sends the fourth random number to the target terminal. When the target terminal receives the fourth random number, the target terminal determines that the random access is successful. After the random access of the second target terminal succeeds, the identification information of the second target terminal is sent to the RAN.
  • the RAN receives at least one second identification information from at least one second target terminal, or in other words, at least one second target terminal sends at least one second identification information to the RAN.
  • the at least one second target terminal is a target terminal other than the first target terminal among the target terminals to be inventoried.
  • the at least one second target terminal sending at least one second identification information to the RAN is: the at least one second target terminal sends the second identification information to the RAN in response to different second query requests.
  • the RAN sends an operation request message to at least one second target terminal, or in other words, at least one second target terminal receives the operation request message from the RAN.
  • the operation request message is used to request at least one second target terminal to perform the first operation.
  • At least one second target terminal obtains at least one second execution result after performing the first operation, and the method flow shown in FIG. 3 also includes:
  • At least one second target terminal executes the first operation to obtain at least one second execution result.
  • the second execution result includes the read data.
  • the second execution result is an indication of success or failure.
  • the RAN receives at least one second execution result from the at least one second target terminal, or in other words, the at least one second target terminal sends the at least one second execution result to the RAN.
  • the first request message further includes an operation parameter corresponding to the first operation
  • the operation request message further includes the operation parameter
  • the instruction information of the first operation may be called a read command.
  • the operating parameters include the storage area to be read, the starting word address and word number of the storage area to be read, and the like.
  • the instruction information of the first operation may be called a write command.
  • the operating parameters include the storage area to be written, the starting word for reading the storage area, and the data to be written.
  • the same written information may be carried for all target terminals, or different written information may be carried for different target terminals.
  • the indication information and operation parameters of the first operation may be included in the first request message, and reference may be made to the indication information and operation parameters of the operation received by the card reader in the related art , may also be instruction information and operating parameters received by the card reader after the future technological development, which will not be repeated here.
  • the RAN may report the identification information and execution results of the target terminal to the terminal management function network element.
  • the manner in which the RAN reports the identification information and execution results of the target terminal Including the following two types:
  • Mode 1 The RAN reports the identification information and the execution result of each target terminal respectively.
  • the RAN reports the first identification information of the first target terminal and the first execution result.
  • the RAN sends a first message to the AMF, where the first message includes the first identification information and the first execution result, and the method flow shown in FIG. 3 further includes:
  • the RAN sends a first message to the AMF.
  • the first receiving network element includes a NEF or a terminal management function network element.
  • the AMF receives the address of the first receiving network element, and the address is the address of the first receiving network element receiving information; the RAN sends the first message to the first receiving network element according to the address, and the The first message includes the first identification information and the first execution result.
  • the method flow shown in Figure 3 also includes:
  • the RAN receives the address of the first receiving network element from the AMF.
  • the network element with a terminal management function sends the address of the network element with a terminal management function to the RAN through the AMF.
  • the NEF when the first receiving network element is a NEF, the NEF sends the address of the NEF to the RAN through the AMF.
  • the RAN sends the first message to the first receiving network element.
  • the second receiving network element includes a UPF or a terminal management function network element-UP.
  • the RAN receives the first tunnel information, and the first tunnel information is used to indicate the user plane port on which the second receiving network element receives the information; the RAN sends the information to the second receiving network element according to the first tunnel information A first message, where the first message includes the first identification information and the first execution result.
  • the method flow shown in Figure 3 also includes:
  • the RAN receives first tunnel information from the AMF.
  • the UPF when the first receiving network element is a UPF, the UPF sends the first tunnel information to the RAN through the AMF.
  • the terminal management function network element-UP sends the first tunnel information to the RAN through the AMF.
  • the RAN sends the first message to the second receiving network element.
  • the sending of the first tunnel information by the AMF to the RAN may be based on a request of the RAN, and the method flow shown in FIG. 3 further includes:
  • the RAN sends a second request message to the AMF.
  • the second request message is used to request to acquire the first tunnel information.
  • the three RANs may report inventory results (such as the above-mentioned identification information and execution results) through the tunnel.
  • inventory results such as the above-mentioned identification information and execution results
  • Method 2 The RAN uniformly reports the identification information and execution results of the target terminals for all target terminals (referring to all target terminals received by the RAN).
  • the RAN reports the identification information of the multiple terminals and the execution results of the multiple terminals. result.
  • the multiple terminals include the first target terminal and the at least one second target terminal.
  • the RAN sends a second message to the AMF, where the second message includes identification information of the multiple terminals and execution results of the multiple terminals, and the method flow shown in FIG. 3 further includes:
  • the RAN sends a second message to the AMF.
  • the first receiving network element includes a NEF or a terminal management function network element.
  • the RAN receives the address of the first receiving network element, where the address is the address at which the first receiving network element receives information; the RAN sends a second message to the first receiving network element according to the address, The second message includes identification information of the multiple terminals and execution results of the multiple terminals.
  • the method flow shown in Figure 3 also includes:
  • the RAN receives the address of the first receiving network element from the AMF.
  • the network element with a terminal management function sends the address of the network element with a terminal management function to the RAN through the AMF.
  • the NEF when the first receiving network element is a NEF, the NEF sends the address of the NEF to the RAN through the AMF.
  • the RAN sends the second message to the first receiving network element.
  • the second receiving network element includes a UPF or a terminal management function network element-UP.
  • the RAN receives the first tunnel information, and the first tunnel information is used to indicate the user plane port on which the second receiving network element receives the information; the RAN sends the information to the second receiving network element according to the first tunnel information A second message, where the second message includes identification information of the multiple terminals and execution results of the multiple terminals.
  • the method flow shown in Figure 3 also includes:
  • the RAN receives first tunnel information from the AMF.
  • the SMF sends the first tunnel information to the RAN through the AMF.
  • the terminal management function network element-CP sends the first tunnel information to the RAN through the AMF.
  • the RAN sends the first message to the second receiving network element.
  • the sending of the first tunnel information by the AMF to the RAN may be based on a request of the RAN, and the method flow shown in FIG. 3 further includes:
  • the RAN sends a second request message to the AMF.
  • the second request message is used to request to acquire the first tunnel information.
  • the RAN may receive multiple first request messages, and request the RAN to take inventory of different target terminals respectively.
  • the first request message includes a first association identifier
  • the first association identifier is used for associating the first request message with the first message or for associating the first request message with the second message
  • the first message and/or the second message includes the first association identifier.
  • the first request message further includes first indication information, where the first indication information is used to instruct the RAN to send the query request area to the target terminal.
  • the area where the query request is sent includes the location of the terminal to be inventoried, and the first indication information includes but not limited to 3GPP location information (eg, TA list, Cell list, etc.).
  • 3GPP location information eg, TA list, Cell list, etc.
  • the terminals to be inventoried include three terminals, and the three terminals are respectively located in cell#1, cell#2, and cell#3, and the above indication information for indicating the inventory area may be 3GPP position information of the terminal, such as , cell#1, cell#2 and cell#3.
  • the first request message also includes the indication information of the operation interval time length, which can be understood as the minimum inventory interval, which is used to indicate that after a time interval has elapsed after an inventory inventory, it will be restarted. Start an inventory.
  • the operation interval indication information is used to indicate the interval between two adjacent operations.
  • the RAN operates on the target terminal again, wherein, again The interval between the start moment of performing an operation and the end moment of performing one operation is the duration.
  • the first request message further includes operation start time indication information, and the operation start time indication information is used to indicate the first operation start time.
  • the first request message further includes operation timeout time indication information, and the operation timeout time indication information is used to indicate the time when the last operation ends.
  • the RAN may notify the core network device through the first information, and the method flow shown in FIG. 3 also includes:
  • the RAN sends first information.
  • the first information is used to indicate that the first operation on the target terminal is completed.
  • the RAN does not receive any random access request message initiated by any terminal within the configured time, then the RAN judges that the inventory of the target terminal within its coverage is completed (it can also be said that the query is completed or first operation completed).
  • FIG. 3 will be specifically described below in combination with specific embodiments.
  • the following embodiment in FIG. 4 is a specific implementation of the above-mentioned embodiment in FIG. 3 .
  • Fig. 4 is a schematic flowchart of another communication method provided by the present application. The communication method will be described in detail below in conjunction with each step.
  • the applied AF sends a request message #1 to the terminal management function network element, or in other words, the terminal management function network element receives the request message #1 from the AF.
  • the request message #1 is used to request a first operation on the target terminal, and the request message #1 includes identification information of the target terminal, indication information of the first operation, and application information.
  • the application information includes an identifier of the application or a data network access identifier of the application.
  • the application identifier is used to identify the AF that initiates the inventory request.
  • the identifier of the AF that initiates the inventory request is AF#1, and the above-mentioned application identifier may be AF#1.
  • the execution command is a query (query), that is, to query the terminal identifier; or, when the above-mentioned request message #1 If the indication information of the first operation is carried, and the indication information of the first operation includes query, it indicates that the execution command is a query (query).
  • the request message #1 further includes first area indication information.
  • the first area includes the location where the terminal to be inventoried is located, and the first area indication information used to indicate the first area includes but not limited to geographic location, municipal location, and 3GPP location information (such as TA list, Cell list, etc.).
  • the terminals to be inventoried include three terminals, and the three terminals are respectively located in cell#1, cell#2 and cell#3, and the above-mentioned first area indication information used to indicate the first area may be the 3GPP Location information, such as cell#1, cell#2 and cell#3.
  • the specific form of the first area indication information used to indicate the first area is not limited, and it only needs to be able to indicate the location of the terminal to be inventoried.
  • the request message #1 also includes an operation parameter, wherein the operation parameter is as described above, and will not be repeated here.
  • the request message #1 also includes a notification address #1 and an association identifier #1.
  • the notification address #1 is used to indicate the address of the AF receiving terminal information and command execution result.
  • the address of AF is used to indicate the address of the AF receiving terminal information and command execution result.
  • association identifier #1 is used to associate the message #1 with the response message #1 for the message #1.
  • the request message #1 further includes at least one of the indication information of the row operation interval duration, the indication information of the start time of the operation, and the indication information of the timeout time of the operation.
  • the terminal management function network element receives the request message #1, it can determine the AMF and the corresponding RAN, the method flow shown in Figure 4 also includes:
  • the terminal management function network element determines the AMF and the RAN.
  • the terminal management function network element determines the AMF and the RAN corresponding to the AMF according to the identification information of the target terminal, the area indication information #1 and the application identification. For example, the network element with the terminal management function determines the corresponding RAN or AMF according to the area indication information #1 (such as the cell identifier), or determines the RAN or AMF corresponding to the identifier information according to the identifier information of the target terminal.
  • the area indication information #1 such as the cell identifier
  • the RAN is a RAN with a terminal inventory function.
  • the terminal management function network element may send a request message #2 to the AMF, and the method flow shown in FIG. 4 also includes:
  • the terminal management function network element sends a request message #2 to the AMF, or the AMF receives the request message #2 from the terminal management function network element.
  • the request message #2 is used to request a first operation on the target terminal, and the request message #1 includes identification information of the target terminal and indication information of the first operation.
  • the identification information of the target terminal and the indication information of the first operation are as described above, and will not be repeated here.
  • the request message #2 further includes second area indication information.
  • the second area includes an area managed by the AMF, and the second area indication information used to indicate the second area includes 3GPP location information (eg, TA list, Cell list, etc.).
  • 3GPP location information eg, TA list, Cell list, etc.
  • the area provided by the AF (for example, the first area indication information used to indicate the first area included in the request message #1 received by the terminal management function network element in S412 above) is the geographic location and/or or municipal location, the terminal management function network element needs to map the first area to TA list or cell list.
  • the terminal management function network element shall send a request message #2 to each AMF, and the second area indication information used to indicate the second area included in the different request messages #2, A second field used to indicate a different AMF management.
  • the request message #2 also includes an operation parameter, wherein the operation parameter is as described above, and will not be repeated here.
  • the request message #2 also includes a notification address #2 and an association identifier #2.
  • the notification address #2 is used to indicate an address where the terminal management function network element receives terminal information and command execution results.
  • the address of the terminal management function network element is used to indicate an address where the terminal management function network element receives terminal information and command execution results.
  • association identifier #2 is used to associate the message #2 with the response message #2 for the message #2.
  • the request message #2 further includes at least one of the indication information of the row operation interval duration, the indication information of the start time of the operation, and the indication information of the timeout time of the operation.
  • an AMF may request the RAN target terminal to perform the first operation, and the method flow shown in FIG. 4 also includes:
  • the AMF sends the first request message to the RAN, or the RAN receives the first request message from the AMF.
  • step S310 in FIG. 3 Refer to the description of step S310 in FIG. 3 above, and details are not repeated here.
  • the AMF sends the first request message to the multiple RANs respectively, and the sending of the first request message to different RANs is the same as the above-mentioned sending to a certain RAN.
  • the sending of the first request message by the RAN is similar, but the difference is that the region for sending the query request corresponding to the RAN needs to be determined for the failed RAN, which will not be repeated here.
  • step S412 and step S413 may be: the terminal management function network element determines to send the first request message #2 to each RAN, and the terminal management function network element encapsulates the first request message #2 in message #A , the message #A also includes the identification information of the RAN.
  • the AMF receives the message #A
  • the AMF decapsulates the message #A to obtain the first request message #2
  • the first request message #2 is transparently transmitted for the AMF.
  • the first request message #2 is the same as the first request message.
  • the RAN may save the first request message after receiving the first request message, and the method flow shown in FIG. 4 also includes:
  • the RAN saves the first request message.
  • the first request message includes information indicating the start time of the operation. If the start time of the operation has not yet arrived, the RAN may not perform an inventory, but save the first request message, that is, Can.
  • the RAN performs an inventory:
  • the first request message does not include the indication information of the start time of the operation, the arrival of the start time of the operation, the exceeding of the start time of the operation, and the like.
  • the method flow shown in Figure 4 also includes:
  • the RAN sends a selection message to the terminal.
  • the RAN sends radio frequency signals to all terminals in the coverage area, so as to provide excitation signals to the terminals in the coverage area of the RAN, so that the terminal equipment sends signals to the RAN.
  • the RAN sends selection messages to terminals within the coverage area of the RAN.
  • the method flow shown in Figure 4 also includes:
  • the RAN sends a first query message to the target terminal, or in other words, the target terminal receives the first query message from the RAN.
  • the RAN receives first identification information from the first target terminal, or in other words, the first target terminal sends the first identification information to the RAN.
  • Steps S420 and S430 are the random access process of the first terminal, which is specifically implemented as follows: the RAN includes the first random number in the first query message, and the selected target terminal locally sets the second random number according to the first random number. If the second random number set by a terminal is 0, the terminal sends the third random number to the RAN. If the RAN can correctly receive the third random number, the RAN sends the third random number to the terminal. When the terminal receives the third random number, the terminal determines that the random access is successful. After the terminal confirms that the randomization is successful, it sends the identification information of the terminal to the RAN
  • the RAN sends an operation request message to the first target terminal, or in other words, the target terminal receives the operation request message from the RAN.
  • the first target terminal executes a first operation to obtain a first execution result.
  • the RAN receives the first execution result from the first target terminal, or in other words, the first target terminal sends the first execution result to the RAN.
  • the RAN sends at least one second query request to the target terminal, or in other words, the target terminal receives at least one second query request from the RAN.
  • the specific process is as follows: the RAN sends a query repeat request to the target terminal, and the first target terminal exits the inventory process after receiving the query repeat request, that is, no longer responds to the operation request of the target terminal. After receiving the query repeat request, other target terminals initiate a random access process, and one of the terminals succeeds in random access, which is the second target terminal in this embodiment.
  • the specific random access process may be: other target terminals subtract 1 from the previously set second random number, and if the second random number of a target terminal device is reduced to 0, the target terminal sends a fourth random number to the RAN. If the RAN can correctly receive the fourth random number, the RAN sends the fourth random number to the target terminal. When the target terminal receives the fourth random number, the target terminal determines that the random access is successful. After the random access of the second target terminal succeeds, the identification information of the second target terminal is sent to the RAN.
  • the RAN receives at least one second identification information from at least one second target terminal, or in other words, at least one second target terminal sends at least one second identification information to the RAN.
  • the RAN sends an operation request message to at least one second target terminal, or in other words, at least one second target terminal receives the operation request message from the RAN.
  • At least one second target terminal executes the first operation to obtain at least one second execution result.
  • the RAN receives at least one second execution result from at least one second target terminal, or in other words, at least one second target terminal sends at least one second execution result to the RAN.
  • the RAN after receiving the identification information and the execution result of the target terminal, the RAN sends them to the terminal management function through the AMF. It should be understood that, for the two reporting methods shown in Figure 3, after the RAN receives the identification information and execution results of the target terminal in this embodiment, it can also report in two reporting methods:
  • Mode 1 The RAN reports the identification information and the execution result of each target terminal respectively.
  • the method flow shown in Figure 4 also includes:
  • the RAN sends a first message to the AMF.
  • the first message includes the first identification information, the first execution result and the notification address #1.
  • the AMF sends the first message to the terminal management function network element.
  • the terminal management function network element sends the first message to the AF.
  • Mode 2 The RAN uniformly reports the identification information and execution results of the target terminals for all received target terminals.
  • the RAN sends a second message to the AMF.
  • the second message includes identification information of the multiple terminals and execution results of the multiple terminals, where the multiple terminals include the first target terminal and the at least one second target terminal.
  • the RAN judges that the inventory of all terminals selected within its coverage is completed, as follows: after the RAN executes step S480, if it does not receive any random access request message initiated by any terminal within the configured time, the RAN judges that the target terminal within its coverage The inventory is complete (you can also say that the query is complete or the target operation is complete).
  • the AMF sends a second message to the terminal management function network element
  • the terminal management function network element sends the second message to the AF.
  • the network element with the terminal management function checks all RANs participating in the inventory have reported the terminal ID and the execution result or the timer expires, the network element with the terminal management function sends the second message to the AF.
  • the first information may be sent to the AMF to notify the end of the inventory, and the method flow shown in FIG. 4 further includes:
  • the RAN sends the first information to the AMF.
  • the network element with the terminal management function in FIG. 4 can be co-established with the NEF, and the actions performed by the above-mentioned network element with the terminal management function can be understood as actions performed by the NEF.
  • the method flow shown in FIG. 4 can be applied to the network architecture shown in (a) in FIG. 5 .
  • the terminal management function network element in FIG. 4 may be a newly added independent function network element, which can be used to forward the inventory request and response between the AF and the AMF.
  • the method flow shown in FIG. 4 can be applied to the network architecture shown in (b) in FIG. 5 .
  • the terminal management function network element in Figure 4 can be a newly added independent function network element, which can be used to forward the inventory request and response between the NEF and the AMF, that is to say, the network element shown in Figure 4
  • the inventory request and response between the terminal management function NE and the AF need to be forwarded through the NEF.
  • the method flow shown in FIG. 4 can be applied to the network architecture shown in (c) in FIG. 5 .
  • the terminal management function network element in Figure 4 can be co-located with the AMF, and the above-mentioned interaction between the terminal management function network element and the AMF can be understood as internal interaction.
  • the method flow shown in FIG. 4 can be applied to the network architecture shown in (d) in FIG. 5 .
  • the method information shown in Figure 4 introduces the process of the RAN reporting the inventory results through the AMF and the terminal management function network element.
  • the RAN may also report the inventory result through the tunnel.
  • the process of reporting the inventory result through the tunnel will be described in detail below with reference to FIG. 6 to FIG. 10 .
  • FIG. 6 is another specific implementation of the above-mentioned embodiment in FIG. 3 .
  • Fig. 6 is a schematic flowchart of another communication method provided by the present application. The communication method will be described in detail below in conjunction with each step.
  • the applied AF sends a request message #3 to the network element with the terminal management function, or in other words, the network element with the terminal management function receives the request message #3 from the AF.
  • the request message #3 is similar to the request message #1 shown in S411 above, for example, it is used to request the first operation on the target terminal, including the identification information of the target terminal, the instruction information of the first operation, and the application information.
  • At least one of the operation parameter, the indication information of the first area, the indication information of the operation interval duration, the indication information of the start time of the operation, and the indication information of the timeout time of the operation is included.
  • tunnel #1 is one of the first tunnels described above in FIG. 3 .
  • the request message #3 may include AS tunnel information (also referred to as second tunnel information), and the AS tunnel information is used to indicate the user plane address of the application network element receiving information.
  • AS tunnel information also referred to as second tunnel information
  • the terminal management function network element determines the AMF and the RAN.
  • step S412 in FIG. 4 Refer to the description of step S412 in FIG. 4 , which will not be repeated here.
  • the terminal management function network element may send a request message #4 to the AMF, and the method flow shown in FIG. 6 also includes:
  • the terminal management function network element sends a request message #4 to the AMF, or the AMF receives the request message #4 from the terminal management function network element.
  • the request message #4 is similar to the request message #2 shown in S413 above, for example, it is used to request the target terminal to perform the first operation, including the identification information of the target terminal, the instruction information of the first operation, and the application information.
  • At least one of the operation parameter, the indication information of the second area, the indication information of the operation interval duration, the indication information of the start time of the operation, and the indication information of the timeout time of the operation is included.
  • the difference is that the request message #4 does not need to include the notification address #2 and the association identifier #2.
  • the request message #4 may include AS tunnel information, and may also include configuration indication information (inventory identification), and the configuration indication information is used to indicate the inventory request (or configuration) for subsequent RAN The reported information is associated with the inventory request.
  • an AMF may request the RAN target terminal to perform the first operation, and the method flow shown in FIG. 6 also includes:
  • the AMF sends the first request message to the RAN, or the RAN receives the first request message from the AMF.
  • step S414 in FIG. 4 Refer to the description of step S414 in FIG. 4 above, and details are not repeated here.
  • the first request message may further include configuration indication information.
  • the RAN saves the first request message.
  • step S415 in FIG. 4 Refer to the description of step S415 in FIG. 4 above, and details are not repeated here.
  • the RAN sends a selection message to the terminal.
  • step S416 in FIG. 4 Refer to the description of step S416 in FIG. 4 above, and details are not repeated here.
  • the RAN sends a first query message to the target terminal, or in other words, the target terminal receives the first query message from the RAN.
  • step S320 in FIG. 3 Refer to the description of step S320 in FIG. 3 above, and details are not repeated here.
  • the RAN receives first identification information from the first target terminal, or in other words, the first target terminal sends the first identification information to the RAN.
  • step S330 in FIG. 3 Refer to the description of step S330 in FIG. 3 above, and details are not repeated here.
  • the RAN after the RAN receives the first identification information of the first target terminal, it determines that there is information that needs to be reported, and triggers the establishment of tunnel #1 to facilitate the reporting of subsequent inventory results.
  • the method flow shown in FIG. include:
  • the RAN sends a request message #5 to the AMF, or the AMF receives the request message #5 from the RAN.
  • the request message #5 is used to request to report information.
  • the request message #5 includes configuration instruction information.
  • the AMF determines that the tunnel #1 needs to be established, and the method flow shown in FIG. 6 also includes:
  • the AMF needs to determine to establish tunnel #1.
  • the AMF determines that user plane tunnel #1 needs to be established according to the information such as the application identifier, so as to transmit the inventory result.
  • the AMF sends a request message #6 to the SMF, or the SMF receives the request message #6 from the AMF.
  • the request message #6 is used to request to establish the tunnel #1, and the request message #6 includes the application identifier.
  • request message #6 also includes AS tunnel information.
  • the SMF selects the UPF.
  • the SMF selects an appropriate UPF according to the application identifier.
  • the SMF After the SMF selects a suitable UPF, it sends a request message to the UPF to request tunnel establishment, and the method flow shown in FIG. 6 also includes:
  • the SMF sends a request message #7 to the UPF, or the UPF receives the request message #7 from the SMF.
  • the request message #7 is used to request to establish the tunnel #1, and the request message #7 includes AS tunnel information.
  • the AS tunnel information is reported by the AMF, for example, the request message #6 includes the AS tunnel information.
  • the AS tunnel information is determined by the SMF according to the configuration, wherein the SMF stores the identification information of the target terminal or the AS tunnel information corresponding to the first area indication information.
  • the tunnel #1 between the UPF and the AS can be established, and the method flow shown in FIG. 6 also includes:
  • the UPF needs to notify the RAN of the tunnel #1-related information through the SMF and the AMF, and the method flow shown in FIG. 6 also includes:
  • UPF sends CN tunnel information #1 to RAN, or RAN receives CN tunnel information #1 from UPF.
  • CN tunnel information #1 is used to indicate the tunnel endpoint for the UPF to receive uplink data.
  • CN tunnel information #1 is one type of first tunnel information in the embodiment shown in FIG. 3 above.
  • UPF sends CN tunnel information #1 to RAN, including:
  • the UPF sends a response message #7 to the SMF in response to the above-mentioned request message #7, and the response message #7 includes the CN tunnel information #1;
  • the SMF sends a response message #6 to the AMF in response to the above-mentioned request message #6 , the response message #6 includes CN tunnel information #1;
  • the AMF sends a response message #5 to the RAN in response to the above-mentioned request message #5, notifying the RAN that the inventory result can be reported through the tunnel #1, and the response message #5 Include CN Tunnel Information #1.
  • the RAN may report the AN tunnel information to the UPF through the AMF or the SMF, wherein the AN tunnel information indicates the tunnel endpoint for the RAN to receive downlink data.
  • the method flow shown in Figure 6 also includes:
  • the RAN sends the AN tunnel information to the UPF, or the UPF receives the AN tunnel information from the RAN.
  • the AN tunnel information indicates the tunnel endpoint for the RAN to receive downlink data.
  • the above S631 to S6391 describe the process of establishing the tunnel #1 in detail. After the establishment of the tunnel #1 is completed, the RAN can use the tunnel #1 to report inventory information.
  • the method flow shown in FIG. 6 also includes:
  • the RAN sends an operation request message to the first target terminal, or in other words, the target terminal receives the operation request message from the RAN.
  • the first target terminal executes a first operation to obtain a first execution result.
  • the RAN receives the first execution result from the first target terminal, or in other words, the first target terminal sends the first execution result to the RAN.
  • the RAN sends at least one second query request to the target terminal, or in other words, the target terminal receives at least one second query request from the RAN.
  • the RAN receives at least one second identification information from at least one second target terminal, or in other words, at least one second target terminal sends at least one second identification information to the RAN.
  • the RAN sends an operation request message to at least one second target terminal, or in other words, at least one second target terminal receives the operation request message from the RAN.
  • At least one second target terminal executes the first operation to obtain at least one second execution result.
  • the RAN receives at least one second execution result from at least one second target terminal, or in other words, at least one second target terminal sends at least one second execution result to the RAN.
  • the RAN after receiving the identification information and the execution result of the target terminal, the RAN sends them to the AS through a tunnel. It should be understood that, for the two reporting methods shown in Figure 3, after the RAN receives the identification information and execution results of the target terminal in this embodiment, it can also report in two reporting methods:
  • Mode 1 The RAN reports the identification information and the execution result of each target terminal respectively.
  • the method flow shown in Figure 6 also includes:
  • the RAN sends the first message to the UPF through the tunnel.
  • the RAN sends the first message to the UPF according to CN tunnel information #1.
  • the first message includes the first identification information, the first execution result and the notification address #1.
  • the UPF sends the first message to the AS.
  • the UPF sends the first message to the AS according to the AS tunnel information.
  • Method 2 The RAN uniformly reports the identification information and execution results of the target terminals for all target terminals.
  • the RAN sends the second message to the UPF through the tunnel.
  • the RAN sends the second message to the UPF according to CN tunnel information #1.
  • the second message includes identification information of the multiple terminals and execution results of the multiple terminals, where the multiple terminals include the first target terminal and the at least one second target terminal.
  • the UPF sends the second message to the AS through the tunnel.
  • the UPF sends the second message to the AS according to the AS tunnel information.
  • the RAN determines that the inventory is over, it can indicate the end of the inventory to the terminal management function network element-UP.
  • the method flow shown in Figure 6 also includes:
  • the RAN sends the first information to the UPF through the tunnel.
  • the first information is used to indicate the end of stocktaking.
  • the RAN initiates the establishment of the tunnel after receiving the identification information of the target terminal (for example, initiates the establishment of the tunnel #1 through the request message #5).
  • the tunnel can also be established after the RAN receives the inventory request. It can be understood that the establishment of the tunnel is initiated by the terminal management function network element. The following describes the process of establishing a tunnel initiated by the terminal management function network element in conjunction with Figure 7 .
  • FIG. 7 is another specific implementation of the above-mentioned embodiment in FIG. 3 .
  • Fig. 7 is a schematic flowchart of another communication method provided by the present application. The communication method will be described in detail below in conjunction with each step.
  • the applied AF sends a request message #3 to the terminal management function network element, or in other words, the terminal management function network element receives the request message #3 from the AF.
  • step S611 in FIG. 6 Refer to the description of step S611 in FIG. 6 , which will not be repeated here.
  • the terminal management function network element determines the AMF and the RAN.
  • step S412 in FIG. 4 Refer to the description of step S412 in FIG. 4 , which will not be repeated here.
  • the terminal management function network element sends a request message #4 to the AMF, or the AMF receives the request message #4 from the terminal management function network element.
  • step S613 in FIG. 6 Refer to the description of step S613 in FIG. 6 , which will not be repeated here.
  • the AMF sends the first request message to the RAN, or the RAN receives the first request message from the AMF.
  • step S414 in FIG. 4 Refer to the description of step S414 in FIG. 4 above, and details are not repeated here.
  • the RAN may send a response message #1 to the AMF, and the method flow shown in FIG. 7 also includes:
  • the RAN sends a response message #1 to the AMF, or the AMF receives the response message #1 from the RAN.
  • the response message #1 (for example, an inventory response message) includes AN tunnel information.
  • the AMF sends a request message #8 to the SMF, or the SMF receives the request message #8 from the AMF.
  • the request message #8 is used to request to establish a tunnel, and the request message #6 includes the application identifier and AN tunnel information.
  • request message #8 also includes AS tunnel information.
  • the SMF selects the UPF.
  • step S634 in FIG. 6 Refer to the description of step S634 in FIG. 6 above, and details are not repeated here.
  • the SMF sends a request message #9 to the UPF, or the UPF receives the request message #9 from the SMF.
  • the request message #9 is used to request to establish a tunnel, and the request message #9 includes AN tunnel information and AS tunnel information.
  • the AS tunnel information is reported by the AMF, for example, the request message #8 includes the AS tunnel information.
  • the AS tunnel information is determined by the SMF according to the configuration, wherein the SMF stores the identification information of the target terminal or the AS tunnel information corresponding to the first area indication information.
  • a tunnel between the UPF and the AS can be established, and the method flow shown in FIG. 7 also includes:
  • the UPF needs to send tunnel-related information to the RAN through the SMF and AMF, and the method flow shown in Figure 7 also includes:
  • the UPF sends the CN tunnel information #1 to the RAN, or the RAN receives the CN tunnel information #1 from the UPF.
  • UPF sends CN tunnel information #1 to RAN may be:
  • the UPF sends a response message #9 in response to the above-mentioned request message #9 to the SMF, and the response message #9 includes CN tunnel information #1;
  • the SMF sends a response message #8 to the AMF in response to the above-mentioned request message #8, and the response message #8 contains Including CN tunnel information #1;
  • AMF sends CN tunnel information #1 to RAN (for example, an inventory request completion message).
  • steps S711 to S7191 illustrate the process of tunnel establishment, and the subsequent RAN can report the inventory result through the tunnel.
  • the RAN after the RAN receives CN tunnel information #1, it can perform an inventory process, which specifically includes the following steps:
  • the RAN sends a first query message to the target terminal, or in other words, the target terminal receives the first query message from the RAN.
  • the RAN receives the first identification information from the first target terminal, or in other words, the first target terminal sends the first identification information to the RAN.
  • the RAN sends an operation request message to the first target terminal, or in other words, the target terminal receives the operation request message from the RAN.
  • the first target terminal executes a first operation to obtain a first execution result.
  • the RAN receives the first execution result from the first target terminal, or in other words, the first target terminal sends the first execution result to the RAN.
  • the RAN sends at least one second query request to the target terminal, or in other words, the target terminal receives at least one second query request from the RAN.
  • the RAN receives at least one second identification information from at least one second target terminal, or in other words, at least one second target terminal sends at least one second identification information to the RAN.
  • the RAN sends an operation request message to at least one second target terminal, or in other words, at least one second target terminal receives the operation request message from the RAN.
  • At least one second target terminal executes the first operation to obtain at least one second execution result.
  • the RAN receives at least one second execution result from at least one second target terminal, or in other words, at least one second target terminal sends at least one second execution result to the RAN.
  • the RAN after receiving the identification information and the execution result of the target terminal, the RAN sends them to the AS through a tunnel. It should be understood that, for the two reporting methods shown in Figure 3, after the RAN receives the identification information and execution results of the target terminal in this embodiment, it can also report in two reporting methods:
  • Mode 1 The RAN reports the identification information and the execution result of each target terminal respectively.
  • the method flow shown in Figure 7 also includes:
  • the RAN sends the first message to the UPF through the tunnel.
  • the RAN sends the first message to the UPF according to CN tunnel information #1.
  • the first message includes the first identification information, the first execution result and the notification address #1.
  • the UPF sends the first message to the AS.
  • the UPF sends the first message to the AS according to the AS tunnel information.
  • Method 2 The RAN uniformly reports the identification information and execution results of the target terminals for all target terminals.
  • the RAN sends the second message to the UPF through the tunnel.
  • the RAN sends the second message to the UPF according to CN tunnel information #1.
  • the second message includes identification information of the multiple terminals and execution results of the multiple terminals, where the multiple terminals include the first target terminal and the at least one second target terminal.
  • the UPF sends the second message to the AS through the tunnel.
  • the UPF sends the second message to the AS according to the AS tunnel information.
  • the RAN determines that the inventory is over, it can indicate the end of the inventory to the terminal management function network element-UP.
  • the method flow shown in Figure 7 also includes:
  • the RAN sends the first information to the UPF through the tunnel.
  • the first information is used to indicate the end of stocktaking.
  • the terminal management function network element in FIG. 6 and FIG. 7 can be co-located with the NEF, and the above-mentioned actions performed by the terminal management function network element can be understood as actions performed by the NEF.
  • the method flows shown in FIG. 6 and FIG. 7 can be applied to the network architecture shown in (a) in FIG. 8 .
  • the terminal management function network element in Fig. 6 and Fig. 7 may be a newly added independent functional network element, which can be used to forward the inventory request and response between the AF and the AMF.
  • the terminal management function network element in Figure 6 and Figure 7 can be a newly added independent function network element, which can be used to forward the inventory request and response between NEF and AMF, that is to say, in Figure 4
  • the inventory request and response between the shown terminal management function network element and the AF needs to be forwarded through the NEF.
  • the terminal management function network element in Figure 6 and Figure 7 can be co-located with the AMF, and the interaction between the AMF and the terminal management function network element can be regarded as an internal interaction.
  • the establishment of the tunnel is initiated by the terminal management function network element.
  • the tunnel terminal management control plane functional network element initiates the establishment of the tunnel.
  • the process of tunnel establishment initiated by the terminal management functional network element-CP is described below with reference to FIG. 9 .
  • FIG. 9 is another specific implementation of the above-mentioned embodiment in FIG. 3 .
  • Fig. 9 is a schematic flowchart of another communication method provided by the present application. The communication method will be described in detail below in conjunction with each step.
  • the applied AF sends a request message #10 to the terminal management function network element-CP, or in other words, the terminal management function network element-CP receives the request message #10 from the AF.
  • the content included in the request message #10 (which may also be referred to as the third request message) is the same as that of the request message #3 above, and will not be repeated here.
  • the terminal management function network element-CP determines the AMF, the RAN, and the terminal management function network element-UP.
  • the terminal management function network element-CP determines the AMF and the RAN according to information such as the application identifier and the identifier information of the target terminal. For a specific determination method, reference may be made to the description in step S412 in FIG. 4 , which will not be repeated here.
  • the terminal management function network element-CP also needs to determine the terminal management function network element-UP according to information such as the application identifier, wherein the terminal management function network element-CP stores the corresponding relationship between the application identifier and the terminal management function network element.
  • the tunnel information can be obtained from the terminal management function network element-UP, and the method flow shown in FIG. 9 also includes:
  • the terminal management function network element-CP sends a request message #11 to the terminal management function network element-UP, or in other words, the terminal management function network element-UP receives the request message #11 from the terminal management function network element-CP.
  • the request message #11 (for example, tunnel information request, may also be referred to as a fourth request message) is used to request to acquire tunnel information.
  • the request message #11 includes AS tunnel information.
  • the AS tunnel information is provided by the AF, for example, the request message #10 includes the AS tunnel information.
  • the AS tunnel information is determined by the terminal management function network element-CP according to the configuration.
  • the terminal management function network element-UP sends a response message #11 to the terminal management function network element-CP, or in other words, the terminal management function network element-UP receives the response message #11 from the terminal management function network element-CP.
  • the response message #11 (for example, tunnel information response) is used to respond to the above request message #11.
  • the response message #11 includes CN tunnel information #2 (also referred to as first tunnel information), and the CN tunnel information #2 is the tunnel endpoint for the terminal management function network element-UP to receive uplink data.
  • the terminal management function network element-CP sends a request message #12 to the AMF, or the AMF receives the request message #12 from the terminal management function network element.
  • the content included in the request message #12 is the same as that of the above request message #2, for example, it is used to request the first operation on the target terminal, including identification information of the target terminal, indication information of the first operation, and application information.
  • At least one of the operation parameter, the indication information of the second area, the indication information of the operation interval duration, the indication information of the start time of the operation, and the indication information of the timeout time of the operation is included.
  • the subsequent RAN reports the inventory result, it reports through the tunnel (the establishment and use of the tunnel will be introduced below), and the request message #12 does not need to include the notification address #2 and the association identifier #2.
  • the difference lies in that the request message #12 includes CN tunnel information #2.
  • the AMF sends the first request message to the RAN, or the RAN receives the first request message from the AMF.
  • step S414 in FIG. 4 is similar and will not be repeated here.
  • the first request message also includes CN tunnel information #2.
  • the RAN sends a response message #1 to the AMF, or the AMF receives the response message #1 from the RAN.
  • step S715 in FIG. 7 is similar and will not be repeated here.
  • the AMF sends a response message #12 to the terminal management function network element-CP, or in other words, the terminal management function network element-CP receives the response message #12 from the AMF.
  • the response message #12 is in response to the above request message #12, and the response message #12 includes the application identifier and AN tunnel information.
  • the terminal management function network element-CP sends a request message #13 to the terminal management function network element-UP, or in other words, the terminal management function network element-UP receives the request message #13 from the terminal management function network element-CP.
  • the request message #13 is used to request to update the tunnel information, and the request message #13 includes the AN tunnel information.
  • the terminal management function network element-UP sends a response message #13 to the terminal management function network element-CP, or in other words, the terminal management function network element-UP receives the response message #13 from the terminal management function network element-CP.
  • the response message #11 (for example, tunnel information response) is used to respond to the above-mentioned request message #13.
  • the tunnel #2 between the terminal management function network element-UP and the AS can be established, and the method flow shown in FIG. 9 also includes:
  • steps S911 to S9192 describe the process of establishing tunnel #2, and the subsequent RAN can report the inventory result through tunnel #2.
  • the RAN sends a first query message to the target terminal, or in other words, the target terminal receives the first query message from the RAN.
  • the RAN receives first identification information from the first target terminal, or in other words, the first target terminal sends the first identification information to the RAN.
  • the RAN sends an operation request message to the first target terminal, or in other words, the target terminal receives the operation request message from the RAN.
  • the first target terminal executes a first operation to obtain a first execution result.
  • the RAN receives the first execution result from the first target terminal, or in other words, the first target terminal sends the first execution result to the RAN.
  • the RAN sends at least one second query request to the target terminal, or in other words, the target terminal receives at least one second query request from the RAN.
  • the RAN receives at least one second identification information from at least one second target terminal, or in other words, at least one second target terminal sends at least one second identification information to the RAN.
  • the RAN sends an operation request message to at least one second target terminal, or in other words, at least one second target terminal receives the operation request message from the RAN.
  • At least one second target terminal executes the first operation to obtain at least one second execution result.
  • the RAN receives at least one second execution result from at least one second target terminal, or in other words, at least one second target terminal sends at least one second execution result to the RAN.
  • the RAN after receiving the identification information and the execution result of the target terminal, the RAN sends them to the AS through a tunnel. It should be understood that, for the two reporting methods shown in Figure 3, after the RAN receives the identification information and execution results of the target terminal in this embodiment, it can also report in two reporting methods:
  • Mode 1 The RAN reports the identification information and the execution result of each target terminal respectively.
  • the method flow shown in Figure 9 also includes:
  • the RAN sends the first message to the terminal management function network element-UP through the tunnel.
  • the RAN sends the first message to the UPF according to CN tunnel information #1.
  • the first message includes the first identification information, the first execution result and the notification address #1.
  • the terminal management function network element-UP sends the first message to the AS.
  • the UPF sends the first message to the AS according to the AS tunnel information.
  • Method 2 The RAN uniformly reports the identification information and execution results of the target terminals for all target terminals.
  • the RAN sends the second message to the terminal management function network element-UP through the tunnel.
  • the RAN sends the second message to the UPF according to CN tunnel information #1.
  • the second message includes identification information of the multiple terminals and execution results of the multiple terminals, where the multiple terminals include the first target terminal and the at least one second target terminal.
  • the terminal management function network element-UP sends the second message to the AS through the tunnel.
  • the UPF sends the second message to the AS according to the AS tunnel information.
  • the RAN determines that the inventory is over, it can indicate the end of the inventory to the terminal management function network element-UP.
  • the method flow shown in FIG. 9 also includes:
  • the RAN sends the first information to the terminal management function network element-UP through the tunnel.
  • the first information is used to indicate the end of stocktaking.
  • the terminal management function network element-UP initiates a tunnel release.
  • FIG. 10 is another specific implementation of the above-mentioned embodiment in FIG. 3 .
  • Fig. 10 is a schematic flowchart of another communication method provided by the present application. The communication method will be described in detail below in conjunction with each step.
  • the applied AF sends a request message #10 to the terminal management function network element-CP, or in other words, the terminal management function network element-CP receives the request message #10 from the AF.
  • step S911 in FIG. 9 Refer to the description of step S911 in FIG. 9 above, and details are not repeated here.
  • the terminal management function network element-CP determines the AMF, the RAN and the terminal management function network element-UP.
  • step S912 in FIG. 9 Refer to the description of step S912 in FIG. 9 above, and details are not repeated here.
  • the terminal management function network element-CP sends a request message #11 to the terminal management function network element-UP, or in other words, the terminal management function network element-UP receives the request message #11 from the terminal management function network element-CP.
  • step S913 in FIG. 9 Refer to the description of step S913 in FIG. 9 above, and details are not repeated here.
  • the terminal management function network element-UP sends a response message #11 to the terminal management function network element-CP, or in other words, the terminal management function network element-UP receives the response message #11 from the terminal management function network element-CP.
  • the response message #11 (for example, tunnel information response) is used to respond to the above request message #11.
  • the response message #11 may not include CN tunnel information #2.
  • the tunnel #2 between the terminal management function network element-UP and the AS can be established, and the method flow shown in FIG. 10 also includes:
  • the terminal management function network element-CP sends a request message #14 to the AMF, or the AMF receives the request message #14 from the terminal management function network element.
  • the content included in the request message #14 is the same as that of the above request message #2, for example, it is used to request the first operation on the target terminal, including identification information of the target terminal, indication information of the first operation, and application information.
  • At least one of the operation parameter, the indication information of the second area, the indication information of the operation interval duration, the indication information of the start time of the operation, and the indication information of the timeout time of the operation is included.
  • the subsequent RAN reports the inventory result, it reports through the tunnel (the establishment and use of the tunnel will be introduced below), and the request message #14 does not need to include the notification address #2 and the association identifier #2.
  • the AMF sends the first request message to the RAN, or the RAN receives the first request message from the AMF.
  • step S414 in FIG. 4 is similar and will not be repeated here.
  • the RAN sends a first query message to the target terminal, or in other words, the target terminal receives the first query message from the RAN.
  • the RAN receives first identification information from the first target terminal, or in other words, the first target terminal sends the first identification information to the RAN.
  • the RAN sends an operation request message to the first target terminal, or in other words, the target terminal receives the operation request message from the RAN.
  • the first target terminal executes a first operation to obtain a first execution result.
  • the RAN receives the first execution result from the first target terminal, or in other words, the first target terminal sends the first execution result to the RAN.
  • the RAN sends at least one second query request to the target terminal, or in other words, the target terminal receives at least one second query request from the RAN.
  • the RAN receives at least one second identification information from at least one second target terminal, or in other words, at least one second target terminal sends at least one second identification information to the RAN.
  • the RAN sends an operation request message to at least one second target terminal, or in other words, at least one second target terminal receives the operation request message from the RAN.
  • At least one second target terminal executes the first operation to obtain at least one second execution result.
  • the RAN receives at least one second execution result from at least one second target terminal, or in other words, at least one second target terminal sends at least one second execution result to the RAN.
  • the RAN after receiving the identification information and the execution result of the target terminal, the RAN sends them to the AS through a tunnel. It should be understood that, for the two reporting methods shown in Figure 3, after the RAN receives the identification information and execution results of the target terminal in this embodiment, it can also report in two reporting methods:
  • Mode 1 The RAN reports the identification information and the execution result of each target terminal respectively.
  • the method flow shown in Figure 10 also includes:
  • the RAN sends a first message to the terminal management function network element-CP.
  • the first message includes the first identification information, the first execution result and the notification address #1.
  • the terminal management function network element-CP sends a first message to the terminal management function network element-UP.
  • the terminal management function network element-UP sends the first message to the AS through the tunnel.
  • the UPF sends the first message to the AS according to the AS tunnel information.
  • Method 2 The RAN uniformly reports the identification information and execution results of the target terminals for all target terminals.
  • the RAN sends a second message to the terminal management function network element-CP.
  • the second message includes identification information of the multiple terminals and execution results of the multiple terminals, where the multiple terminals include the first target terminal and the at least one second target terminal.
  • the terminal management function network element-CP sends a second message to the terminal management function network element-UP.
  • the terminal management function network element-UP sends the second message to the AS through the tunnel.
  • the UPF sends the second message to the AS according to the AS tunnel information.
  • the RAN may indicate the end of the inventory to the terminal management function network element-UP.
  • the method flow shown in FIG. 10 also includes:
  • the RAN sends the first information to the terminal management function network element-CP through the tunnel.
  • the first information is used to indicate the end of stocktaking.
  • the terminal management function network element-CP initiates a tunnel release.
  • the terminal management function network element in FIG. 9 and FIG. 10 can be co-located with the NEF, and the actions performed by the above terminal management function network element can be understood as actions performed by the NEF.
  • the method flows shown in FIG. 9 and FIG. 10 can be applied to the network architecture shown in (a) in FIG. 11 .
  • the terminal management function network element in Fig. 9 and Fig. 10 may be a newly added independent function network element, which can be used to forward the inventory request and response between the AF and the AMF.
  • the method flows shown in FIG. 9 and FIG. 10 can be applied to the network architecture shown in (b) in FIG. 11 .
  • the terminal management function network element in Figure 9 and Figure 10 can be a newly added independent function network element, which can be used to forward the inventory request and response between NEF and AMF, that is to say, in Figure 4
  • the inventory request and response between the shown terminal management function network element and the AF needs to be forwarded through the NEF.
  • the method flows shown in FIG. 9 and FIG. 10 can be applied to the network architecture shown in (c) in FIG. 11 .
  • the terminal management function network element in Fig. 9 and Fig. 10 can be co-established with the AMF, and the interaction between the AMF and the terminal management function network element-CP can be regarded as an internal interaction.
  • the method flow shown in FIG. 9 and FIG. 10 can be applied to the network architecture shown in (d) in FIG. 11 .
  • the network elements in the existing network architecture are mainly used as examples for illustration (such as AF, AMF, SMF, etc.), and it should be understood that the specific form of the network element
  • the application examples are not limited. For example, network elements that can implement the same function in the future are applicable to this embodiment of the application.
  • the methods and operations implemented by network equipment may also be implemented by components (such as chips or circuits) that can be used in network equipment.
  • each network element includes a corresponding hardware structure and/or software module for performing each function.
  • the embodiment of the present application can divide the functional modules of the transmitting end device or the receiving end device according to the above method example, for example, each functional module can be divided corresponding to each function, or two or more functions can be integrated into one processing module middle.
  • the above-mentioned integrated modules can be implemented in the form of hardware or in the form of software function modules. It should be noted that the division of modules in the embodiment of the present application is schematic, and is only a logical function division, and there may be other division methods in actual implementation. In the following, description will be made by taking the division of each functional module corresponding to each function as an example.
  • FIG. 12 is a schematic block diagram of an apparatus 1200 provided by an embodiment of the present application.
  • the apparatus 1200 includes a transceiver unit 1210 and a processing unit 1220 .
  • the transceiver unit 1210 can implement a corresponding communication function, and the processing unit 1220 is used for data processing.
  • the transceiver unit 1210 may also be called a communication interface or a communication unit.
  • the device 1200 may further include a storage unit, which may be used to store instructions and/or data, and the processing unit 1220 may read the instructions and/or data in the storage unit, so that the device implements the aforementioned method embodiments .
  • a storage unit which may be used to store instructions and/or data
  • the processing unit 1220 may read the instructions and/or data in the storage unit, so that the device implements the aforementioned method embodiments .
  • the apparatus 1200 can be used to execute the actions performed by the network equipment (such as each network element) in the above method embodiments.
  • the apparatus 1200 can be a network equipment or a component that can be configured in the network equipment.
  • the transceiver unit 1210 is used to To perform operations related to sending and receiving on the network device side in the method embodiments above
  • the processing unit 1220 is configured to perform operations related to processing on the network device side in the method embodiments above.
  • the apparatus 1200 is configured to perform the actions performed by the access network device in the above method embodiments.
  • the transceiver unit 1210 is configured to receive a first request message, where the first request message is used to request a first operation on the target terminal, where the first request message includes identification information of the target terminal and the instruction information of the first operation; the processing unit 1220 is configured to send a first query request to the target terminal according to the first request message, and the first query request is used to obtain the identification information of the target terminal; the transceiver unit 1210 is also configured to For receiving first identification information from a first target terminal, where the first target terminal is one of the target terminals; the transceiver unit 1210 is also used for sending an operation request message to the first target terminal, where the operation request message uses To request the first target terminal to execute the first operation; the transceiving unit 1210 is further configured to receive a first execution result from the first target terminal, where the first execution result is an execution result of executing the first operation.
  • the transceiving unit 1210 is further configured to send a first message to a mobility management functional network element, where the first message includes the first identification information and the first execution result; or, the transceiving unit 1210 is further configured to Receive the address of the first receiving network element, the address is the address of the first receiving network element receiving information; the transceiver unit 1210 is also configured to send a first message to the first receiving network element according to the address, in the first message Including the first identification information and the first execution result; or, the transceiver unit 1210 is further configured to receive first tunnel information, and the first tunnel information is used to indicate the user plane port of the second receiving network element receiving information; the transceiver unit 1210. Further, send a first message to the second receiving network element according to the first tunnel information, where the first message includes the first identification information and the first execution result.
  • the transceiving unit 1210 is further configured to send a second query request to the target terminal, where the second query request is used to obtain identification information of the target terminal; the transceiving unit 1210 is also configured to receive the The second identification information, the second target terminal is one of the target terminals except the first target terminal; the transceiver unit 1210 is also used to send the operation request message to the first target terminal; the transceiver unit 1210 is also used to Receive a second execution result from the second target terminal, where the second execution result is an execution result of executing the first operation.
  • the transceiver unit 1210 is further configured to send a second message to a mobility management function network element, where the second message includes the first identification information and the first execution result, the second identification information and the second execution result; or, the transceiving unit 1210 is further configured to receive the address of the first receiving network element, which is the address for the first receiving network element to receive information; the transceiving unit 1210 is also configured to send the first The receiving network element sends a second message, the second message includes the first identification information and the first execution result, the second identification information and the second execution result; or, the transceiver unit 1210 is further configured to receive the first Tunnel information, the first tunnel information is used to indicate the user plane port of the second receiving network element to receive information; the transceiver unit 1210 is further configured to send a second message to the second receiving network element according to the first tunnel information, the first The second message includes the first identification information and the first execution result, the second identification information and the second execution result.
  • the transceiving unit 1210 is further configured to send a second request message to a network element with a mobility management function, where the second request message is used to request to obtain the first tunnel information.
  • the transceiver unit 1210 is further configured to receive a first association identifier, where the first association identifier is used for associating the first request message with the first message or for associating the first request message with the second message,
  • the first association identifier is included in the first message and/or the second message.
  • the processing unit 1220 after the processing unit 1220 completes an operation on the target terminal, the processing unit 1220 is configured to operate the target terminal again, wherein, the interval between the start time of performing another operation and the end time of performing one operation is the duration.
  • the transceiving unit 1210 is further configured to send first information, where the first information is used to indicate that an operation on the target terminal is completed.
  • the apparatus 1200 can implement the steps or processes corresponding to the steps or processes executed by the access network device in the method embodiment according to the embodiment of the present application, and the apparatus 1200 can include a unit for executing the method executed by the access network device in the method embodiment .
  • each unit in the apparatus 1200 and other operations and/or functions described above are respectively for realizing the corresponding procedures of the method embodiment in the access network device in the method embodiment.
  • the transceiver unit 1210 can be used to execute the transceiver steps in the method, such as steps S310, S320, S30, S340, S350, S351, S352, S353, S356, S354, S355, S356, S354, S360, S370, S380, S390, S391, S392, S396, S394, S395, S311.
  • the transceiver unit 1210 can be used to execute the transceiver steps in the method, such as steps S414, S415, S416, S420, S430, S440, S450, S451, S460, S470, S480, S490, S491, S494: the storage unit can be used to execute the saving step in the method, such as step S415.
  • the transceiver unit 1210 can be used to execute the transceiver steps in the method, such as steps S614, S616, S620, S630, S631, S640, S650, S651, S660, S670, S680, S690, S691, S693: the storage unit can be used to execute the saving step in the method, such as step S615.
  • the transceiver unit 1210 can be used to execute the transceiver steps in the method, such as steps S714, S715, S720, S730, S740, S7191, S750, S751, S760, S770, S780, S790, S791, S793.
  • the transceiver unit 1210 can be used to execute the transceiver steps in the method, such as steps S916, S917, S920, S930, S940, S950, S951, S960, S970, S980, S990, S991, S993.
  • the transceiver unit 1210 can be used to execute the transceiver steps in the method, such as steps S1017, S1020, S1030, S1040, S1050, S1051, S1060, S1070, S1080, S1090, S1091, S1094.
  • the apparatus 1200 is configured to perform the actions performed by the terminal management control plane function network element in the above method embodiments.
  • the transceiver unit 1210 is configured to receive a third request message from an application function network element of the application, where the third request message is used to request the first operation on the target terminal, and the third request message includes The information of the application, the identification information of the target terminal, and the indication information of the first operation.
  • the transceiver unit 1210 is configured to send a first request message to the access network device, where the first request message is used to request a first operation on the target terminal, where the first request message includes the identification information of the target terminal and Instructions for the first operation.
  • the processing unit 1220 is configured to determine the terminal management user plane function network element according to the application information; the transceiver unit 1210 is configured to send a fourth request message to the terminal management user plane function network element, the fourth request message It is used to request to acquire first tunnel information, where the first tunnel information is used to indicate the first tunnel information of the terminal management user plane function network element to receive data; the transceiver unit 1210 is configured to receive the terminal management function user plane network element The first tunnel information.
  • the processing unit 1220 is configured to determine the terminal management user plane functional network element according to the application information; the processing unit 1220 is configured to determine first tunnel information, and the first tunnel information is used to indicate that the terminal manages the user plane
  • the functional network element receives the first tunnel information of the data; the transceiver unit 1210 is configured to send the first tunnel information to the terminal management user plane functional network element.
  • the processing unit 1220 is configured to determine second tunnel information according to the information of the application; where the second tunnel information is a user plane port through which the server of the application receives data.
  • the transceiving unit 1210 is configured to send the second tunnel information to the terminal management user plane functional network element.
  • the transceiver unit 1210 is configured to receive a first message from the access network device, where the first message includes first identification information of a first target terminal among the target terminals and a corresponding ID of the first target terminal. the first execution result;
  • the transceiver unit 1210 is configured to send the first message to the terminal management user plane function network element; or, the transceiver unit 1210 is configured to receive a second message from the access network device, the second message includes the target terminal The first identification information of the first target terminal and the first execution result corresponding to the first target terminal, and the second identification information of the second target terminal and the second execution result corresponding to the second target terminal; the transceiver unit 1210, It is used to send the second message to the terminal management user plane function network element.
  • the transceiver unit 1210 is configured to receive first information from the access network device, where the first information is used to indicate that an operation on the target terminal is completed;
  • the processing unit 1220 is configured to trigger releasing the first tunnel information according to the first information.
  • the apparatus 1200 can implement the steps or processes corresponding to the execution of the terminal management control plane functional network element in the method embodiment according to the embodiment of the present application, and the apparatus 1200 can include a A unit of method that is executed meta. Moreover, each unit in the apparatus 1200 and other operations and/or functions mentioned above are respectively for realizing the corresponding process of the method embodiment in the terminal management control plane functional network element in the method embodiment.
  • the transceiver unit 1210 can be used to execute the transceiver steps in the method, such as steps S913, S914, S915, S918, and S919; the processing unit 1220 can be used to execute the processing in the method Step, such as step S912.
  • the transceiver unit 1210 can be used to execute the transceiver steps in the method, such as steps S1013, S1014, S1016, S1051, S1052, S1091, S1092; the processing unit 1220 can be used Execute the processing steps in the method, such as step S1012.
  • the processing unit 1220 in the above embodiments may be implemented by at least one processor or processor-related circuits.
  • the transceiver unit 1210 may be implemented by a transceiver or transceiver-related circuits.
  • the storage unit can be realized by at least one memory.
  • the embodiment of the present application further provides a device 1300 .
  • the apparatus 1300 includes a processor 1310 and may further include one or more memories 1320 .
  • the processor 1310 is coupled with the memory 1320, and the memory 1320 is used to store computer programs or instructions and/or data, and the processor 1310 is used to execute the computer programs or instructions and/or data stored in the memory 1320, so that the methods in the above method embodiments be executed.
  • the apparatus 1300 includes one or more processors 1310 .
  • the memory 1320 may be integrated with the processor 1310, or set separately.
  • the apparatus 1300 may further include a transceiver 1330, and the transceiver 1330 is used for receiving and/or sending signals.
  • the processor 1310 is configured to control the transceiver 1330 to receive and/or send signals.
  • the apparatus 1300 is used to implement the operations performed by the network equipment (such as the above-mentioned network elements) in the above method embodiments.
  • the embodiment of the present application also provides an apparatus 1400, and the apparatus 1400 may be a network device or a chip.
  • the apparatus 1400 may be used to perform the operations performed by the access network device in the foregoing method embodiments.
  • Apparatus 1400 includes part 1410 and part 1420 .
  • Part 1410 is mainly used for transmitting and receiving radio frequency signals and conversion between radio frequency signals and baseband signals; part 1420 is mainly used for baseband processing and controlling base stations.
  • Part 1410 may generally be referred to as a transceiver unit, a transceiver, a transceiver circuit, or a transceiver.
  • the part 1420 is generally the control center of the base station, which can generally be referred to as a processing unit, and is used to control the base station to perform processing operations on the receiving end device side in the foregoing method embodiments.
  • the transceiver unit in part 1410 may also be referred to as a transceiver or a transceiver, etc., and includes an antenna and a radio frequency circuit, where the radio frequency circuit is mainly used for radio frequency processing.
  • the device used to realize the receiving function in part 1410 can be regarded as a receiving unit
  • the device used to realize the sending function can be regarded as a sending unit, that is, part 1410 includes a receiving unit and a sending unit.
  • the receiving unit may also be called a receiver, receiver, or receiving circuit, etc.
  • the sending unit may be called a transmitter, transmitter, or transmitting circuit, etc.
  • Section 1420 may include one or more single boards, each of which may include one or more processors and one or more memories.
  • the processor is used to read and execute programs in the memory to realize baseband processing functions and control the base station. If there are multiple single boards, each single board can be interconnected to enhance the processing capability. As an optional implementation, it is also possible that multiple single boards share one or more processors, or that multiple single boards share one or more memories, or that multiple single boards share one or more processors at the same time. device.
  • FIG. 14 is only an example rather than a limitation, and the foregoing network device including a transceiver unit and a processing unit may not depend on the structure shown in FIG. 14 .
  • the chip When the device 1400 is a chip, the chip includes a transceiver unit and a processing unit.
  • the transceiver unit may be an input-output circuit or a communication interface;
  • the processing unit is a processor or a microprocessor or an integrated circuit integrated on the chip.
  • the apparatus 1400 may also be a chip system or a processing system, so that the device installed with the apparatus 1400 can implement the methods and functions of the embodiments of the present application.
  • the processing unit 1420 can be a processing circuit in a chip system or a processing system, which realizes the control of the device installed with the chip system or processing system, and can also be coupled to the link storage unit, calling the instructions in the storage unit, so that the device can implement
  • the transceiver unit 1410 can be an input and output circuit in a chip system or a processing system, outputting information processed by the chip system, or inputting data or signaling information to be processed into the chip system for processing .
  • the embodiment of the present application also provides a computer-readable storage medium, on which computer instructions for implementing the method executed by the network device (such as each network element) in the above method embodiment are stored.
  • the computer program when executed by a computer, the computer can implement the method performed by the network device in the foregoing method embodiments.
  • the embodiment of the present application also provides a computer program product including instructions, and when the instructions are executed by a computer, the computer implements the method performed by the network device (such as each network element) in the above method embodiments.
  • An embodiment of the present application further provides a communication system, where the communication system includes the network devices (such as each network element) in the above embodiments, such as access network devices and core network devices.
  • processors mentioned in the embodiment of the present application may be a central processing unit (central processing unit, CPU), and may also be other general purpose processors, digital signal processors (digital signal processor, DSP), application specific integrated circuits ( application specific integrated circuit (ASIC), off-the-shelf programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • a general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.
  • the memory mentioned in the embodiments of the present application may be a volatile memory and/or a nonvolatile memory.
  • the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM).
  • RAM random access memory
  • RAM can be used as an external cache.
  • RAM may include the following forms: static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (synchronous DRAM, SDRAM) , double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (synchlink DRAM, SLDRAM) and Direct memory bus random access memory (direct rambus RAM, DR RAM).
  • static random access memory static random access memory
  • dynamic RAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM synchronous DRAM
  • double data rate SDRAM double data rate SDRAM
  • DDR SDRAM double data rate SDRAM
  • ESDRAM enhanced synchronous dynamic random access memory
  • SLDRAM synchronous connection dynamic random access memory
  • Direct memory bus random access memory direct rambus RAM, DR RAM
  • the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic devices, discrete gate or transistor logic devices, or discrete hardware components
  • the memory storage module may be integrated in the processor.
  • memories described herein are intended to include, but are not limited to, these and any other suitable types of memories.
  • the disclosed devices and methods may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to implement the solutions provided in this application.
  • each functional unit in each embodiment of the present application may be integrated into one unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer may be a personal computer, a server, or a network device.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server, or data center by wired (eg, coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • the available medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, DVD), or a semiconductor medium (for example, a solid state disk (solid state disk, SSD) etc.
  • the aforementioned available medium may include But not limited to: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disk and other media that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供了一种通信的方法和装置,该方法包括:接入网设备接收请求对目标终端进行第一操作的第一请求消息,该第一请求消息中包括目标终端的标识信息和第一操作的指示信息;接入网设备向目标终端发送用于获取目标终端的标识信息的第一查询请求,并接收来自目标终端中的第一目标终端的第一标识信息;接入网设备向第一目标终端发送第一操作的指示信息对应的操作请求消息,并接收来自第一目标终端的第一执行结果。通过具有读卡器功能的接入网设备对终端操作,避免读卡器与终端通信距离近,而导致的适用的场景的范围和规模相对比较小。

Description

通信的方法和装置
本申请要求于2022年1月30日提交中国专利局、申请号为202210114137.4、申请名称为“通信的方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及通信领域,并且更具体地,涉及一种通信的方法和装置。
背景技术
无源物联网(passive internet of things,passive IoT)存在大规模部署应用场景,包括但不限于:
1)物流及仓储:包括货物盘存及跟踪、高价值货物(如,疫苗)运输过程环境及货物状态监测;
2)工业制造:包括环境及设备状态监测。
passive IoT的功能简单,需要依赖外部激励才能发送信息,该激励一般来自读卡器,当前读卡器的部署方式存在读卡器与终端通信距离近,管理难等特点。导致进行passive IoT终端的操作所适用的场景的范围和规模相对比较小,如何实现在大规模、大覆盖环境下passive IoT终端的操作成为亟待解决的问题。
发明内容
本申请实施例提供一种通信的方法,以实现对终端的操作。
第一方面,提供了一种通信的方法,该方法可以由接入网设备执行,或者,也可以由接入网设备中的芯片、芯片系统或电路执行,本申请对此不作限定。为了便于描述,下文中以由接入网设备执行为例进行说明。
该方法包括:
接入网设备接收第一请求消息,该第一请求消息用于请求对目标终端进行第一操作,其中,该第一请求消息中包括该目标终端的标识信息和该第一操作的指示信息。该接入网设备根据第一请求消息向该目标终端发送第一查询请求,该第一查询请求用于获取该目标终端的标识信息。该接入网设备接收来自第一目标终端的第一标识信息,该第一目标终端为该目标终端中的一个。该接入网设备向该第一目标终端发送操作请求消息,该操作请求消息用于请求该第一目标终端执行该第一操作。该接入网设备接收来自该第一目标终端的第一执行结果,该第一执行结果为执行该第一操作的执行结果。
基于上述技术方案,接入网设备可以基于第一请求消息对目标终端执行盘点(如,发送查询请求和操作请求),实现接入网设备盘点终端。相比于普通的读卡器,具备读卡器功能的接入网设备能够覆盖较大范围内的终端,以期实现在大规模、大覆盖环境下终端的盘点。
结合第一方面,在第一方面的某些实现方式中,该第一请求消息中还包括该第一操作对应的操作参数,该操作请求消息中还包括该操作参数。
基于上述技术方案,接入网设备接收到的第一请求消息中还可以包括第一操作对应的操作参数,从而接入网设备下发的操作请求消息中可以包括该第一操作对应的操作参数,从而使得接收到操作请求的目标终端能够明确如何执行操作,避免操作失误。
结合第一方面,在第一方面的某些实现方式中,在该接入网设备接收来自该第一目标终端的第一执行结果后,该方法还包括:该接入网设备向移动性管理功能网元发送第一消息,该第一消息中包括该第一标识信息和该第一执行结果。或者,该接入网设备接收第一接收网元的地址,该地址为该第一接收网元接收信息的地址,该接入网设备根据该地址向该第一接收网元发送第一消息,该第一消息中包括该第一标识信息和该第一执行结果。或者,该接入网设备接收第一隧道信息,该第一隧道信息用于指示第二接收网元接收信息的用户面端口,该接入网设备根据该第一隧道信息向该第二接收网元发送第一消息,该第一消息中包括该第一标识信息和该第一执行结果。
基于上述技术方案,接入网设备在对某个目标终端完成盘点之后,可以上报该目标终端的盘点结果(如,第一标识信息和第一执行结果),并且上报方式可以有多种(如,通过移动性管理功能网元上报、直接向第一接收网元上报或者通过隧道上报),提高方案的灵活性。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该接入网设备向该目标终端发送第二查询请求,该第二查询请求用于获取该目标终端的标识信息;该接入网设备接收来自第二目标终端的第二标识信息,该第二目标终端为该目标终端中除该第一目标终端的一个;该接入网设备向该第一目标终端发送该操作请求消息;该接入网设备接收来自该第二目标终端的第二执行结果,该第二执行结果为执行该第一操作的执行结果。
基于上述技术方案,接入网设备可以基于第一请求消息对接入网设备覆盖的多个目标终端完成盘点。
结合第一方面,在第一方面的某些实现方式中,在该接入网设备接收来自该第二目标终端的第二执行结果后,该方法还包括:该接入网设备向移动性管理功能网元发送第二消息,该第二消息中包括该第一标识信息和该第一执行结果、该第二标识信息和该第二执行结果;或者,该接入网设备接收来第一接收网元的地址,该地址为该第一接收网元接收信息的地址;该接入网设备根据该地址向该第一接收网元发送第二消息,该第二消息中包括该第一标识信息和该第一执行结果、该第二标识信息和该第二执行结果;或者,该接入网设备接收第一隧道信息,该第一隧道信息用于指示第二接收网元接收信息的用户面端口;该接入网设备根据该第一隧道信息向该第二接收网元发送第二消息,该第二消息中包括该第一标识信息和该第一执行结果、该第二标识信息和该第二执行结果。
基于上述技术方案,接入网设备在对多个目标终端完成盘点之后,可以上报该多个目标终端的盘点结果,并且上报方式可以有多种,提高方案的灵活性。
结合第一方面,在第一方面的某些实现方式中,该第一接收网元包括能力开放网元或终端管理功能网元。该第二接收网元包括用户面功能网元或终端管理功能用户面功能。网元。
结合第一方面,在第一方面的某些实现方式中,该接入网设备接收该第一隧道信息之 前,该方法还包括:该接入网设备向移动性管理功能网元发送第二请求消息,该第二请求消息用于请求获取该第一隧道信息。
基于上述技术方案,上述的第一隧道信息可以是由于接入网设备的请求而下发的,赋予接入网设备主动性。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该接入网设备接收第一关联标识,该第一关联标识用于关联该第一请求消息与该第一消息或用于关联该第一请求消息和该第二消息,该第一消息和/或该第二消息中包括该第一关联标识。
基于上述技术方案,通过增加响应和请求之间的关联,以使得在接收到多条盘点请求的情况下,基于关联标识确保响应不会出错。
结合第一方面,在第一方面的某些实现方式中,该第一请求消息中还包括以下信息中的至少一种:第一指示信息、操作间隔时长指示信息、操作起始时刻指示信息、操作超时时刻指示信息,其中,该第一指示信息用于指示该接入网设备向该目标终端发送该查询请求的区域,该操作间隔时长指示信息用于指示进行相邻两次操作之间间隔的时长、操作起始时刻指示信息用于指示首次操作的起始时刻,该操作超时时刻指示信息用于指示最后一次操作结束的时刻。
基于上述技术方案,盘点请求消息中可以包括不同信息,提供更多与盘点相关的信息,提高盘点性能。
结合第一方面,在第一方面的某些实现方式中,在该第一请求消息中包括该操作间隔时长指示信息的情况下,该接入网设备对该目标终端进行一次操作结束之后,该方法还包括:该接入网设备再次对该目标终端进行操作,其中,再次进行操作的起始时刻和该进行一次操作结束时刻之间的间隔为该时长。
结合第一方面,在第一方面的某些实现方式中,该目标终端的标识信息,包括以下信息中的至少一项:该目标终端中任意一个目标终端的指示信息、该目标终端的标识所属的取值区间、该目标终端的标识的列表、该目标终端所属终端组的组标识、该目标终端所属用户的标识信息、或者该目标终端所属应用的标识信息。
基于上述技术方案,目标终端的标识信息可以有多种不同的形式,增加方案灵活性。
结合第一方面,在第一方面的某些实现方式中,该第一操作包括以下操作中的至少一个:查询终端标识、读、写、灭活、锁、块写、块擦、访问、加密、或解密。
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该接入网设备发送第一信息,该第一信息用于指示对该目标终端进行一次操作结束。
第二方面,提供了一种通信的方法,该方法可以由终端管理控制面功能网元执行,或者,也可以由终端管理控制面功能网元中的芯片、芯片系统或电路执行,本申请对此不作限定。为了便于描述,下文中以由终端管理控制面功能网元执行为例进行说明。
该方法包括:
终端管理控制面功能网元接收来自应用的应用功能网元的第三请求消息,该第三请求消息用于请求对目标终端进行第一操作,该第三请求消息中包括该应用的信息、该目标终端的标识信息和该第一操作的指示信息;该终端管理控制面功能网元向接入网设备发送第一请求消息,该第一请求消息用于请求对该目标终端进行第一操作,其中,该第一请求消息中包括该目标终端的标识信息和该第一操作的指示信息。
基于上述技术方案,可以通过第一请求消息触发接入网设备对目标终端执行盘点,实现接入网设备盘点终端。相比于普通的读卡器,具备读卡器功能的接入网设备能够覆盖较大范围内的终端,以期实现在大规模、大覆盖环境下终端的盘点。
结合第二方面,在第二方面的某些实现方式中,该终端管理控制面功能网元向该接入网设备发送第一请求消息之前,该方法还包括:该标签管理控制面功能网元根据该应用的信息确定终端管理用户面功能网元;该终端管理控制面功能网元向该终端管理用户面功能网元发送第四请求消息,该第四请求消息用于请求获取第一隧道信息,该第一隧道信息用于指示该终端管理用户面功能网元接收数据的第一隧道信息;该终端管理控制面功能网元接收来自该终端管理功能用户面网元的该第一隧道信息。
基于上述技术方案,标签管理控制面功能网元可以从终端管理用户面功能网元获取第一隧道信息,以便于通过隧道传输数据。
结合第二方面,在第二方面的某些实现方式中,该终端管理控制面功能网元向该接入网设备发送第一请求消息之前,该方法还包括:该标签管理控制面功能网元根据该应用的信息确定该终端管理用户面功能网元;该终端管理控制面功能网元确定第一隧道信息,该第一隧道信息用于指示该终端管理用户面功能网元接收数据的第一隧道信息,该终端管理控制面功能网元向该终端管理用户面功能网元发送该第一隧道信息。
基于上述技术方案,标签管理控制面功能网元可以自行确定第一隧道信息,以便于通过隧道传输数据。
结合第二方面,在第二方面的某些实现方式中,该第一请求消息中还包括该第一隧道信息。
基于上述技术方案,标签管理控制面功能网元可以将第一隧道信息发送给接入网设备,以使得接入网设备可以通过隧道上报盘点结果。
结合第二方面,在第二方面的某些实现方式中,该第一请求消息中还包括该终端管理控制面功能网元接收通知消息的地址。
基于上述技术方案,标签管理控制面功能网元可以将标签管理控制面功能网元接收通知消息的地址发送给接入网设备,避免数据传输出错。
结合第二方面,在第二方面的某些实现方式中,该第三请求消息中还包括该应用的服务器接收数据的第二隧道信息;或者,该终端管理控制面功能网元根据该应用的信息确定第二隧道信息;其中,该第二隧道信息为该应用的服务器接收数据的用户面端口。
结合第二方面,在第二方面的某些实现方式中,该方法还包括:该终端管理控制面功能网元向该终端管理用户面功能网元发送该第二隧道信息。
结合第二方面,在第二方面的某些实现方式中,该方法还包括:该终端管理控制面功能网元接收来自该接入网设备的第一消息,该第一消息中包该目标终端中的第一目标终端的第一标识信息和该第一目标终端对应的第一执行结果;该终端管理控制面功能网元向该终端管理用户面功能网元发送该第一消息;
或者,
该终端管理控制面功能网元接收来自接入网设备的第二消息,该第二消息中包括该目标终端中的第一目标终端的第一标识信息和该第一目标终端对应的第一执行结果,以及第二目标终端的第二标识信息和该第二目标终端对应的第二执行结果;该终端管理控制面功 能网元向该终端管理用户面功能网元发送该第二消息。
基于上述技术方案,接入网设备可以通过不同的方式上报盘点结果,提高方案的灵活性。
结合第二方面,在第二方面的某些实现方式中,该第三请求消息中还包括以下信息中的至少一种:第二指示信息、该第一操作对应的操作参数、操作间隔时长指示信息、操作起始时刻指示信息、操作超时时刻指示信息,其中,该第二指示信息用于指示待执行该第一操作的区域,该操作间隔时长指示信息用于指示进行相邻两次操作之间间隔的时长、操作起始时刻指示信息用于指示首次操作的起始时刻,该操作超时时刻指示信息用于指示最后一次操作结束的时刻;
该第一请求消息中还包括以下信息中的至少一种:第一指示信息、该第一操作对应的操作参数、该操作间隔时长指示信息、该操作起始时刻指示信息、该操作超时时刻指示信息,该第一指示信息用于指示该接入网设备向该目标终端发送该查询请求的区域。
基于上述技术方案,盘点请求消息中可以包括不同信息,提供更多与盘点相关的信息,提高盘点性能。
结合第二方面,在第二方面的某些实现方式中,该方法还包括:该终端管理控制面功能网元接收来自该接入网设备的第一信息,该第一信息用于指示对该目标终端进行一次操作结束;该终端管理控制面功能网元根据该第一信息触发释放该第一隧道信息。
结合第二方面,在第二方面的某些实现方式中,该应用的信息包括该应用的标识或该应用的数据网络接入标识。
基于上述技术方案,应用的信息可以有多种不同的形式,增加方案灵活性。
第三方面,提供了一种通信的方法,该方法可以由包括第一方面中的接入网设备和第二方面中的终端管理控制面功能网元的通信系统执行。
该方法包括:
应用的应用功能网元向终端管理功能网元发送第三请求消息,该第三请求消息用于请求对目标终端进行第一操作,该第三请求消息中包括该应用的信息、该目标终端的标识信息和该第一操作的指示信息;
该终端管理功能网元向接入网设备发送第一请求消息,该第一请求消息用于请求对该目标终端进行该第一操作,其中,该第一请求消息中包括该目标终端的标识信息和该第一操作的指示信息;
该接入网设备向该目标终端发送查询请求消息和操作请求消息,该查询请求用于获取该目标终端的标识信息,该操作请求消息用于请求该目标终端执行该第一操作;
该接入网设备接收该目标终端中的一个或多个终端的标识信息和该目标终端中的一个或多个终端执行该第一操作的执行结果;
该接入网设备向该终端管理功能网元发送该目标终端中的一个或多个终端的标识信息和该目标终端中的一个或多个终端执行该第一操作的执行结果;
该终端管理功能网元向该应用发送该目标终端中的一个或多个终端的标识信息和该目标终端中的一个或多个终端执行该第一操作的执行结果。
基于上述技术方案,接入网设备可以基于第一请求消息对目标终端执行盘点(如,发送查询请求和操作请求),实现接入网设备盘点终端。相比于普通的读卡器,具备读卡器 功能的接入网设备能够覆盖较大范围内的终端,以期实现在大规模、大覆盖环境下终端的盘点。
结合第三方面,在第三方面的某些实现方式中,该终端管理功能网元包括终端管理控制面功能网元和终端管理用户面功能网元,该应用的应用功能网元向终端管理功能网元发送第三请求消息,包括:该应用的应用功能网元向该终端管理控制面功能网元发送该第三请求消息;该方法还包括:该终端管理控制面功能网元根据该应用的信息确定终端管理用户面功能网元;该终端管理功能网元向接入网设备发送第一请求消息,包括:该终端管理控制面功能网元向接入网设备发送第一请求消息。
结合第三方面,在第三方面的某些实现方式中,该终端管理控制面功能网元向该接入网设备发送该第一请求消息之前,该方法还包括:
该标签管理控制面功能网元根据该应用的信息确定该终端管理用户面功能网元;该终端管理控制面功能网元向该终端管理用户面功能网元发送第四请求消息,该第四请求消息用于请求获取第一隧道信息,该第一隧道信息用于指示该终端管理用户面功能网元接收数据的第一隧道信息;该终端管理控制面功能网元接收来自该终端管理功能用户面网元的该第一隧道信息;该第一请求消息中还包括该第一隧道信息。
结合第三方面,在第三方面的某些实现方式中,该终端管理控制面功能网元向该接入网设备发送该第一请求消息之前,该方法还包括:
该标签管理控制面功能网元根据该应用的信息确定该终端管理用户面功能网元;该终端管理控制面功能网元确定第一隧道信息,该第一隧道信息用于指示该终端管理用户面功能网元接收数据的第一隧道信息;该终端管理控制面功能网元向该终端管理用户面功能网元发送该第一隧道信息;该第一请求消息中还包括该第一隧道信息。
结合第三方面,在第三方面的某些实现方式中,该第一请求消息中还包括该终端管理控制面功能网元接收通知消息的地址。
结合第三方面,在第三方面的某些实现方式中,该第三请求消息中还包括该应用的服务器接收数据的第二隧道信息;或者,该终端管理控制面功能网元根据该应用的信息确定第二隧道信息;其中该第二隧道信息为该应用的服务器接收数据的用户面端口。
结合第三方面,在第三方面的某些实现方式中,该方法还包括:该终端管理控制面功能网元向该终端管理用户面功能网元发送该第二隧道信息。
结合第三方面,在第三方面的某些实现方式中,该方法还包括:该终端管理控制面功能网元接收来自该接入网设备的第一消息,该第一消息中包该目标终端中的第一目标终端的第一标识信息和该第一目标终端对应的第一执行结果;该终端管理控制面功能网元向该终端管理用户面功能网元发送该第一消息;
或者,
该终端管理控制面功能网元接收来自接入网设备的第二消息,该第二消息中包括该目标终端中的第一目标终端的第一标识信息和该第一目标终端对应的第一执行结果,以及第二目标终端的第二标识信息和该第二目标终端对应的第二执行结果;该终端管理控制面功能网元向该终端管理用户面功能网元发送该第二消息。
结合第三方面,在第三方面的某些实现方式中,该终端管理用户面功能网元接收来自该接入网设备的第一消息,该第一消息中包该目标终端中的第一目标终端的第一标识信息 和该第一目标终端对应的第一执行结果;
或者,
该终端管理用户面功能网元接收来自该接入网设备的第二消息,该第二消息中包括该目标终端中的第一目标终端的第一标识信息和该第一目标终端对应的第一执行结果,以及第二目标终端的第二标识信息和该第二目标终端对应的第二执行结果。
结合第三方面,在第三方面的某些实现方式中,该终端管理用户面功能网元根据该第二隧道信息向该应用的应用服务器发送该第一数据。
结合第三方面,在第三方面的某些实现方式中,该应用的信息包括该应用的标识或该应用的数据网络接入标识。
第四方面,提供一种通信的装置,该通信的装置包括处理器,用于实现上述第一方面描述的方法中接入网设备的功能。
可选地,该通信的装置还可以包括存储器,该存储器与该处理器耦合,该处理器用于实现上述第一方面描述的方法中接入网设备的功能。
在一种可能的实现中,该存储器用于存储程序指令和数据。该存储器与该处理器耦合,该处理器可以调用并执行该存储器中存储的程序指令,用于实现上述第一方面描述的方法中接入网设备的功能。
可选地,该通信的装置还可以包括通信接口,该通信接口用于该通信的装置与其它设备进行通信。当该通信的装置为接入网设备时,该通信接口为收发器、输入/输出接口、或电路等。
在一种可能的设计中,该通信的装置包括:处理器和通信接口,用于实现上述第一方面描述的方法中接入网设备的功能,具体地包括:
该处理器利用该通信接口与外部通信;
该处理器用于运行计算机程序,使得该装置实现上述第一方面描述的任一种方法。
可以理解,该外部可以是处理器以外的对象,或者是该装置以外的对象。
在另一种可能的设计中,该通信的装置为芯片或芯片系统。该通信接口可以是该芯片或芯片系统上的输入/输出接口、接口电路、输出电路、输入电路、管脚或相关电路等。该处理器也可以体现为处理电路或逻辑电路。
第五方面,提供一种通信的装置,该通信的装置包括处理器,用于实现上述第二方面描述的方法中终端管理控制面功能网元的功能。
可选地,该通信的装置还可以包括存储器,该存储器与该处理器耦合,该处理器用于实现上述第二方面描述的方法中终端管理控制面功能网元的功能。
在一种可能的实现中,该存储器用于存储程序指令和数据。该存储器与该处理器耦合,该处理器可以调用并执行该存储器中存储的程序指令,用于实现上述第二方面描述的方法中终端管理控制面功能网元的功能。
可选地,该通信的装置还可以包括通信接口,该通信接口用于该通信的装置与其它设备进行通信。当该通信的装置为终端管理控制面功能网元时,该收发器可以是通信接口,或,输入/输出接口。
在一种可能的设计中,该通信的装置包括:处理器和通信接口,用于实现上述第二方面描述的方法中终端管理控制面功能网元的功能,具体地包括:
该处理器利用该通信接口与外部通信;
该处理器用于运行计算机程序,使得该装置实现上述第二方面描述的任一种方法。
可以理解,该外部可以是处理器以外的对象,或者是该装置以外的对象。
在另一种实现方式中,该通信的装置为芯片或芯片系统时,该通信接口可以是是该芯片或芯片系统上输入/输出接口、接口电路、输出电路、输入电路、管脚或相关电路等。该处理器也可以体现为处理电路或逻辑电路。
第六方面,提供一种计算机可读存储介质,其上存储有计算机程序,该计算机程序被通信装置执行时,使得该通信装置实现第一方面至第二方面的任一可能的实现方式中的方法。
第七方面,提供一种包含指令的计算机程序产品,该指令被计算机执行时使得通信装置实现第一方面至第二方面的任一可能的实现方式中的方法。
第八方面,提供了一种通信系统,包括第四方面所示的通信的装置和第五方面所示的通信的装置。
附图说明
图1中的(a)和(b)是适用本申请实施例的应用场景示意图。
图2是一种passive IoT标签的管理方式的示意图。
图3是本申请实施例提供的一种通信的方法的示意性流程图。
图4是本申请实施例提供的另一种通信的方法的示意性流程图。
图5中的(a)至(d)是本申请实施例提供的网络架构示意图。
图6是本申请实施例提供的又一种通信的方法的示意性流程图。
图7是本申请实施例提供的又一种通信的方法的示意性流程图。
图8中的(a)至(d)是本申请实施例提供的网络架构示意图。
图9是本申请实施例提供的又一种通信的方法的示意性流程图。
图10是本申请实施例提供的又一种通信的方法的示意性流程图。
图11中的(a)至(d)是本申请实施例提供的网络架构示意图。
图12是根据本申请实施例提供的通信的装置的示意性框图。
图13是根据本申请实施例提供的通信的装置的另一示意性框图。
图14是本申请实施例提供的一种通信的装置的结构示意图。
具体实施方式
本申请实施例的技术方案可以应用于各种通信系统,例如:第五代(5th generation,5G)系统或新无线(new radio,NR)、长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)等。本申请提供的技术方案还可以应用于未来的通信系统,如第六代移动通信系统。本申请实施例的技术方案还可以应用于设备到设备(device to device,D2D)通信,车辆外联(vehicle-to-everything,V2X)通信,机器到机器(machine to machine,M2M)通信,机器类型通信(machine type communication,MTC),以及物联网(internet of things,IoT)通信系统或者其他通信系统。
为便于理解本申请实施例,首先结合图1中的(a)和(b)简单介绍本申请实施例适用的通信系统。
本申请实施例的技术方案可以应用于图1中的(a)和/或图1中的(b)所示的5G网络架构中,当然也可以用在未来网络架构,比如第六代(6th generation,6G)网络架构等,本申请实施例对此不作具体限定。
下面将结合图1中的(a)和图1中的(b)举例说明本申请实施例适用的5G系统。应理解,本文中描述的5G系统仅是示例,不应对本申请构成任何限定。
还应理解,5G系统中某些网元之间可以采用服务化接口,或点对点的接口进行通信,下面结合图1中的(a)和图1中的(b)分别介绍基于点对点接口的5G系统框架,以及基于服务化接口的5G系统框架。
作为示例性说明,图1中的(a)示出了本申请实施例适用的5G系统200a的架构示意图。图1中的(a)为基于点对点接口的5G网络架构示意图。如图1中的(a)所示,该网络架构可以包括但不限于以下网元(或者称为功能网元、功能实体、节点、设备等):
用户设备(user equipment,UE)、(无线)接入网设备(radio access network,(R)AN)、接入和移动性管理功能(access and mobility management function,AMF)网元、会话管理功能(session management function,SMF)网元、用户面功能(user plane function,UPF)网元、策略控制功能(policy control function,PCF)网元、统一数据管理(unified data management,UDM)网元、应用功能(application function,AF)网元、数据网络(data network,DN)、网络切片选择功能(network slice selection function,NSSF)、认证服务器功能(authentication server function,AUSF)、统一数据管理(unified data management,UDM)、能力开放功能(network exposure function,NEF)网元、统一数据存储(unified data repository,UDR)等。
下面对图1中的(a)中示出的各网元进行简单介绍:
1、UE:为与(R)AN通信的终端也可以称为终端设备(terminal equipment)、接入终端、用户单元、用户站、移动站、移动台(mobile station,MS)、移动终端(mobile terminal,MT)、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。终端设备可以是一种向用户提供语音/数据连通性的设备,例如,具有无线连接功能的手持式设备、车载设备等。目前,一些终端的举例可以为:手机(mobile phone)、平板电脑(pad)、带无线收发功能的电脑(如笔记本电脑、掌上电脑等)、移动互联网设备(mobile internet device,MID)、虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端、蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,5G网络中的终端设备或者未来演进的公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备等。
此外,终端设备还可以是物联网(Internet of things,IoT)系统中的终端设备。IoT是 未来信息技术发展的重要组成部分,其主要技术特点是将物品通过通信技术与网络连接,从而实现人机互连,物物互连的智能化网络。IoT技术可以通过例如窄带(narrow band,NB)技术,做到海量连接,深度覆盖,终端省电。
应理解,终端设备可以是任何可以接入网络的设备。终端设备与接入网设备之间可以采用某种空口技术相互通信。
可选地,用户设备可以用于充当基站。例如,用户设备可以充当调度实体,其在V2X或D2D等中的用户设备之间提供侧行链路信号。比如,蜂窝电话和汽车利用侧行链路信号彼此通信。蜂窝电话和智能家居设备之间通信,而无需通过基站中继通信信号。
2、(R)AN:用于为特定区域的授权用户设备提供入网功能,并能够根据用户设备的级别,业务的需求等使用不同服务质量的传输隧道。
(R)AN能够管理无线资源,为用户设备提供接入服务,进而完成控制信号和用户设备数据在用户设备和核心网之间的转发,(R)AN也可以理解为传统网络中的基站。
示例性地,本申请实施例中的接入网设备可以是用于与用户设备通信的任意一种具有无线收发功能的通信设备。该接入网设备包括但不限于:演进型节点B(evolved Node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(home evolved Node B,HeNB,或home Node B,HNB)、基带单元(baseBand unit,BBU),无线保真(wireless fidelity,WIFI)系统中的接入点(access point,AP)、无线中继节点、无线回传节点、传输点(transmission point,TP)或者发送接收点(transmission and reception point,TRP)等,还可以为5G,如,NR,系统中的gNB,或,传输点(TRP或TP),5G系统中的基站的一个或一组(包括多个天线面板)天线面板,或者,还可以为构成gNB或传输点的网络节点,如基带单元(BBU),或,分布式单元(distributed unit,DU)等。
在一些部署中,gNB可以包括集中式单元(centralized unit,CU)和DU。gNB还可以包括有源天线单元(active antenna unit,AAU)。CU实现gNB的部分功能,DU实现gNB的部分功能。比如,CU负责处理非实时协议和服务,实现无线资源控制(radio resource control,RRC),分组数据汇聚层协议(packet data convergence protocol,PDCP)层的功能。DU负责处理物理层协议和实时服务,实现无线链路控制(radio link control,RLC)层、媒体接入控制(media access control,MAC)层和物理(physical,PHY)层的功能。AAU实现部分物理层处理功能、射频处理及有源天线的相关功能。由于RRC层的信息最终会变成PHY层的信息,或者,由PHY层的信息转变而来,因而,在这种架构下,高层信令,如RRC层信令,也可以认为是由DU发送的,或者,由DU+AAU发送的。可以理解的是,接入网设备可以为包括CU节点、DU节点、AAU节点中一项或多项的设备。此外,可以将CU划分为接入网(radio access network,RAN)中的接入网设备,也可以将CU划分为核心网(core network,CN)中的接入网设备,本申请对此不做限定。
3、用户面网元:用于分组路由和转发以及用户面数据的服务质量(quality of service,QoS)处理等。
如图1中的(a)所示,在5G通信系统中,该用户面网元可以是UPF网元,可以包括中间用户面功能(intermediate user plane function,I-UPF)网元、锚点用户面功能(PDU  Session anchor user plane function,PSA-UPF)网元。在未来通信系统中,用户面网元仍可以是UPF网元,或者,还可以有其它的名称,本申请不做限定。
4、数据网络:用于提供传输数据的网络。
在未来通信系统中,数据网络仍可以是DN,或者,还可以有其它的名称,本申请不做限定。
在5G通信系统中,终端设备接入网络后可以建立协议数据单元(protocol data unit,PDU)会话,并通过PDU会话访问DN,可以与部署在DN中的应用功能网元(应用功能网元比如为应用服务器)交互。如图1中的(a)所示,根据用户访问的DN不同,网络可以根据网络策略选择接入DN的UPF作为为PDU会话锚点(PDU Session Anchor,PSA),并通过PSA的N6接口访问应用功能网元。
5、接入与移动性管理网元:主要用于移动性管理和接入管理等,可以用于实现移动性管理网元(mobility management entity,MME)功能中除会话管理之外的其它功能,例如,合法监听以及接入授权/鉴权等功能。
如图1中的(a)所示,在5G通信系统中,该接入管理网元可以是AMF网元。在未来通信系统中,接入管理网元仍可以是AMF网元,或者,还可以有其它的名称,本申请不做限定。
6、会话管理网元:主要用于会话管理、终端设备的网络互连协议(internet protocol,IP)地址分配和管理、选择可管理终端设备平面功能、策略控制和收费功能接口的终结点以及下行数据通知等。
如图1中的(a)所示,在5G通信系统中,该会话管理网元可以是SMF网元,可以包括中间会话管理功能(intermediate session management function,I-SMF)网元、锚点会话管理功能(anchor session management function,A-SMF)网元。在未来通信系统中,会话管理网元仍可以是SMF网元,或者,还可以有其它的名称,本申请不做限定。
7、策略控制网元:用于指导网络行为的统一策略框架,为控制面功能网元(例如AMF,SMF网元等)提供策略规则信息等。
在4G通信系统中,该策略控制网元可以是策略和计费规则功能(policy and charging rules function,PCRF)网元。如图1中的(a)所示,在5G通信系统中,该策略控制网元可以是PCF网元。在未来通信系统中,策略控制网元仍可以是PCF网元,或者,还可以有其它的名称,本申请不做限定。
8、数据管理网元:用于处理终端设备标识,接入鉴权,注册以及移动性管理等。
如图1中的(a)所示,在5G通信系统中,该数据管理网元可以是UDM网元或UDR网元。在未来通信系统中,统一数据管理仍可以是UDM、UDR网元,或者,还可以有其它的名称,本申请不做限定。
本申请实施例中的UDM或UDR网元可以是指用户数据库。可以作为一个存储用户数据的单一逻辑存储库存在。
9、应用功能网元:应用功能网元可以通过应用功能网元与5G系统交互,用于接入网络开放功能网元或与策略框架交互进行策略控制等。
如图1中的(a)所示,在5G通信系统中,该应用功能网元可以是application function,AF网元。在未来通信系统中,应用功能网元仍可以是AF网元,或者,还可以有其它的名称,本申请不做限定。
10、网络切片选择网元:主要包括以下功能:为UE选择一组网络切片实例、确定允许的网络切片选择辅助信息(network slice selection assistance information,NSSAI)和确定可以服务UE的AMF集等。
如图1中的(a)所示,在5G通信系统中,该网络切片选择网元可以是NSSF网元。在未来通信系统中,网络切片选择网元仍可以是NSSF网元,或者,还可以有其它的名称,本申请不做限定。
11、认证服务网元:用于鉴权服务、产生密钥实现对终端设备的双向鉴权,支持统一的鉴权框架。
如图1中的(a)所示,在5G通信系统中,该认证服务网元可以是AUSF网元。在未来通信系统中,认证服务功能网元仍可以是AUSF网元,或者,还可以有其它的名称,本申请不做限定。
12、网络开放功能网元:用于提供网络开放的定制功能。
如图1中的(a)所示,在5G通信系统中,该网络开放功能网元可以是网络开放功能(network exposure function,NEF)网元在未来通信系统中,该网络开放功能网元仍可以是NEF网元,或者,还可以有其它的名称,本申请不做限定。
5G通信系统还可以通过NEF网元,向外部的应用功能网元开放5GC支持的能力,譬如提供小数据传递能力等。
可以理解的是,上述网元或者功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行的软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。上述网元或者功能可划分出一个或多个服务,进一步,还可能会出现独立于网络功能存在的服务。在本申请中,上述功能的实例、或上述功能中包括的服务的实例、或独立于网络功能存在的服务实例均可称为服务实例。
进一步地,可以将AF网元简称为AF,NEF网元简称为NEF,AMF网元简称为AMF。即本申请后续所描述的AF均可替换为应用功能网元,NEF均可替换为网络开放功能网元,AMF均可替换为接入与移动性管理网元。
可以理解的是,上述网元或者功能网元既可以是硬件设备中的网络元件,也可以是在专用硬件上运行软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。上述网元或者功能可划分出一个或多个服务,进一步,还可能会出现独立于网络功能存在的服务。在本申请中,上述功能的实例、或上述功能中包括的服务的实例、或独立于网络功能存在的服务实例均可称为服务实例。
从图1中的(a)可以看出,图1中的(a)中的各个控制面网元之间的接口是点对点的接口。
在图1中的(a)所示的架构中,各个网元之间的接口名称及功能如下:
1)、N1:AMF与终端之间的接口,可以用于向终端传递QoS控制规则等。
2)、N2:AMF与RAN之间的接口,可以用于传递核心网侧至RAN的无线承载控制信息等。
3)、N3:RAN与UPF之间的接口,主要用于传递RAN与UPF间的上下行用户面数据。
4)、N4:SMF与UPF之间的接口,可以用于控制面与用户面之间传递信息,包括控制面向用户面的转发规则、QoS控制规则、流量统计规则等的下发以及用户面的信息上报。
5)、N5:AF与PCF之间的接口,可以用于应用业务请求下发以及网络事件上报。
6)、N6:UPF与DN的接口,用于传递UPF与DN之间的上下行用户数据流。
7)、N7:PCF与SMF之间的接口,可以用于下发协议数据单元(protocol data unit,PDU)会话粒度以及业务数据流粒度控制策略。
8)、N8:AMF与UDM间的接口,可以用于AMF向UDM获取接入与移动性管理相关签约数据与鉴权数据,以及AMF向UDM注册终端当前移动性管理相关信息等。
9)、N9:UPF和UPF之间的用户面接口,用于传递UPF间的上下行用户数据流。
10)、N10:SMF与UDM间的接口,可以用于SMF向UDM获取会话管理相关签约数据,以及SMF向UDM注册终端当前会话相关信息等。
11)、N11:SMF与AMF之间的接口,可以用于传递RAN和UPF之间的PDU会话隧道信息、传递发送给终端的控制消息、传递发送给RAN的无线资源控制信息等。
12)、N12:AMF和AUSF间的接口,可以用于AMF向AUSF发起鉴权流程,其中可携带SUCI作为签约标识;
13)、N13:UDM与AUSF间的接口,可以用于AUSF向UDM获取用户鉴权向量,以执行鉴权流程。
作为示例性说明,图1中的(b)示出了本申请实施例适用的5G系统200b的架构示意图。图1中的(b)为基于服务化接口的5G网络架构示意图。如图1中的(b)所示,该网络架构可以包括但不限于以下网元(或者称为功能网元、功能实体、节点、设备等):
UE、(R)AN、AMF网元、SMF网元、UPF网元、PCF网元、UDM网元、AF网元、DN、NSSF、AUSF、UDM、NEF网元、UDR等。
其中的网元的功能的介绍可以参考图1中的(b)中对应的网元的功能的介绍,不再赘述。图1中的(b)与图1中的(a)的主要区别在于:图1中的(b)中的各个控制面网元之间的接口是服务化的接口,图1中的(a)中的各个控制面网元之间的接口是点对点的接口。
图1中的(b)中Nnssf、Nudr、Nausf、Nnef、Namf、Npcf、Nsmf、Nudm、Naf分别为上述NSSF、UDR、AUSF、NEF、AMF、PCF、SMF、UDM和AF提供的服务化接口,用于调用相应的服务化操作。N1、N2、N3、N4,以及N6为接口序列号。这些接口序列号的含义可参见第三代合作伙伴计划(3rd generation partnership project,3GPP)标准协议中定义的含义,在此不做限制。
应理解,上述本申请实施例能够应用的网络架构仅是示例性说明,本申请实施例适用的网络架构并不局限于此,任何包括能够实现上述各个网元的功能的网络架构都适用于本申请实施例。
还应理解,图1中的(a)或图1中的(b)所示的AMF、SMF、UPF、PCF、NEF等可以理解为用于实现不同功能的网元,例如可以按需组合成网络切片。这些网元可以各自 独立的设备,也可以集成于同一设备中实现不同的功能,或者可以是硬件设备中的网络元件,也可以是在专用硬件上运行的软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能,本申请对于上述网元的具体形态不作限定。
还应理解,上述命名仅为便于区分不同的功能而定义,不应对本申请构成任何限定。本申请并不排除在5G网络以及未来其它的网络中采用其他命名的可能。例如,在6G网络中,上述各个网元中的部分或全部可以沿用5G中的术语,也可能采用其他名称等。
还应理解,图1中的(a)或图1中的(b)的各个网元之间的接口名称只是一个示例,具体实现中接口的名称可能为其他的名称,本申请对此不作具体限定。此外,上述各个网元之间的所传输的消息(或信令)的名称也仅仅是一个示例,对消息本身的功能不构成任何限定。
本申请实施例主要涉及无源标签盘点,passive IoT(即射频识别(radio frequency identification,RFID))存在大规模部署应用场景,包括但不限于:
1)物流及仓储:包括货物盘存及跟踪、高价值货物(如,疫苗)运输过程环境及货物状态监测;
2)工业制造:包括环境及设备状态监测。
RFID具有大规模部署应用前景,预测未来将覆盖千亿级别的设备数目。但无源或者半无源带来的功能简单,导致RFID需要依赖外部激励才能发送信息,该激励一般来自读卡器(或者称为读写器),当前读卡器的部署方式存在读卡器与标签通信距离近,标签管理难等特点。导致进行passive IoT标签的盘点所适用的场景的范围和规模相对比较小。
一种passive IoT标签的盘点方式如图2所示,图2是一种passive IoT标签的管理方式的示意图。图2所示的场景下,读卡器和标签之间的通信距离近,部署读卡器的设备无法管理大范围内的标签。
图2中所示的P-IoT Tag表示passive IoT标签;读卡器表示射频识别技术中的读写器(或称为阅读器、询问器)用于读取(有时还可以写入)标签信息的设备;应用服务器可以理解为AF网元。
从图2中可以看出读卡器根据应用服务器的指示,对passive IoT的标签进行读(read)、写(write)、访问(access)、灭活(kill)等管理操作。这种passive IoT标签的盘点方式所适用的场景的范围和规模相对比较小。
需要说明的是,上述的“标签”也可以理解为终端。
本申请实施例基于图1中的(a)或图1中的(b)所述的5G通信系统架构,通过在基站内集成读卡器的新空口技术,实现基站对passive IoT的统一管理。以期实现在大规模、大覆盖环境下passive IoT终端的盘点。
应理解,本申请实施例提供的方法可以应用于5G通信系统,例如,图1中的(a)或图1中的(b)所示的通信系统。但是,本申请实施例中并不限定该方法能够应用的场景,例如,其他包括能够实现相应功能的网元的网络架构中同样适用。还例如,第六代通信(the 6th generation,6G)系统架构等。并且,本申请实施例上述所使用的各个网元的名称,在未来通信系统中,可能保持功能相同,但名称会改变。
为了便于理解本申请实施例的技术方案,在以5G架构为基础介绍本申请实施例的方案之前,首先对本申请实施例可能涉及到的一些术语或概念进行简单描述。
1、分组数据单元(packet data unit,PDU)会话。
PDU会话为终端设备与DN之间的一个关联,用于提供一个PDU连接服务。UE接入网络后建立PDU会话,并通过PDU会话访问外部DN,与部署在DN中的应用服务器交互。根据用户访问的DN不同,网络可以根据网络策略选择接入DN的UPF作为为锚点Anchor(即PSA UPF),并通过PSA UPF的N6接口访问应用服务器。此外5G系统还可以通过NEF网元,向外部的AF开放5G核心网(5G core,5GC)支持的能力。
2、RFID。
射频识别技术是20世纪80年代发展起来的一种新兴自动识别技术,射频识别技术是一项利用射频信号通过空间耦合(交变磁场或电磁场)实现无接触信息传递并通过所传递的信息达到识别目的的技术。
RFID是一种简单的无线系统,用于控制、检测和跟踪物体。该无线系统由一个读卡器(或称为读写器、阅读器、询问器等)和很多终端(或称为应答器)组成。RFID的读卡器通过天线与RFID终端进行无线通信,可以实现对终端识别码和内存数据的读出或写入操作。典型的读卡器包含有高频模块(发送器和接收器)、控制单元以及阅读器天线。
其中,终端(Tag)由耦合元件及芯片组成,每个终端具有唯一的电子编码,附着在物体上标识目标对象;读卡器(Reader)用于读取(有时还可以写入)终端信息的设备,可设计为手持式RFID读卡器或固定式读卡器。
3、终端管理。
根据Gen2V2协议,读卡器使用三种基本操作来管理其读卡器有效读取区域内的终端组(tag population)。这些操作中的每一种可以包括多个命令。操作被定义如下:
-选择,用于选择终端组。用于选择操作的命令集包括选择(Select)命令。
-盘点,用于识别终端组内的个体终端。用于盘点操作的命令集包括查询(Query)、Query Adjust、Query Rep、ACK和NAK命令。
-访问,用于与所识别的终端通信。读卡器可以执行核心操作,例如读取、写入、锁定或灭活(kill)终端;安全相关的操作,例如,认证终端;或者文件相关的操作,例如,打开终端存储器中的特定文件。用于访问操作的命令集包括Req_RN和认证(Authenticate)命令。
4、终端管理功能网元。
本申请实施例中涉及的终端管理功能网元可以是独立设立在5G核心网(5G core,5GC)中的一个新增的功能网元,还可以是与5GC中目前已有的网元合设的网元(如,与NEF或AMF合设),其中,终端管理功能网元与某个已有的网元合设可以理解为对某个已有网元的功能增强,使得该已有的网元具有终端管理功能。
终端管理功能网元用于实现终端盘点请求消息的转发和处理,具体转发和处理方式下面实施例中将详细描述,这里不赘述。
上文结合图1中的(a)和图1中的(b)介绍了本申请实施例能够应用的场景,并且结合图2简单介绍了目前的终端盘点的方法存在的缺陷,还简单介绍了本申请中涉及的基本概念,下文中将结合附图详细介绍本申请提供的通信的方法。
下文示出的实施例并未对本申请实施例提供的方法的执行主体的具体结构特别限定,只要能够通过运行记录有本申请实施例的提供的方法的代码的程序,以根据本申请实施例 提供的方法进行通信即可,例如,本申请实施例提供的方法的执行主体可以是核心网设备,或者是核心网设备中能够调用程序并执行程序的功能模块。
为了便于理解本申请实施例,做出以下几点说明。
第一,在本申请中,“用于指示”可以理解为“使能”,“使能”可以包括直接使能和间接使能。当描述某一信息用于使能A时,可以包括该信息直接使能A或间接使能A,而并不代表该信息中一定携带有A。
将信息所使能的信息称为待使能信息,则具体实现过程中,对待使能信息进行使能的方式有很多种,例如但不限于,可以直接使能待使能信息,如待使能信息本身或者该待使能信息的索引等。也可以通过使能其他信息来间接使能待使能信息,其中该其他信息与待使能信息之间存在关联关系。还可以仅仅使能待使能信息的一部分,而待使能信息的其他部分则是已知的或者提前约定的。例如,还可以借助预先约定(例如协议规定)的各个信息的排列顺序来实现对特定信息的使能,从而在一定程度上降低使能开销。同时,还可以识别各个信息的通用部分并统一使能,以降低单独使能同样的信息而带来的使能开销。
第二,在本申请中示出的第一、第二以及各种数字编号(例如,“#1”、“#2”等)仅为描述方便,用于区分的对象,并不用来限制本申请实施例的范围。例如,区分不同消息等。而不是用于描述特定的顺序或先后次序。应该理解这样描述的对象在适当情况下可以互换,以便能够描述本申请的实施例以外的方案。
第三,在本申请中,“预配置”可包括预先定义,例如,协议定义。其中,“预先定义”可以通过在设备(例如,包括各个网元)中预先保存相应的代码、表格或其他可用于指示相关信息的方式来实现,本申请对于其具体的实现方式不做限定。
第四,本申请实施例中涉及的“保存”,可以是指的保存在一个或者多个存储器中。所述一个或者多个存储器,可以是单独的设置,也可以是集成在编码器或者译码器,处理器、或通信装置中。所述一个或者多个存储器,也可以是一部分单独设置,一部分集成在译码器、处理器、或通信装置中。存储器的类型可以是任意形式的存储介质,本申请并不对此限定。
第五,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
第六,本申请实施例中涉及的“协议”可以是指通信领域的标准协议,例如可以包括5G协议、新空口(new radio,NR)协议以及应用于未来的通信系统中的相关协议,本申请对此不做限定。
以下,不失一般性,以网元之间的交互为例详细说明本申请实施例提供的通信的方法。
为了便于理解,下文中以接入网设备为RAN、移动性管理功能网元为AMF、终端管理控制面功能网元称为终端管理功能网元-CP、终端管理用户面功能网元称为终端管理功能网元-UP、会话管理功能网元为SMF、应用功能网元为AF、用户面功能网元为UPF、终端为UE为例进行说明。
需要说明的是,本申请中对于设备的名称不做任何的限定。
图3是本申请实施例提供的一种通信的方法的示意性流程图。以下结合各步骤,详细介绍该通信的方法。
S310,RAN收来自终端管理功能网元的第一请求消息,或者说,终端管理功能网元向RAN发送第一请求消息。
示例性地,终端管理功能网元向RAN发送第一请求消息包括以下几种可能的方式:
终端管理功能网元直接向RAN发送第一请求消息、终端管理功能网元通过AMF向RAN发送第一请求消息、终端管理功能网元-CP向RAN发送第一请求消息(如,终端管理功能网元-CP在收到AF的第三请求消息之后,向RAN发送第一请求消息)、终端管理功能网元-CP通过AMF向RAN发送第一请求消息(如,终端管理功能网元-CP在收到AF的第三请求消息之后,通过AMF向RAN发送第一请求消息)。
下面将结合具体的实施例(如,下文中的图4、图6、图7、图9和图10)详细说明RAN从AMF处接收的第一请求消息如何由终端管理功能网元触发发送,为了避免赘述,这里就不详述。
需要说明的是,上述只是举例说明终端管理功能网元向RAN发送第一请求消息可能的方式,对本申请的保护范围不构成任何的限定,还可以有其他的传输路径,这里不再一一举例说明。
具体地,第一请求消息用于请求对目标终端进行第一操作,该第一请求消息中包括该目标终端的标识信息和该第一操作的指示信息。
示例性地,第一请求消息可以理解为请求RAN盘点终端的请求消息,可以称为:盘点请求消息。在本申请中,盘点是指对目标终端执行第一操作。
其中,目标终端的标识信息用于指示待盘点的目标终端,目标终端的标识信息包括但不限于:
目标终端中任意一个目标终端的指示信息、目标终端的标识所属的取值区间、目标终端的标识的列表、目标终端所属终端组的组标识、目标终端所属用户的标识信息、目标终端的类型或者目标终端所属应用的标识信息等。
例如,待盘点的终端包括三个终端,该三个终端的标识分别为终端#1、终端#2和终端#3,上述的目标终端的标识信息可以是终端的标识列表,如,终端#1、终端#2和终端3。
还例如,待盘点的终端包括三个终端,该三个终端的标识分别为100、101和102,上述的目标终端的标识信息可以是终端标识的区间,如,100~102。
又例如,RAN覆盖范围内共有三个终端,该三个终端的标识分别为终端#1、终端#2和终端#3。目标终端中任意一个目标终端的指示信息是指盘点所有这三个终端。
又例如,待盘点的终端包括三个终端,该三个终端属于一个终端组,该终端组的组标识为终端组#1,上述的目标终端的标识信息可以是目标终端所属终端组的组标识,如,终端组#1。
又例如,待盘点的终端包括三个终端,该三个终端属于一个用户,该用户的用户的标识为用户#1,上述的目标终端的标识信息可以是目标终端所属用户的标识,如,用户的#1。
又例如,待盘点的终端包括三个终端,该三个终端都属于无源终端或都属于半无源终端。上述的目标终端的标识信息可以是无源终端或者半无源终端。
又例如,待盘点的终端包括三个终端,该三个终端属于一个应用,该应用的应用标识为应用#1,上述的目标终端的标识信息可以是目标终端所属应用的标识,如,应用#1。
需要说明的是,上述只是举例说明待盘点的终端的标识信息可能的形式,对本申请的 保护范围不构成任何的限定,其他能够标识出待盘点的终端的标识信息也在本申请的保护范围之内,这里不再一一举例说明。
其中,第一操作的指示信息用于指示待执行的第一操作,包括但不限于:
第一操作的标识、第一操作的标识所属的取值区间、第一操作的标识的列表、第一操作所属操作组的组标识等。
例如,待执行的操作包括一个操作,该操作的标识为操作#1,上述的第一操作的指示信息可以为第一操作的标识,如,操作#1。
还例如,待执行的操作包括三个操作,该三个操作的标识分别为操作#1、操作#2和操作#3,上述的第一操作的指示信息可以是操作的标识列表,如,操作#1、操作#2和操作3。
又例如,待执行的操作包括三个操作,该三个操作属于一个操作组,该操作组的组标识为操作组#1,上述的第一操作的指示信息可以是操作所属操作组的组标识,如,操作组#1。
应理解,上述的第一操作可以包括一个或者多个操作,在第一操作包括多个操作(如,操作#1和操作#2)的情况下,上述的第一操作的指示信息可以包括分别指示该多个操作的指示信息(如,指示操作#1的指示信息和指示操作#2的指示信息)。
需要说明的是,上述只是举例说明待执行的操作的指示信息可能的形式,对本申请的保护范围不构成任何的限定,其他能够指示待盘点的操作的指示信息也在本申请的保护范围之内,这里不再一一举例说明。
示例性地,第一操作包括以下至少一种:
查询终端标识、读、写、灭活、锁、块写、块擦、访问、加密、解密等。
示例性地,在某些情况下第一请求消息中可以不包括目标终端的标识信息,例如,第一请求消息中包括区域的标识信息,指示对某个区域中的终端进行盘点;还例如,第一请求消息仅触发盘点,具体盘点的目标终端可以是RAN覆盖下的全部的终端。
示例性地,在某些情况下第一请求消息中可以不包括第一操作的指示信息,例如,AF没有执行操作的命令;还例如,默认操作为查询终端标识,无需通过操作指示进行额外的指示。
在RAN接收到上述的第一请求消息之后,RAN执行盘点过程,图3所示的方法流程还包括:
S320,RAN向目标终端发送第一查询消息,或者说,目标终端接收来自RAN的第一查询消息。
示例性地,目标终端包括如图3中所示的第一目标终端、第二目标终端、…、第N目标终端。
该第一查询消息用于获取目标终端的标识信息。
需要说明的是,RAN接收到第一请求消息之后,触发盘点流程,具体包括:
首先,RAN向覆盖区域内的所有终端发送射频信息,以便给该RAN的覆盖区域内的所有终端提供激励信号,从而使终端能够向RAN发送信号。
接着,RAN向覆盖区域内的所有终端发送选择消息,选择消息用于选择所有终端中待盘点的终端(即目标终端),该选择消息的目标终端根据第一请求消息确定;
然后,RAN向所有终端中被选择的终端发送查询请求消息,查询请求消息用于获取所述被选择的终端的标识,所述被选择的终端为所述所有终端中所述待盘点的终端。被选择的目标终端发起随机接入过程,其中一个终端设备随机接入成功,本实施例中为第一目标终端。具体的随机接入过程可以是:RAN在第一查询消息中包括第一随机数,选中的目标终端根据第一随机数本地设置第二随机数。若一个终端设置的第二随机数为0时,则这个终端向RAN发送第三随机数。若RAN能够正确接收到第三随机数,则RAN向这个终端设备发送第三随机数。当这个终端接收到第三随机数时,这个终端设备确定随机接入成功。终端确认随机成功后,向RAN发送终端的标识信息;
最后,RAN接收来自第一目标终端发送的标识信息。
本申请中对于具体的盘点流程不做详细的描述,可以参考目前盘点流程的描述。
进一步地,RAN能够通过第一查询请求获取待盘点的第一目标终端的第一标识信息,图3所示的方法流程还包括:
S330,RAN接收来自第一目标终端的第一标识信息,或者说,第一目标终端向RAN发送第一标识信息。
该第一目标终端为待盘点的目标终端中的一个。例如,第一目标终端为待盘点的目标终端中的随机的一个目标终端,或者说第一目标终端为待盘点的目标终端中的任意的一个目标终端。
在所述第一操作的指示信息指示所述第一操作为查询终端标识,或者说,第一请求消息中不包括第一操作的指示信息的情况下,RAN获取到第一目标终端的第一标识信息之后,无需再向第一目标终端发送第一操作的指示信息对应的操作请求消息;或者,
在所述第一操作的指示信息指示所述第一操作为除查询终端标识之外的操作的情况下,图3所示的方法流程还包括:
S340,RAN向第一目标终端发送操作请求消息,或者说,第一目标终端接收来自RAN的操作请求消息。
该操作请求消息用于请求第一目标终端执行第一操作。
S341,第一目标终端执行第一操作得到第一执行结果。
作为一种可能的实现方式,若第一操作是read,执行结果中包括读取的数据。
作为另一种可能的实现方式,若第一操作为write,执行结果是成功或是失败的指示。
进一步地,第一目标终端执行第一操作得到第一执行结果之后,图3所示的方法流程还包括:
S350,第一目标终端向RAN发送第一执行结果,或者说,RAN接收来自第一目标终端的第一执行结果。
需要说明的是,RAN需要完成所有目标终端的盘点,在待盘点的目标终端包括多个目标终端的情况下,RAN在接收到第一目标终端的第一执行结果之后,还需要依次继续盘点其他的目标终端,直至一次盘点完成,其中,“依次”应理解为接收到一个目标终端的执行结果之后再发送查询请求(也称查询重复请求),如此重复,直至完成一次盘点。也就是说RAN需要对待盘点的目标终端中的每个目标终端执行上述的S320至S350。
图3所示的方法流程还包括:
S360,RAN向目标终端发送至少一个第二查询请求,或者说,目标终端接收来自RAN 的至少一个第二查询请求。
应理解,RAN向目标终端发送至少一个第二查询请求为:RAN向目标终端发送至少一个第二查询请求,为了便于描述将盘点第一目标终端之后的查询请求统称为第二查询请求。
具体过程如下:RAN向目标终端发送查询重复请求,第一目标终端收到查询重复请求后退出盘点过程,即不再响应对该目标终端的操作请求。其他目标终端接收到查询重复请求后,发起随机接入过程,其中一个终端设备随机接入成功,本实施例中为第二目标终端。具体的随机接入过程可以是:其他目标终端将之前设置的第二随机数减1,若一个目标终端设备第二随机数减为0,则这个目标终端向RAN发送第四随机数。若RAN能够正确接收到第四随机数,则RAN向这个目标终端发送第四随机数。当这个目标终端接收到第四随机数时,这个目标终端确定随机接入成功。当第二目标终端随机接入成功后,向RAN发送第二目标终端的标识信息。
S370,RAN接收来自至少一个第二目标终端的至少一个第二标识信息,或者说,至少一个第二目标终端向RAN发送至少一个第二标识信息。
该至少一个第二目标终端为待盘点的目标终端中除所述第一目标终端之外的目标终端。
应理解,至少一个第二目标终端向RAN发送至少一个第二标识信息为:至少一个第二目标终端响应不同的第二查询请求,分别向RAN发送第二标识信息。
S380,RAN向至少一个第二目标终端发送操作请求消息,或者说,至少一个第二目标终端接收来自RAN的操作请求消息。
该操作请求消息用于请求至少一个第二目标终端执行第一操作。
进一步地,至少一个第二目标终端执行第一操作之后得到至少一个第二执行结果,图3所示的方法流程还包括:
S381,至少一个第二目标终端执行第一操作得到至少一个第二执行结果。
作为一种可能的实现方式,若第一操作是read,第二执行结果中包括读取的数据。
作为另一种可能的实现方式,若第一操作为write,第二执行结果是成功或是失败的指示。
S390,RAN接收来自至少一个第二目标终端的至少一个第二执行结果,或者说,至少一个第二目标终端向RAN发送至少一个第二执行结果。
示例性地,在所述第一操作的指示信息指示所述第一操作为除查询终端标识之外的操作的情况下,所述第一请求消息中还包括所述第一操作对应的操作参数,所述操作请求消息中还包括所述操作参数。
例如,在第一操作的指示信息用于指示执行read的情况下,第一操作的指示信息可以称为read命令。具体地,对于read命令,操作参数包括读取的存储区,读取存储区的起始字地址以及字数目等。
还例如,在第一操作的指示信息用于指示执行write的情况下,第一操作的指示信息可以称为write命令。具体地,对于write命令,操作参数包括写入的存储区,读取存储区的起始字以及写入的数据。
可选地,对于写入信息,可以针对所有目标终端,携带相同的写入信息,也可以针对 不同的目终端分别携带不同的写入信息。
需要说明的是,本申请实施例中对于第一请求消息中可能包括的第一操作的指示信息和操作参数不做限定,可以参考相关技术中读卡器接收到的操作的指示信息和操作参数,还可以是未来技术发展之后读卡器接收到的操作的指示信息和操作参数,这里不再赘述。
示例性地,RAN获取到目标终端的标识信息和执行结果之后,可以将目标终端的标识信息和执行结果上报给终端管理功能网元,具体地,RAN上报目标终端的标识信息和执行结果的方式包括以下两种:
方式一、RAN针对每个目标终端分别上报该目标终端的标识信息和执行结果。
例如,在RAN接收来自所述第一目标终端的第一执行结果后,RAN上报第一目标终端的第一标识信息和所述第一执行结果。
可选地,可以通过以下几种可能上报:
可能一:RAN通过AMF上报。
在可能一下,RAN向AMF发送第一消息,所述第一消息中包括所述第一标识信息和所述第一执行结果,图3所示的方法流程还包括:
S351,RAN向AMF发送第一消息。
可能二:RAN通过第一接收网元上报。第一接收网元包括NEF或终端管理功能网元。
在可能二下,AMF接收第一接收网元的地址,所述地址为所述第一接收网元接收信息的地址;RAN根据所述地址向所述第一接收网元发送第一消息,所述第一消息中包括所述第一标识信息和所述第一执行结果。
图3所示的方法流程还包括:
S352,RAN接收来自AMF的第一接收网元的地址。
可选地,在第一接收网元为终端管理功能网元的情况下,终端管理功能网元通过AMF向RAN发送终端管理功能网元的地址。
可选地,在第一接收网元为NEF的情况下,NEF通过AMF向RAN发送NEF的地址。
S353,RAN向第一接收网元发送第一消息。
可能三:RAN通过第二接收网元上报。第二接收网元包括UPF或终端管理功能网元-UP。
在可能三下,RAN接收第一隧道信息,所述第一隧道信息用于指示第二接收网元接收信息的用户面端口;RAN根据所述第一隧道信息向所述第二接收网元发送第一消息,所述第一消息中包括所述第一标识信息和所述第一执行结果。
图3所示的方法流程还包括:
S354,RAN接收来自AMF的第一隧道信息。
可选地,在第一接收网元为UPF的情况下,UPF通过AMF向RAN发送第一隧道信息。
可选地,在第一接收网元为终端管理功能网元-UP的情况下,终端管理功能网元-UP通过AMF向RAN发送第一隧道信息。
S355,RAN向第二接收网元发送第一消息。
示例性地,AMF向RAN发送第一隧道信息可以是基于RAN的请求,图3所示的方法流程还包括:
S356,RAN向AMF发送第二请求消息。
第二请求消息用于请求获取所述第一隧道信息。
需要说明的是,可能三下RAN可以通过隧道上报盘点结果(如,上述的标识信息和执行结果),下面将结合具体的实施例说明隧道的建立和使用,这里不再赘述。
方式二、RAN针对所有目标终端(指RAN接收到的所有目标终端)统一上报目标终端的标识信息和执行结果。
例如,在RAN接收来自所述第一目标终端的第一执行结果,以及至少一个第二目标终端的至少一个第二执行结果后,RAN上报多个终端的标识信息和所述多个终端的执行结果。其中,所述多个终端包括所述第一目标终端和所述至少一个第二目标终端。
可选地,与上述的方式一类似可以通过以下几种可能上报:
可能一:RAN通过AMF上报。
在可能一下,RAN向AMF发送第二消息,所述第二消息中包括所述多个终端的标识信息和所述多个终端的执行结果,图3所示的方法流程还包括:
S391,RAN向AMF发送第二消息。
可能二:RAN通过第一接收网元上报。第一接收网元包括NEF或终端管理功能网元。
在可能二下,RAN接收来第一接收网元的地址,所述地址为所述第一接收网元接收信息的地址;RAN根据所述地址向所述第一接收网元发送第二消息,所述第二消息中包括所述多个终端的标识信息和所述多个终端的执行结果。
图3所示的方法流程还包括:
S392,RAN接收来自AMF的第一接收网元的地址。
可选地,在第一接收网元为终端管理功能网元的情况下,终端管理功能网元通过AMF向RAN发送终端管理功能网元的地址。
可选地,在第一接收网元为NEF的情况下,NEF通过AMF向RAN发送NEF的地址。
S393,RAN向第一接收网元发送第二消息。
可能三:RAN通过第二接收网元上报。第二接收网元包括UPF或终端管理功能网元-UP。
在可能三下,RAN接收第一隧道信息,所述第一隧道信息用于指示第二接收网元接收信息的用户面端口;RAN根据所述第一隧道信息向所述第二接收网元发送第二消息,所述第二消息中包括所述多个终端的标识信息和所述多个终端的执行结果。
图3所示的方法流程还包括:
S394,RAN接收来自AMF的第一隧道信息。
可选地,在第一接收网元为UPF的情况下,SMF通过AMF向RAN发送第一隧道信息。
可选地,在第一接收网元为终端管理功能网元-UP的情况下,终端管理功能网元-CP通过AMF向RAN发送第一隧道信息。
S395,RAN向第二接收网元发送第一消息。
示例性地,AMF向RAN发送第一隧道信息可以是基于RAN的请求,图3所示的方法流程还包括:
S396,RAN向AMF发送第二请求消息。
第二请求消息用于请求获取所述第一隧道信息。
需要说明的是,可能三下RAN可以通过隧道上报,下面将结合具体的实施例说明隧道的建立和使用,这里不再赘述。
一种可能的实现方式,RAN可能接收到多个第一请求消息,分别请求RAN对不同的目标终端进行盘点,为了区别上报的盘点结果是针对某一个第一请求消息,可以通过关联标识进行关联,第一请求消息中包括第一关联标识,所述第一关联标识用于关联所述第一请求消息与所述第一消息或用于关联所述第一请求消息和所述第二消息,所述第一消息和/或所述第二消息中包括所述第一关联标识。
一种可能的实现方式,第一请求消息中还包括第一指示信息,该第一指示信息用于指示RAN向所述目标终端发送所述查询请求的区域。
示例性地,发送所述查询请求的区域包括待盘点的终端所位于的位置,第一指示信息包括但不限于3GPP的位置信息(如,TA list,Cell list等)。
例如,待盘点的终端包括三个终端,该三个终端的分别位于cell#1、cell#2和cell#3,上述的用于指示盘点区域的指示信息可以是终端的3GPP的位置信息,如,cell#1、cell#2和cell#3。
需要说明的是,本申请实施例中对于用于指示发送所述查询请求的区域的指示信息的具体形式不做限定,能够指示发送所述查询请求的区域即可。
一种可能的实现方式,第一请求消息中还包括进行操作间隔时长指示信息,该进行操作间隔时长指示信息可以理解为最小盘点间隔用于指示一次盘点结束后,经过一个时间间隔后,又重新开始一次盘点。所述进行操作间隔时长指示信息用于指示进行相邻两次操作之间间隔的时长。
可选地,在所述第一请求消息中包括所述进行操作间隔时长指示信息的情况下,RAN对所述目标终端进行一次操作结束之后,RAN再次对所述目标终端进行操作,其中,再次进行操作的起始时刻和所述进行一次操作结束时刻之间的间隔为所述时长。
一种可能的实现方式,第一请求消息中还包括进行操作起始时刻指示信息,该进行操作起始时刻指示信息用于指示首次进行操作的起始时刻。
一种可能的实现方式,第一请求消息中还包括进行操作超时时刻指示信息,该进行操作超时时刻指示信息用于指示最后一次进行操作结束的时刻。
可选地,在RAN完成一个盘点之后,可以通过第一信息告知核心网设备,图3所示的方法流程还包括:
311,RAN发送第一信息。
所述第一信息用于指示完成对所述目标终端第一操作。
具体的,具体的,RAN在执行S360之后,在配置的时间内未收到任何终端发起的随机接入请求消息,则RAN判断在其覆盖范围内的目标终端盘点完成(也可以说查询完成或第一操作完成)。
为了便于理解本申请提供的通信的方法,下面结合具体的实施例说明。
下面结合具体实施例,对上述图3的实施例进行具体说明。以下图4的实施例是上述图3的实施例的一种具体实现。图4是本申请提供的另一种通信的方法的示意性流程图。以下结合各步骤,详细介绍该通信的方法。
S411,应用的AF向终端管理功能网元发送请求消息#1,或者说终端管理功能网元接收来自AF的请求消息#1。
该请求消息#1用于请求对目标终端进行第一操作,该请求消息#1中包括目标终端的标识信息、第一操作的指示信息和应用的信息。
其中,目标终端的标识信息和第一操作的指示信息如上文中所述,这里不再赘述。应用的信息包括所述应用的标识或所述应用的数据网络接入标识。
示例性地,应用标识用于标识发起盘点请求的AF。
例如,发起盘点请求的AF的标识为AF#1,上述的应用标识可以是AF#1。
在该实施例中,当上述的请求消息#1中不携带第一操作的指示信息的情况下,表示执行命令为查询(query),即查询终端标识;或者,当上述的请求消息#1中携带第一操作的指示信息,且该第一操作的指示信息包括query的情况下,表示执行命令为查询(query)。
可选地,请求消息#1中还包括第一区域指示信息。
示例性地,第一区域包括待盘点的终端所位于的位置,用于指示第一区域的第一区域指示信息包括但不限于地理位置、市政位置、3GPP的位置信息(如,TA list,Cell list等)。
例如,待盘点的终端包括三个终端,该三个终端的分别位于cell#1、cell#2和cell#3,上述的用于指示第一区域的第一区域指示信息可以是终端的3GPP的位置信息,如,cell#1、cell#2和cell#3。
需要说明的是,本申请实施例中对于用于指示第一区域的第一区域指示信息的具体形式不做限定,能够指示待盘点的终端所位于的位置即可。
可选地,请求消息#1中还包括操作参数,其中,操作参数如上文中所述,这里不再赘述。
可选地,请求消息#1中还包括通知地址#1和关联标识#1。
示例性地,通知地址#1用于表示AF接收终端信息以及命令执行结果的地址。例如,AF的地址。
示例性地,关联标识#1用于关联消息#1和针对该消息#1的响应消息#1。
可选地,请求消息#1中还包括行操作间隔时长指示信息、进行操作起始时刻指示信息和进行操作超时时刻指示信息中的至少一个。
进一步地,终端管理功能网元接收到请求消息#1之后,能够根据请求消息#1中包括的信息(如,目标终端的标识信息、区域指示信息#1和应用标识等)确定AMF以及对应的RAN,图4所示的方法流程还包括:
S412,终端管理功能网元确定AMF和RAN。
示例性地,终端管理功能网元根据目标终端的标识信息、区域指示信息#1和应用标识确定AMF,以及AMF对应的RAN。譬如终端管理功能网元根据区域指示信息#1(例如小区标识)确定对应的RAN或是AMF,或是根据目标终端的标识信息确定该标识信息对应的RAN或是AMF。
本申请实施例中RAN为具有终端盘点功能的RAN。
进一步地,在终端管理功能网元确定AMF之后,终端管理功能网元可以向AMF发送请求消息#2,图4所示的方法流程还包括:
S413,终端管理功能网元向AMF发送请求消息#2,或者说AMF接收来自终端管理功能网元的请求消息#2。
该请求消息#2用于请求对目标终端进行第一操作,该请求消息#1中包括目标终端的标识信息、第一操作的指示信息。其中,目标终端的标识信息和第一操作的指示信息如上文中所述,这里不再赘述。
可选地,请求消息#2中还包括第二区域指示信息。
示例性地,第二区域包括该AMF管理的区域,用于指示第二区域的第二区域指示信息包括3GPP的位置信息(如,TA list,Cell list等)。
需要说明的是,在AF提供的区域(如,上述的S412中终端管理功能网元接收到的请求消息#1中包括的用于指示第一区域的第一区域指示信息)是地理位置和/或市政位置时,终端管理功能网元需要将第一区域映射成TA list或cell list。
若第一区域由不同的AMF管理,那么终端管理功能网元要向每个AMF分别发送请求消息#2,不同的请求消息#2中包括的用于指示第二区域的第二区域指示信息,用于指示不同的AMF管理的第二区域。
可选地,请求消息#2中还包括操作参数,其中,操作参数如上文中所述,这里不再赘述。
可选地,请求消息#2中还包括通知地址#2和关联标识#2。
示例性地,通知地址#2用于表示终端管理功能网元接收终端信息以及命令执行结果的地址。例如,终端管理功能网元的地址。
示例性地,关联标识#2用于关联消息#2和针对该消息#2的响应消息#2。
可选地,请求消息#2中还包括行操作间隔时长指示信息、进行操作起始时刻指示信息和进行操作超时时刻指示信息中的至少一个。
进一步地,某个AMF接收到请求消息#2之后可以请求RAN目标终端进行第一操作,图4所示的方法流程还包括:
S414,AMF向RAN发送第一请求消息,或者说RAN接收来自AMF的第一请求消息。
参考上述图3中的步骤S310的描述,这里不再赘述。
需要说明的是,在该AMF管理的第二区域覆盖多个RAN的情况下,该AMF分别向该多个RAN发送第一请求消息,向不同的RAN发送第一请求消息与上述的向某个RAN发送第一请求消息类似,不同的是需要针对不通过的RAN确定出该RAN对应的发送查询请求的区域,这里不再赘述。
步骤S412和步骤S413的另一种实现方式可以是:终端管理功能网元确定向每一个RAN发送第一请求消息#2,终端管理功能网元将第一请求消息#2封装在消息#A中,消息#A中还包括RAN的标识信息。当AMF接收到消息#A后,AMF将消息#A解封装后获得第一请求消息#2,将第一请求消息#2封装在消息#B中发送给RAN的标识信息对应的RAN,可以理解为AMF透传了第一请求消息#2。这里,第一请求消息#2和第一请求消息相同。
进一步地,RAN接收到第一请求消息之后可以保存该第一请求消息,图4所示的方法流程还包括:
S415,RAN保存第一请求消息。
一种可能的实现方式,第一请求消息中包括进行操作起始时刻指示信息,在该进行操作起始时刻还未到达的情况下,RAN可以不进行盘点,而是保存该第一请求消息即可。
具体地,在满足以下条件中的一种的情况下,RAN进行盘点:
第一请求消息中不包括进行操作起始时刻指示信息、进行操作起始时刻到达、超过进行操作起始时刻等。图4所示的方法流程还包括:
S416,RAN向终端发送选择消息。
具体地,RAN向覆盖区的所有终端发送射频信号,以便给RAN的覆盖区域内的终端提供激励信号,从而使终端设备向RAN发送信号。同时,RAN向RAN的覆盖区域内的终端发送选择消息。
随后RAN向所有选择的终端发送查询请求,获得目标终端的标识信息和执行结果,图4所示的方法流程还包括:
S420,RAN向目标终端发送第一查询消息,或者说,目标终端接收来自RAN的第一查询消息。
S430,RAN接收来自第一目标终端的第一标识信息,或者说,第一目标终端向RAN发送第一标识信息。
步骤S420和步骤S430为第一终端的随机接入过程,具体实现如下:RAN在第一查询消息中包括第一随机数,选中的目标终端根据第一随机数本地设置第二随机数。若一个终端设置的第二随机数为0时,则这个终端向RAN发送第三随机数。若RAN能够正确接收到第三随机数,则RAN向这个终端发送第三随机数。当这个终端接收到第三随机数时,这个终端确定随机接入成功。终端确认随机成功后,向RAN发送终端的标识信息
S440,RAN向第一目标终端发送操作请求消息,或者说,目标终端接收来自RAN的操作请求消息。
S441,第一目标终端执行第一操作得到第一执行结果。
S450,RAN接收来自第一目标终端的第一执行结果,或者说,第一目标终端向RAN发送第一执行结果。
S460,RAN向目标终端发送至少一个第二查询请求,或者说,目标终端接收来自RAN的至少一个第二查询请求。
具体过程如下:其RAN向目标终端发送查询重复请求,第一目标终端收到查询重复请求后退出盘点过程,即不再响应对该目标终端的操作请求。其他目标终端接收到查询重复请求后,发起随机接入过程,其中一个终端随机接入成功,本实施例中为第二目标终端。具体的随机接入过程可以是:其他目标终端将之前设置的第二随机数减1,若一个目标终端设备第二随机数减为0,则这个目标终端向RAN发送第四随机数。若RAN能够正确接收到第四随机数,则RAN向这个目标终端发送第四随机数。当这个目标终端接收到第四随机数时,这个目标终端确定随机接入成功。当第二目标终端随机接入成功后,向RAN发送第二目标终端的标识信息。
S470,RAN接收来自至少一个第二目标终端的至少一个第二标识信息,或者说,至少一个第二目标终端向RAN发送至少一个第二标识信息。
S480,RAN向至少一个第二目标终端发送操作请求消息,或者说,至少一个第二目标终端接收来自RAN的操作请求消息。
S481,至少一个第二目标终端执行第一操作得到至少一个第二执行结果。
S490,RAN接收来自至少一个第二目标终端的至少一个第二执行结果,或者说,至少一个第二目标终端向RAN发送至少一个第二执行结果。
具体查询流程参考上述图3中所示的步骤S320至S390,这里不再赘述。
该实施例中,RAN接收到目标终端的标识信息和执行结果之后,通过AMF发送给终端管理功能。应理解,如图3中所示的两种上报方式,该实施例中RAN接收到目标终端的标识信息和执行结果之后,也可以通过两种上报方式上报:
方式一、RAN针对每个目标终端分别上报该目标终端的标识信息和执行结果。
在方式一下,图4所示的方法流程还包括:
S451,RAN向AMF发送第一消息。
第一消息中包括第一标识信息、第一执行结果和通知地址#1。
S452,AMF向终端管理功能网元发送第一消息。
S453,终端管理功能网元向AF发送第一消息。
方式二、RAN针对所有接收到的目标终端统一上报目标终端的标识信息和执行结果。
当RAN判断其覆盖范围内选择的所有终端盘点完成,图4所示的方法流程还包括:
S491,RAN向AMF发送第二消息。
第二消息中包括所述多个终端的标识信息和所述多个终端的执行结果,其中,所述多个终端包括所述第一目标终端和所述至少一个第二目标终端。
RAN判断其覆盖范围内选择的所有终端盘点完成,具体如下:RAN在执行步骤S480之后,在配置的时间内未收到任何终端发起的随机接入请求消息,则RAN判断其覆盖范围内目标终端盘点完成(也可以说查询完成或目标操作完成)。
S492,AMF向终端管理功能网元发送第二消息
S493,终端管理功能网元向AF发送第二消息。
示例性地,当终端管理功能网元盘点参与盘点的所有RAN都上报了终端ID和执行结果或定时器超时后,终端管理功能网元向AF发送第二消息。
示例性地,RAN盘点结束之后可以向AMF发送第一信息,通知盘点结束,图4所示的方法流程还包括:
S494,RAN向AMF发送第一信息。
一种可能的实现方式,图4中终端管理功能网元可以和NEF合设,上述的终端管理功能网元执行的动作可以理解为NEF执行的动作。
该实现方式下,图4所示的方法流程可以应用于图5中的(a)所示的网络架构中。
另一种可能的实现方式,图4中终端管理功能网元可以为新增的独立功能网元,能够用于转发AF和AMF之间的盘点请求和响应。
该实现方式下,图4所示的方法流程可以应用于图5中的(b)所示的网络架构中。
又一种可能的实现方式,图4中终端管理功能网元可以为新增的独立功能网元,能够用于转发NEF和AMF之间的盘点请求和响应,也就是说图4中所示的终端管理功能网元和AF之间的盘点请求和响应需要通过NEF转发。
该实现方式下,图4所示的方法流程可以应用于图5中的(c)所示的网络架构中。
又一种可能的实现方式,图4中终端管理功能网元可以为和AMF合设,上述终端管 理功能网元和AMF之间的交互可以理解为内部交互。
该实现方式下,图4所示的方法流程可以应用于图5中的(d)所示的网络架构中。
图4所示的方法信息介绍了,RAN通过AMF、终端管理功能网元上报盘点结果的流程。
示例性地,RAN还可以通过隧道上报盘点结果,下面将结合图6至图10详细介绍通过隧道上报盘点结果的流程。
以下图6的实施例是上述图3的实施例的另一种具体实现。图6是本申请提供的另一种通信的方法的示意性流程图。以下结合各步骤,详细介绍该通信的方法。
S611,应用的AF向终端管理功能网元发送请求消息#3,或者说终端管理功能网元接收来自AF的请求消息#3。
具体地,请求消息#3与上述的S411中所示的请求消息#1类似,如,用于请求对目标终端进行第一操作,包括目标终端的标识信息、第一操作的指示信息和应用的信息。
还如,包括操作参数、第一区域指示信息、作间隔时长指示信息、进行操作起始时刻指示信息和进行操作超时时刻指示信息中的至少一个。
不同点在于该实施例中后续RAN上报盘点结果时通过隧道#1上报(隧道#1的建立和使用下面将介绍),请求消息#3中可以无需包括通知地址#1和关联标识#1。其中,隧道#1为上述图3中所述的第一隧道的一种。
另外,不同点在于请求消息#3中可以包括AS隧道信息(还可以称为第二隧道信息),所述AS隧道信息用于指示所述应用网元接收信息的用户面地址。
S612,终端管理功能网元确定AMF和RAN。
参考图4中步骤S412的描述,这里不再赘述。
进一步地,在终端管理功能网元确定AMF之后,终端管理功能网元可以向AMF发送请求消息#4,图6所示的方法流程还包括:
S613,终端管理功能网元向AMF发送请求消息#4,或者说AMF接收来自终端管理功能网元的请求消息#4。
具体地,请求消息#4与上述的S413中所示的请求消息#2类似,如,用于请求对目标终端进行第一操作,包括目标终端的标识信息、第一操作的指示信息和应用的信息。
还如,包括操作参数、第二区域指示信息、作间隔时长指示信息、进行操作起始时刻指示信息和进行操作超时时刻指示信息中的至少一个。
不同点在于请求消息#4中可以无需包括通知地址#2和关联标识#2。
另外,不同点在于请求消息#4中可以包括AS隧道信息,还可以包括配置指示信息(盘点标识),所述配置指示信息用于指示所述盘点的请求(或配置),用于将后续RAN上报的信息与该盘点的请求进行关联。
进一步地,某个AMF接收到请求消息#4之后可以请求RAN目标终端进行第一操作,图6所示的方法流程还包括:
S614,AMF向RAN发送第一请求消息,或者说RAN接收来自AMF的第一请求消息。
参考上述图4中的步骤S414的描述,这里不再赘述。
可选地,在该实施例中第一请求消息中还可以包括配置指示信息。
S615,RAN保存第一请求消息。
参考上述图4中的步骤S415的描述,这里不再赘述。
S616,RAN向终端发送选择消息。
参考上述图4中的步骤S416的描述,这里不再赘述。
S620,RAN向目标终端发送第一查询消息,或者说,目标终端接收来自RAN的第一查询消息。
参考上述图3中的步骤S320的描述,这里不再赘述。
S630,RAN接收来自第一目标终端的第一标识信息,或者说,第一目标终端向RAN发送第一标识信息。
参考上述图3中的步骤S330的描述,这里不再赘述。
该实施例中,RAN接收到第一目标终端的第一标识信息之后,确定有上报的信息需要上报,触发隧道#1建立,以便于后续盘点结果的上报,则图6所示的方法流程还包括:
S631,RAN向AMF发送请求消息#5,或者说AMF接收来自RAN的请求消息#5。
该请求消息#5用于请求上报信息。
具体地,该请求消息#5中包括配置指示信息。
进一步地,AMF接收到请求消息#5之后确定需要建立隧道#1,图6所示的方法流程还包括:
S632,AMF需要确定建立隧道#1。
具体地,AMF根据应用标识等信息确定需要建立用户面隧道#1,以便于传输盘点结果。
S633,AMF向SMF发送请求消息#6,或者说SMF接收来自AMF的请求消息#6。
请求消息#6用于请求建立隧道#1,该请求消息#6中包括应用标识。
可选地,请求消息#6还包括AS隧道信息。
S634,SMF选择UPF。
具体地,SMF根据应用标识选择合适的UPF。
SMF选择合适的UPF之后,向UPF发送请求建立隧道的请求消息,图6所示的方法流程还包括:
S635,SMF向UPF发送请求消息#7,或者说UPF接收来自SMF的请求消息#7。
请求消息#7用于请求建立隧道#1,该请求消息#7中包括AS隧道信息。
作为一种可能的实现方式,AS隧道信息为AMF上报的,如,请求消息#6中包括AS隧道信息。
作为另一种可能的实现方式,AS隧道信息为SMF根据配置确定,其中SMF保存了目标终端的标识信息或第一区域指示信息对应的AS隧道信息。
在UPF接收到请求消息#7之后,可以建立UPF和AS之间的隧道#1,图6所示的方法流程还包括:
S636,建立隧道#1。
进一步地,隧道#1建立之后,UPF需要将隧道#1相关的信息通过SMF、AMF通知给RAN,图6所示的方法流程还包括:
S637,UPF向RAN发送CN隧道信息#1,或者说RAN接收来自UPF的CN隧道信 息#1。
CN隧道信息#1用于指示UPF接收上行数据的隧道端点。其中,CN隧道信息#1为上述图3中所示的实施例中第一隧道信息的一种。
具体地,UPF向RAN发送CN隧道信息#1,包括:
UPF向SMF发送用于响应上述的请求消息#7的响应消息#7,该响应消息#7中包括CN隧道信息#1;SMF向AMF发送用于响应上述的请求消息#6的响应消息#6,该响应消息#6中包括CN隧道信息#1;AMF向RAN发送用于响应上述的请求消息#5的响应消息#5,通知RAN可以通过隧道#1上报盘点结果,该响应消息#5中包括CN隧道信息#1。
可选地,RAN可以通过AMF、SMF向UPF上报AN隧道信息,其中,所述AN隧道信息指示RAN接收下行数据的隧道端点。图6所示的方法流程还包括:
S638,RAN向UPF发送AN隧道信息,或者说UPF接收来自RAN的AN隧道信息。
AN隧道信息指示RAN接收下行数据的隧道端点。
上述的S631至S6391详细说明了隧道#1建立的过程,在该隧道#1建立完成之后,RAN可以使用该隧道#1上报盘点信息,图6所示的方法流程还包括:
S640,RAN向第一目标终端发送操作请求消息,或者说,目标终端接收来自RAN的操作请求消息。
S641,第一目标终端执行第一操作得到第一执行结果。
S650,RAN接收来自第一目标终端的第一执行结果,或者说,第一目标终端向RAN发送第一执行结果。
S660,RAN向目标终端发送至少一个第二查询请求,或者说,目标终端接收来自RAN的至少一个第二查询请求。
S670,RAN接收来自至少一个第二目标终端的至少一个第二标识信息,或者说,至少一个第二目标终端向RAN发送至少一个第二标识信息。
S680,RAN向至少一个第二目标终端发送操作请求消息,或者说,至少一个第二目标终端接收来自RAN的操作请求消息。
S681,至少一个第二目标终端执行第一操作得到至少一个第二执行结果。
S690,RAN接收来自至少一个第二目标终端的至少一个第二执行结果,或者说,至少一个第二目标终端向RAN发送至少一个第二执行结果。
具体查询流程参考上述图3中所示的步骤S340至S390,这里不再赘述。
该实施例中,RAN接收到目标终端的标识信息和执行结果之后,通过隧道发送给AS。应理解,如图3中所示的两种上报方式,该实施例中RAN接收到目标终端的标识信息和执行结果之后,也可以通过两种上报方式上报:
方式一、RAN针对每个目标终端分别上报该目标终端的标识信息和执行结果。
在方式一下,图6所示的方法流程还包括:
S651,RAN通过隧道向UPF发送第一消息。
具体地,RAN根据CN隧道信息#1,向UPF发送第一消息。
第一消息中包括第一标识信息、第一执行结果和通知地址#1。
S652,UPF向AS发送第一消息。
具体地,UPF根据AS隧道信息,向AS发送第一消息。
方式二、RAN针对所有目标终端统一上报目标终端的标识信息和执行结果。
当RAN判断选择的所有终端盘点完成,图6所示的方法流程还包括:
S691,RAN通过隧道向UPF发送第二消息。
具体地,RAN根据CN隧道信息#1,向UPF发送第二消息。
第二消息中包括所述多个终端的标识信息和所述多个终端的执行结果,其中,所述多个终端包括所述第一目标终端和所述至少一个第二目标终端。
S692,UPF通过隧道向AS发送第二消息。
具体地,UPF根据AS隧道信息,向AS发送第二消息。
一种可能的实现方式,RAN确定盘点结束之后,可以向终端管理功能网元-UP指示盘点结束,图6所示的方法流程还包括:
S693,RAN通过隧道向UPF发送第一信息。
该第一信息用于指示盘点结束。
S694,UPF发起隧道释放。
由上述图6所示的方法流程可知,隧道由RAN接收到目标终端的标识信息之后,发起建立(如,通过请求消息#5发起隧道#1建立)。作为一种可能的实现方式,隧道还可以在RAN接收到盘点请求之后发起建立,可以理解为由终端管理功能网元发起建立,下面结合图7说明隧道由终端管理功能网元发起建立隧道的流程。
以下图7的实施例是上述图3的实施例的又一种具体实现。图7是本申请提供的又一种通信的方法的示意性流程图。以下结合各步骤,详细介绍该通信的方法。
S711,应用的AF向终端管理功能网元发送请求消息#3,或者说终端管理功能网元接收来自AF的请求消息#3。
参考图6中步骤S611的描述,这里不再赘述。
S712,终端管理功能网元确定AMF和RAN。
参考图4中步骤S412的描述,这里不再赘述。
S713,终端管理功能网元向AMF发送请求消息#4,或者说AMF接收来自终端管理功能网元的请求消息#4。
参考图6中步骤S613的描述,这里不再赘述。
S714,AMF向RAN发送第一请求消息,或者说RAN接收来自AMF的第一请求消息。
参考上述图4中的步骤S414的描述,这里不再赘述。
在该实施例中,RAN收到第一请求消息之后,可以向AMF发送响应消息#1,图7所示的方法流程还包括:
S715,RAN向AMF发送响应消息#1,或者说AMF接收来自RAN的响应消息#1。
该响应消息#1(如,盘点应答消息)中包括AN隧道信息。
S716,AMF向SMF发送请求消息#8,或者说SMF接收来自AMF的请求消息#8。
请求消息#8用于请求建立隧道,该请求消息#6中包括应用标识和AN隧道信息。
可选地,请求消息#8还包括AS隧道信息。
S717,SMF选择UPF。
参考上述图6中的步骤S634的描述,这里不再赘述。
S718,SMF向UPF发送请求消息#9,或者说UPF接收来自SMF的请求消息#9。
请求消息#9用于请求建立隧道,该请求消息#9中包括AN隧道信息和AS隧道信息。
作为一种可能的实现方式,AS隧道信息为AMF上报的,如,请求消息#8包括AS隧道信息。
作为另一种可能的实现方式,AS隧道信息为SMF根据配置确定,其中SMF保存了目标终端的标识信息或第一区域指示信息对应的AS隧道信息。
在UPF接收到请求消息#9之后,可以建立UPF和AS之间的隧道,图7所示的方法流程还包括:
S719,建立隧道。
进一步地,隧道建立之后,UPF需要将隧道相关的信息通过SMF、AMF发送给RAN,图7所示的方法流程还包括:
S7191,UPF向RAN发送CN隧道信息#1,或者说RAN接收来自UPF的CN隧道信息#1。
具体地,UPF向RAN发送CN隧道信息#1可以是:
UPF向SMF发送响应上述的请求消息#9的响应消息#9,响应消息#9中包括CN隧道信息#1;SMF向AMF发送响应上述的请求消息#8响应消息#8,响应消息#8中包括CN隧道信息#1;AMF向RAN发送CN隧道信息#1(如,盘点请求完成消息)。
上述的步骤S711至S7191说明了隧道建立的流程,后续RAN可以通过隧道上报盘点结果。
该实施例中,RAN接收到CN隧道信息#1之后,可以执行盘点流程,具体包括以下步骤:
S720,RAN向目标终端发送第一查询消息,或者说,目标终端接收来自RAN的第一查询消息。
S730,RAN接收来自第一目标终端的第一标识信息,或者说,第一目标终端向RAN发送第一标识信息。
S740,RAN向第一目标终端发送操作请求消息,或者说,目标终端接收来自RAN的操作请求消息。
S741,第一目标终端执行第一操作得到第一执行结果。
S750,RAN接收来自第一目标终端的第一执行结果,或者说,第一目标终端向RAN发送第一执行结果。
S760,RAN向目标终端发送至少一个第二查询请求,或者说,目标终端接收来自RAN的至少一个第二查询请求。
S770,RAN接收来自至少一个第二目标终端的至少一个第二标识信息,或者说,至少一个第二目标终端向RAN发送至少一个第二标识信息。
S780,RAN向至少一个第二目标终端发送操作请求消息,或者说,至少一个第二目标终端接收来自RAN的操作请求消息。
S781,至少一个第二目标终端执行第一操作得到至少一个第二执行结果。
S790,RAN接收来自至少一个第二目标终端的至少一个第二执行结果,或者说,至少一个第二目标终端向RAN发送至少一个第二执行结果。
具体查询流程参考上述图3中所示的步骤S320至S390,这里不再赘述。
该实施例中,RAN接收到目标终端的标识信息和执行结果之后,通过隧道发送给AS。应理解,如图3中所示的两种上报方式,该实施例中RAN接收到目标终端的标识信息和执行结果之后,也可以通过两种上报方式上报:
方式一、RAN针对每个目标终端分别上报该目标终端的标识信息和执行结果。
在方式一下,图7所示的方法流程还包括:
S751,RAN通过隧道向UPF发送第一消息。
具体地,RAN根据CN隧道信息#1,向UPF发送第一消息。
第一消息中包括第一标识信息、第一执行结果和通知地址#1。
S752,UPF向AS发送第一消息。
具体地,UPF根据AS隧道信息,向AS发送第一消息。
方式二、RAN针对所有目标终端统一上报目标终端的标识信息和执行结果。
当RAN判断选择的所有终端盘点完成,图8所示的方法流程还包括:
S791,RAN通过隧道向UPF发送第二消息。
具体地,RAN根据CN隧道信息#1,向UPF发送第二消息。
第二消息中包括所述多个终端的标识信息和所述多个终端的执行结果,其中,所述多个终端包括所述第一目标终端和所述至少一个第二目标终端。
S792,UPF通过隧道向AS发送第二消息。
具体地,UPF根据AS隧道信息,向AS发送第二消息。
一种可能的实现方式,RAN确定盘点结束之后,可以向终端管理功能网元-UP指示盘点结束,图7所示的方法流程还包括:
S793,RAN通过隧道向UPF发送第一信息。
该第一信息用于指示盘点结束。
S794,UPF发起隧道释放。
一种可能的实现方式,图6和图7中终端管理功能网元可以和NEF合设,上述的终端管理功能网元执行的动作可以理解为NEF执行的动作。
该实现方式下,图6和图7所示的方法流程可以应用于图8中的(a)所示的网络架构中。
另一种可能的实现方式,图6和图7中终端管理功能网元可以为新增的独立功能网元,能够用于转发AF和AMF之间的盘点请求和响应。
该实现方式下,图6和图7所示的方法流程可以应用于图8中的(b)所示的网络架构中。
又一种可能的实现方式,图6和图7中终端管理功能网元可以为新增的独立功能网元,能够用于转发NEF和AMF之间的盘点请求和响应,也就是说图4中所示的终端管理功能网元和AF之间的盘点请求和响应需要通过NEF转发。
该实现方式下,图6和图7所示的方法流程可以应用于图8中的(c)所示的网络架构中。
又一种可能的实现方式,图6和图7中终端管理功能网元可以和AMF合设,AMF和终端管理功能网元之间的交互可以看成内部交互。
该实现方式下,图6和图7所示的方法流程可以应用于图8中的(d)所示的网络架构中。
由上述图7所示的方法流程可知,隧道由终端管理功能网元发起建立。作为一种可能的实现方式,隧道终端管理控制面功能网元发起建立,下面结合图9说明隧道由终端管理功能网元-CP发起建立隧道的流程。
以下图9的实施例是上述图3的实施例的又一种具体实现。图9是本申请提供的又一种通信的方法的示意性流程图。以下结合各步骤,详细介绍该通信的方法。
S911,应用的AF向终端管理功能网元-CP发送请求消息#10,或者说终端管理功能网元-CP接收来自AF的请求消息#10。
请求消息#10(还可以称为第三请求消息)中包括的内容与上述请求消息#3相同,这里不再赘述。
S912,终端管理功能网元-CP确定AMF、RAN和终端管理功能网元-UP。
示例性地,终端管理功能网元-CP根据应用标识和目标终端的标识信息等信息确定AMF和RAN。具体确定方式可以参考参考图4中步骤S412中的描述,这里不再赘述。
该实施例中终端管理功能网元-CP还需要根据应用标识等信息确定终端管理功能网元-UP,其中终端管理功能网元-CP保存应用标识与终端管理功能网元的对应关系。
在终端管理功能网元-CP确定终端管理功能网元-UP之后可以从终端管理功能网元-UP获取隧道信息,图9所示的方法流程还包括:
S913,终端管理功能网元-CP向终端管理功能网元-UP发送请求消息#11,或者说终端管理功能网元-UP接收来自终端管理功能网元-CP的请求消息#11。
该请求消息#11(如,隧道信息请求,还可以称为第四请求消息)用于请求获取隧道信息。具体地,请求消息#11中包括AS隧道信息。
作为一种可能的实现方式,AS隧道信息为AF提供的,如,请求消息#10中包括AS隧道信息。
作为另一种可能的实现方式,AS隧道信息为终端管理功能网元-CP根据配置确定。
S914,终端管理功能网元-UP向终端管理功能网元-CP发送响应消息#11,或者说终端管理功能网元-UP接收来自终端管理功能网元-CP的响应消息#11。
该响应消息#11(如,隧道信息应答)用于响应上述的请求消息#11。具体地,响应消息#11中包括CN隧道信息#2(还可以称为第一隧道信息),CN隧道信息#2为终端管理功能网元-UP接收上行数据的隧道端点。
S915,终端管理功能网元-CP向AMF发送请求消息#12,或者说AMF接收来自终端管理功能网元的请求消息#12。
请求消息#12中包括的内容与上述请求消息#2相同,如,用于请求对目标终端进行第一操作,包括目标终端的标识信息、第一操作的指示信息和应用的信息。
还如,包括操作参数、第二区域指示信息、作间隔时长指示信息、进行操作起始时刻指示信息和进行操作超时时刻指示信息中的至少一个。
不同点在于该实施例中后续RAN上报盘点结果时通过隧道上报(隧道的建立和使用下面将介绍),请求消息#12中可以无需包括通知地址#2和关联标识#2。
另外,不同点在于请求消息#12中包括CN隧道信息#2。
S916,AMF向RAN发送第一请求消息,或者说RAN接收来自AMF的第一请求消息。
参考上述图4中的步骤S414的描述类似,这里不再赘述。
具体地,在该实施例中第一请求消息中还包括CN隧道信息#2。
S917,RAN向AMF发送响应消息#1,或者说AMF接收来自RAN的响应消息#1。
参考上述图7中的步骤S715的描述类似,这里不再赘述。
S918,AMF向终端管理功能网元-CP发送响应消息#12,或者说终端管理功能网元-CP接收来自AMF的响应消息#12。
响应消息#12响应于上述的请求消息#12,响应消息#12中包括应用标识和AN隧道信息。
S919,终端管理功能网元-CP向终端管理功能网元-UP发送请求消息#13,或者说终端管理功能网元-UP接收来自终端管理功能网元-CP的请求消息#13。
该请求消息#13用于请求更新隧道信息,请求消息#13中包括AN隧道信息。
S9191,终端管理功能网元-UP向终端管理功能网元-CP发送响应消息#13,或者说终端管理功能网元-UP接收来自终端管理功能网元-CP的响应消息#13。
该响应消息#11(如,隧道信息应答)用于响应上述的请求消息#13。
在终端管理功能网元-UP接收到请求消息#13之后,可以建立终端管理功能网元-UP和AS之间的隧道#2,图9所示的方法流程还包括:
S9192,建立隧道#2。
上述的步骤S911至S9192说明了隧道#2建立的流程,后续RAN可以通过隧道#2上报盘点结果。
下面介绍RAN的盘点流程,具体包括以下步骤:
S920,RAN向目标终端发送第一查询消息,或者说,目标终端接收来自RAN的第一查询消息。
S930,RAN接收来自第一目标终端的第一标识信息,或者说,第一目标终端向RAN发送第一标识信息。
S940,RAN向第一目标终端发送操作请求消息,或者说,目标终端接收来自RAN的操作请求消息。
S941,第一目标终端执行第一操作得到第一执行结果。
S950,RAN接收来自第一目标终端的第一执行结果,或者说,第一目标终端向RAN发送第一执行结果。
S960,RAN向目标终端发送至少一个第二查询请求,或者说,目标终端接收来自RAN的至少一个第二查询请求。
S970,RAN接收来自至少一个第二目标终端的至少一个第二标识信息,或者说,至少一个第二目标终端向RAN发送至少一个第二标识信息。
S980,RAN向至少一个第二目标终端发送操作请求消息,或者说,至少一个第二目标终端接收来自RAN的操作请求消息。
S981,至少一个第二目标终端执行第一操作得到至少一个第二执行结果。
S990,RAN接收来自至少一个第二目标终端的至少一个第二执行结果,或者说,至 少一个第二目标终端向RAN发送至少一个第二执行结果。
具体查询流程参考上述图3中所示的步骤S320至S390,这里不再赘述。
该实施例中,RAN接收到目标终端的标识信息和执行结果之后,通过隧道发送给AS。应理解,如图3中所示的两种上报方式,该实施例中RAN接收到目标终端的标识信息和执行结果之后,也可以通过两种上报方式上报:
方式一、RAN针对每个目标终端分别上报该目标终端的标识信息和执行结果。
在方式一下,图9所示的方法流程还包括:
S951,RAN通过隧道向终端管理功能网元-UP发送第一消息。
具体地,RAN根据CN隧道信息#1,向UPF发送第一消息。
第一消息中包括第一标识信息、第一执行结果和通知地址#1。
S952,终端管理功能网元-UP向AS发送第一消息。
具体地,UPF根据AS隧道信息,向AS发送第一消息。
方式二、RAN针对所有目标终端统一上报目标终端的标识信息和执行结果。
当RAN判断选择的所有终端盘点完成,图8所示的方法流程还包括:
S991,RAN通过隧道向终端管理功能网元-UP发送第二消息。
具体地,RAN根据CN隧道信息#1,向UPF发送第二消息。
第二消息中包括所述多个终端的标识信息和所述多个终端的执行结果,其中,所述多个终端包括所述第一目标终端和所述至少一个第二目标终端。
S992,终端管理功能网元-UP通过隧道向AS发送第二消息。
具体地,UPF根据AS隧道信息,向AS发送第二消息。
一种可能的实现方式,RAN确定盘点结束之后,可以向终端管理功能网元-UP指示盘点结束,图9所示的方法流程还包括:
S993,RAN通过隧道向终端管理功能网元-UP发送第一信息。
该第一信息用于指示盘点结束。
S994,终端管理功能网元-UP发起隧道释放。
从图9所示的方法流程中可以看出,RAN上报盘点结果时,通过终端管理功能网元-UP向AF上报。作为一种可能的实现方式,RAN上报盘点结果时,可以通过终端管理功能网元-CP向终端管理功能网元-UP发送,下面结合图10说明该实现方式。
以下图10的实施例是上述图3的实施例的又一种具体实现。图10是本申请提供的又一种通信的方法的示意性流程图。以下结合各步骤,详细介绍该通信的方法。
S1011,应用的AF向终端管理功能网元-CP发送请求消息#10,或者说终端管理功能网元-CP接收来自AF的请求消息#10。
参考上述图9中的步骤S911的描述,这里不再赘述。
S1012,终端管理功能网元-CP确定AMF、RAN和终端管理功能网元-UP。
参考上述图9中的步骤S912的描述,这里不再赘述。
S1013,终端管理功能网元-CP向终端管理功能网元-UP发送请求消息#11,或者说终端管理功能网元-UP接收来自终端管理功能网元-CP的请求消息#11。
参考上述图9中的步骤S913的描述,这里不再赘述。
S1014,终端管理功能网元-UP向终端管理功能网元-CP发送响应消息#11,或者说终 端管理功能网元-UP接收来自终端管理功能网元-CP的响应消息#11。
该响应消息#11(如,隧道信息应答)用于响应上述的请求消息#11。
与图9中所示的响应消息#11不同的是,该响应消息#11中可以不包括CN隧道信息#2。
在终端管理功能网元-UP接收到请求消息#13之后,可以建立终端管理功能网元-UP和AS之间的隧道#2,图10所示的方法流程还包括:
S1015,建立隧道#2。
上述的步骤S1011至S1015说明了隧道#2建立的流程,后续RAN可以通过隧道#2上报盘点结果。
S1016,终端管理功能网元-CP向AMF发送请求消息#14,或者说AMF接收来自终端管理功能网元的请求消息#14。
请求消息#14中包括的内容与上述请求消息#2相同,如,用于请求对目标终端进行第一操作,包括目标终端的标识信息、第一操作的指示信息和应用的信息。
还如,包括操作参数、第二区域指示信息、作间隔时长指示信息、进行操作起始时刻指示信息和进行操作超时时刻指示信息中的至少一个。
不同点在于该实施例中后续RAN上报盘点结果时通过隧道上报(隧道的建立和使用下面将介绍),请求消息#14中可以无需包括通知地址#2和关联标识#2。
S1017,AMF向RAN发送第一请求消息,或者说RAN接收来自AMF的第一请求消息。
参考上述图4中的步骤S414的描述类似,这里不再赘述。
S1020,RAN向目标终端发送第一查询消息,或者说,目标终端接收来自RAN的第一查询消息。
S1030,RAN接收来自第一目标终端的第一标识信息,或者说,第一目标终端向RAN发送第一标识信息。
S1040,RAN向第一目标终端发送操作请求消息,或者说,目标终端接收来自RAN的操作请求消息。
S1041,第一目标终端执行第一操作得到第一执行结果。
S1050,RAN接收来自第一目标终端的第一执行结果,或者说,第一目标终端向RAN发送第一执行结果。
S1060,RAN向目标终端发送至少一个第二查询请求,或者说,目标终端接收来自RAN的至少一个第二查询请求。
S1070,RAN接收来自至少一个第二目标终端的至少一个第二标识信息,或者说,至少一个第二目标终端向RAN发送至少一个第二标识信息。
S1080,RAN向至少一个第二目标终端发送操作请求消息,或者说,至少一个第二目标终端接收来自RAN的操作请求消息。
S1081,至少一个第二目标终端执行第一操作得到至少一个第二执行结果。
S1090,RAN接收来自至少一个第二目标终端的至少一个第二执行结果,或者说,至少一个第二目标终端向RAN发送至少一个第二执行结果。
具体查询流程参考上述图3中所示的步骤S320至S390,这里不再赘述。
该实施例中,RAN接收到目标终端的标识信息和执行结果之后,通过隧道发送给AS。应理解,如图3中所示的两种上报方式,该实施例中RAN接收到目标终端的标识信息和执行结果之后,也可以通过两种上报方式上报:
方式一、RAN针对每个目标终端分别上报该目标终端的标识信息和执行结果。
在方式一下,图10所示的方法流程还包括:
S1051,RAN向终端管理功能网元-CP发送第一消息。
第一消息中包括第一标识信息、第一执行结果和通知地址#1。
S1052,终端管理功能网元-CP向终端管理功能网元-UP发送第一消息。
S1053,终端管理功能网元-UP通过隧道向AS发送第一消息。
具体地,UPF根据AS隧道信息,向AS发送第一消息。
方式二、RAN针对所有目标终端统一上报目标终端的标识信息和执行结果。
当RAN判断选择的所有终端盘点完成,图10所示的方法流程还包括:
S1091,RAN向终端管理功能网元-CP发送第二消息。
第二消息中包括所述多个终端的标识信息和所述多个终端的执行结果,其中,所述多个终端包括所述第一目标终端和所述至少一个第二目标终端。
S1092,终端管理功能网元-CP向终端管理功能网元-UP发送第二消息。
S1093,终端管理功能网元-UP通过隧道向AS发送第二消息。
具体地,UPF根据AS隧道信息,向AS发送第二消息。
一种可能的实现方式,RAN确定盘点结束之后,可以向终端管理功能网元-UP指示盘点结束,图10所示的方法流程还包括:
S1094,RAN通过隧道向终端管理功能网元-CP发送第一信息。
该第一信息用于指示盘点结束。
S1095,终端管理功能网元-CP发起隧道释放。
一种可能的实现方式,图9和图10中终端管理功能网元可以和NEF合设,上述的终端管理功能网元执行的动作可以理解为NEF执行的动作。
该实现方式下,图9和图10所示的方法流程可以应用于图11中的(a)所示的网络架构中。
另一种可能的实现方式,图9和图10中终端管理功能网元可以为新增的独立功能网元,能够用于转发AF和AMF之间的盘点请求和响应。
该实现方式下,图9和图10所示的方法流程可以应用于图11中的(b)所示的网络架构中。
又一种可能的实现方式,图9和图10中终端管理功能网元可以为新增的独立功能网元,能够用于转发NEF和AMF之间的盘点请求和响应,也就是说图4中所示的终端管理功能网元和AF之间的盘点请求和响应需要通过NEF转发。
该实现方式下,图9和图10所示的方法流程可以应用于图11中的(c)所示的网络架构中。
又一种可能的实现方式,图9和图10中终端管理功能网元可以和AMF合设,AMF和终端管理功能网元-CP的交互可以看成是内部交互。
该实现方式下,图9和图10所示的方法流程可以应用于图11中的(d)所示的网络 架构中。
应理解,本申请实施例中的图3至图11所示的具体的例子只是为了帮助本领域技术人员更好地理解本申请实施例,而非限制本申请实施例的范围。还应理解,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
还应理解,在本申请的各个实施例中,如果没有特殊说明以及逻辑冲突,不同的实施例之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。
还应理解,在上述一些实施例中,主要以现有的网络架构中的网元为例进行了示例性说明(如AF、AMF、SMF等等),应理解,对于网元的具体形式本申请实施例不作限定。例如,在未来可以实现同样功能的网元都适用于本申请实施例。
可以理解的是,上述各个方法实施例中,由网络设备(如各个网元)实现的方法和操作,也可以由可用于网络设备的部件(例如芯片或者电路)实现。
以上,结合图3至图11详细说明了本申请实施例提供的获取信息的方法。上述获取信息的方法主要从各个网元之间交互的角度进行了介绍。可以理解的是,各个网元,为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。
本领域技术人员应该可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
以下,结合图12至图14详细说明本申请实施例提供的通信的装置。应理解,装置实施例的描述与方法实施例的描述相互对应,因此,未详细描述的内容可以参见上文方法实施例,为了简洁,部分内容不再赘述。
本申请实施例可以根据上述方法示例对发射端设备或者接收端设备进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。下面以采用对应各个功能划分各个功能模块为例进行说明。
图12是本申请实施例提供的装置1200的示意性框图。该装置1200包括收发单元1210和处理单元1220。收发单元1210可以实现相应的通信功能,处理单元1220用于进行数据处理。收发单元1210还可以称为通信接口或通信单元。
可选地,该装置1200还可以包括存储单元,该存储单元可以用于存储指令和/或数据,处理单元1220可以读取存储单元中的指令和/或数据,以使得装置实现前述方法实施例。
该装置1200可以用于执行上文方法实施例中网络设备(如各个网元)所执行的动作,这时,该装置1200可以为网络设备或者可配置于网络设备的部件,收发单元1210用于执行上文方法实施例中网络设备侧的收发相关的操作,处理单元1220用于执行上文方法实施例中网络设备侧的处理相关的操作。
作为一种设计,该装置1200用于执行上文方法实施例中接入网设备所执行的动作。
一种可能的实现方式,收发单元1210,用于接收第一请求消息,该第一请求消息用于请求对目标终端进行第一操作,其中,该第一请求消息中包括该目标终端的标识信息和该第一操作的指示信息;处理单元1220,用于根据第一请求消息向该目标终端发送第一查询请求,该第一查询请求用于获取该目标终端的标识信息;收发单元1210,还用于接收来自第一目标终端的第一标识信息,该第一目标终端为该目标终端中的一个;收发单元1210,还用于向该第一目标终端发送操作请求消息,该操作请求消息用于请求该第一目标终端执行该第一操作;收发单元1210,还用于接收来自该第一目标终端的第一执行结果,该第一执行结果为执行该第一操作的执行结果。
可选地,收发单元1210,还用于向移动性管理功能网元发送第一消息,该第一消息中包括该第一标识信息和该第一执行结果;或者,收发单元1210,还用于接收第一接收网元的地址,该地址为该第一接收网元接收信息的地址;收发单元1210,还用于根据该地址向该第一接收网元发送第一消息,该第一消息中包括该第一标识信息和该第一执行结果;或者,收发单元1210,还用于接收第一隧道信息,该第一隧道信息用于指示第二接收网元接收信息的用户面端口;收发单元1210,还用于根据该第一隧道信息向该第二接收网元发送第一消息,该第一消息中包括该第一标识信息和该第一执行结果。
可选地,收发单元1210,还用于向该目标终端发送第二查询请求,该第二查询请求用于获取该目标终端的标识信息;收发单元1210,还用于接收来自第二目标终端的第二标识信息,该第二目标终端为该目标终端中除该第一目标终端的一个;收发单元1210,还用于向该第一目标终端发送该操作请求消息;收发单元1210,还用于接收来自该第二目标终端的第二执行结果,该第二执行结果为执行该第一操作的执行结果。
可选地,收发单元1210,还用于向移动性管理功能网元发送第二消息,该第二消息中包括该第一标识信息和该第一执行结果、该第二标识信息和该第二执行结果;或者,收发单元1210,还用于接收来第一接收网元的地址,该地址为该第一接收网元接收信息的地址;收发单元1210,还用于根据该地址向该第一接收网元发送第二消息,该第二消息中包括该第一标识信息和该第一执行结果、该第二标识信息和该第二执行结果;或者,收发单元1210,还用于接收第一隧道信息,该第一隧道信息用于指示第二接收网元接收信息的用户面端口;收发单元1210,还用于根据该第一隧道信息向该第二接收网元发送第二消息,该第二消息中包括该第一标识信息和该第一执行结果、该第二标识信息和该第二执行结果。
可选地,收发单元1210,还用于向移动性管理功能网元发送第二请求消息,该第二请求消息用于请求获取该第一隧道信息。
可选地,收发单元1210,还用于接收第一关联标识,该第一关联标识用于关联该第一请求消息与该第一消息或用于关联该第一请求消息和该第二消息,该第一消息和/或该第二消息中包括该第一关联标识。
可选地,在该第一请求消息中包括该操作间隔时长指示信息的情况下,所处理单元1220对该目标终端进行一次操作结束之后,处理单元1220,用于再次对该目标终端进行操作,其中,再次进行操作的起始时刻和该进行一次操作结束时刻之间的间隔为该时长。
可选地,收发单元1210,还用于发送第一信息,该第一信息用于指示对该目标终端 进行一次操作结束。
该装置1200可实现对应于根据本申请实施例的方法实施例中的接入网设备执行的步骤或者流程,该装置1200可以包括用于执行方法实施例中的接入网设备执行的方法的单元。并且,该装置1200中的各单元和上述其他操作和/或功能分别为了实现方法实施例中的接入网设备中的方法实施例的相应流程。
其中,当该装置1200用于执行图3中的方法时,收发单元1210可用于执行方法中的收发步骤,如步骤S310、S320、S30、S340、S350、S351、S352、S353、S356、S354、S355、S356、S354、S360、S370、S380、S390、S391、S392、S396、S394、S395、S311。
当该装置1200用于执行图4中的方法时,收发单元1210可用于执行方法中的收发步骤,如步骤S414、S415、S416、S420、S430、S440、S450、S451、S460、S470、S480、S490、S491、S494;存储单元可用于执行方法中的保存步骤,如步骤S415。
当该装置1200用于执行图6中的方法时,收发单元1210可用于执行方法中的收发步骤,如步骤S614、S616、S620、S630、S631、S640、S650、S651、S660、S670、S680、S690、S691、S693;存储单元可用于执行方法中的保存步骤,如步骤S615。
当该装置1200用于执行图7中的方法时,收发单元1210可用于执行方法中的收发步骤,如步骤S714、S715、S720、S730、S740、S7191、S750、S751、S760、S770、S780、S790、S791、S793。
当该装置1200用于执行图9中的方法时,收发单元1210可用于执行方法中的收发步骤,如步骤S916、S917、S920、S930、S940、S950、S951、S960、S970、S980、S990、S991、S993。
当该装置1200用于执行图10中的方法时,收发单元1210可用于执行方法中的收发步骤,如步骤S1017、S1020、S1030、S1040、S1050、S1051、S1060、S1070、S1080、S1090、S1091、S1094。
应理解,各单元执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。
作为另一种设计,该装置1200用于执行上文方法实施例中终端管理控制面功能网元所执行的动作。
一种可能的实现方式,收发单元1210,用于接收来自应用的应用功能网元的第三请求消息,该第三请求消息用于请求对目标终端进行第一操作,该第三请求消息中包括该应用的信息、该目标终端的标识信息和该第一操作的指示信息。收发单元1210,用于向接入网设备发送第一请求消息,该第一请求消息用于请求对该目标终端进行第一操作,其中,该第一请求消息中包括该目标终端的标识信息和该第一操作的指示信息。
可选地,处理单元1220,用于根据该应用的信息确定终端管理用户面功能网元;收发单元1210,用于向该终端管理用户面功能网元发送第四请求消息,该第四请求消息用于请求获取第一隧道信息,该第一隧道信息用于指示该终端管理用户面功能网元接收数据的第一隧道信息;收发单元1210,用于接收来自该终端管理功能用户面网元的该第一隧道信息。
可选地,处理单元1220,用于根据该应用的信息确定该终端管理用户面功能网元;处理单元1220,用于确定第一隧道信息,该第一隧道信息用于指示该终端管理用户面功 能网元接收数据的第一隧道信息;收发单元1210,用于向该终端管理用户面功能网元发送该第一隧道信息。
可选地,处理单元1220,用于根据该应用的信息确定第二隧道信息;其中,该第二隧道信息为该应用的服务器接收数据的用户面端口。
可选地,收发单元1210,用于向该终端管理用户面功能网元发送该第二隧道信息。
可选地,收发单元1210,用于接收来自该接入网设备的第一消息,该第一消息中包该目标终端中的第一目标终端的第一标识信息和该第一目标终端对应的第一执行结果;
收发单元1210,用于向该终端管理用户面功能网元发送该第一消息;或者,收发单元1210,用于接收来自接入网设备的第二消息,该第二消息中包括该目标终端中的第一目标终端的第一标识信息和该第一目标终端对应的第一执行结果,以及第二目标终端的第二标识信息和该第二目标终端对应的第二执行结果;收发单元1210,用于向该终端管理用户面功能网元发送该第二消息。
可选地,收发单元1210,用于接收来自该接入网设备的第一信息,该第一信息用于指示对该目标终端进行一次操作结束;
处理单元1220,用于根据该第一信息触发释放该第一隧道信息。
该装置1200可实现对应于根据本申请实施例的方法实施例中的终端管理控制面功能网元执行的步骤或者流程,该装置1200可以包括用于执行方法实施例中的终端管理控制面功能网元执行的方法的单元。并且,该装置1200中的各单元和上述其他操作和/或功能分别为了实现方法实施例中的终端管理控制面功能网元中的方法实施例的相应流程。
其中,当该装置1200用于执行图9中的方法时,收发单元1210可用于执行方法中的收发步骤,如步骤S913、S914、S915、S918、S919;处理单元1220可用于执行方法中的处理步骤,如步骤S912。
当该装置1200用于执行图10中的方法时,收发单元1210可用于执行方法中的收发步骤,如步骤S1013、S1014、S1016、S 1051、S 1052、S 1091、S 1092;处理单元1220可用于执行方法中的处理步骤,如步骤S1012。
应理解,各单元执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。
上文实施例中的处理单元1220可以由至少一个处理器或处理器相关电路实现。收发单元1210可以由收发器或收发器相关电路实现。存储单元可以通过至少一个存储器实现。
如图13所示,本申请实施例还提供一种装置1300。该装置1300包括处理器1310,还可以包括一个或多个存储器1320。处理器1310与存储器1320耦合,存储器1320用于存储计算机程序或指令和/或数据,处理器1310用于执行存储器1320存储的计算机程序或指令和/或数据,使得上文方法实施例中的方法被执行。可选地,该装置1300包括的处理器1310为一个或多个。
可选地,该存储器1320可以与该处理器1310集成在一起,或者分离设置。
可选地,如图13所示,该装置1300还可以包括收发器1330,收发器1330用于信号的接收和/或发送。例如,处理器1310用于控制收发器1330进行信号的接收和/或发送。
作为一种方案,该装置1300用于实现上文方法实施例中由网络设备(如上述各个网元)执行的操作。
本申请实施例还提供一种装置1400,该装置1400可以是网络设备也可以是芯片。该装置1400可以用于执行上述方法实施例中由接入网设备所执行的操作。
图14示出了一种简化的结构示意图。装置1400包括1410部分以及1420部分。1410部分主要用于射频信号的收发以及射频信号与基带信号的转换;1420部分主要用于基带处理,对基站进行控制等。1410部分通常可以称为收发单元、收发机、收发电路、或者收发器等。1420部分通常是基站的控制中心,通常可以称为处理单元,用于控制基站执行上述方法实施例中接收端设备侧的处理操作。
1410部分的收发单元,也可以称为收发机或收发器等,其包括天线和射频电路,其中射频电路主要用于进行射频处理。可选地,可以将1410部分中用于实现接收功能的器件视为接收单元,将用于实现发送功能的器件视为发送单元,即1410部分包括接收单元和发送单元。接收单元也可以称为接收机、接收器、或接收电路等,发送单元可以称为发射机、发射器或者发射电路等。
1420部分可以包括一个或多个单板,每个单板可以包括一个或多个处理器和一个或多个存储器。处理器用于读取和执行存储器中的程序以实现基带处理功能以及对基站的控制。若存在多个单板,各个单板之间可以互联以增强处理能力。作为一种可选的实施方式,也可以是多个单板共用一个或多个处理器,或者是多个单板共用一个或多个存储器,或者是多个单板同时共用一个或多个处理器。
应理解,图14仅为示例而非限定,上述包括收发单元和处理单元的网络设备可以不依赖于图14所示的结构。
当该装置1400为芯片时,该芯片包括收发单元和处理单元。其中,收发单元可以是输入输出电路、通信接口;处理单元为该芯片上集成的处理器或者微处理器或者集成电路。当然装置1400还可以为一个芯片系统或处理系统,使得安装该装置1400的设备可以实现本申请实施例的方法和功能。例如,处理单元1420可以为芯片系统或处理系统中的处理电路,实现对安装了该芯片系统或处理系统的设备的控制,还可以耦合链接存储单元,调用存储单元中的指令,使得设备可以实现本申请实施例的方法和功能,收发单元1410,可以为芯片系统或处理系统中的输入输出电路,将芯片系统处理好的信息输出,或将待处理的数据或信令信息输入芯片系统进行处理。
本申请实施例还提供一种计算机可读存储介质,其上存储有用于实现上述方法实施例中由网络设备(如各个网元)执行的方法的计算机指令。
例如,该计算机程序被计算机执行时,使得该计算机可以实现上述方法实施例中由网络设备执行的方法。
本申请实施例还提供一种包含指令的计算机程序产品,该指令被计算机执行时使得该计算机实现上述方法实施例中由网络设备(如各个网元)执行的方法。
本申请实施例还提供一种通信系统,该通信系统包括上文实施例中的网络设备(如各个网元),如包括接入网设备和核心网设备。
上述提供的任一种装置中相关内容的解释及有益效果均可参考上文提供的对应的方法实施例,此处不再赘述。
应理解,本申请实施例中提及的处理器可以是中央处理单元(central processing unit,CPU),还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专 用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
还应理解,本申请实施例中提及的存储器可以是易失性存储器和/或非易失性存储器。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM)。例如,RAM可以用作外部高速缓存。作为示例而非限定,RAM可以包括如下多种形式:静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。
需要说明的是,当处理器为通用处理器、DSP、ASIC、FPGA或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件时,存储器(存储模块)可以集成在处理器中。
还需要说明的是,本文描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的保护范围。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。此外,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元实现本申请提供的方案。
另外,在本申请各个实施例中的各功能单元可以集成在一个单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算 机、计算机网络、或者其他可编程装置。例如,所述计算机可以是个人计算机,服务器,或者网络设备等。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,SSD)等。例如,前述的可用介质可以包括但不限于:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (39)

  1. 一种通信的方法,其特征在于,包括:
    接入网设备接收第一请求消息,所述第一请求消息用于请求对目标终端进行第一操作,其中,所述第一请求消息中包括所述目标终端的标识信息和所述第一操作的指示信息;
    所述接入网设备根据第一请求消息向所述目标终端发送第一查询请求,所述第一查询请求用于获取所述目标终端的标识信息;
    所述接入网设备接收来自第一目标终端的第一标识信息,所述第一目标终端为所述目标终端中的一个;
    所述接入网设备向所述第一目标终端发送操作请求消息,所述操作请求消息用于请求所述第一目标终端执行所述第一操作;
    所述接入网设备接收来自所述第一目标终端的第一执行结果,所述第一执行结果为执行所述第一操作的执行结果。
  2. 根据权利要求1所述的方法,其特征在于,所述第一请求消息中还包括所述第一操作对应的操作参数,所述操作请求消息中还包括所述操作参数。
  3. 根据权利要求1或2所述的方法,其特征在于,在所述接入网设备接收来自所述第一目标终端的第一执行结果后,所述方法还包括:
    所述接入网设备向移动性管理功能网元发送第一消息,所述第一消息中包括所述第一标识信息和所述第一执行结果;
    或者,
    所述接入网设备接收第一接收网元的地址,所述地址为所述第一接收网元接收信息的地址;
    所述接入网设备根据所述地址向所述第一接收网元发送第一消息,所述第一消息中包括所述第一标识信息和所述第一执行结果;
    或者,
    所述接入网设备接收第一隧道信息,所述第一隧道信息用于指示第二接收网元接收信息的用户面端口;
    所述接入网设备根据所述第一隧道信息向所述第二接收网元发送第一消息,所述第一消息中包括所述第一标识信息和所述第一执行结果。
  4. 根据权利要求1-3中任一项所述的方法,其特征在于,所述方法还包括:
    所述接入网设备向所述目标终端发送第二查询请求,所述第二查询请求用于获取所述目标终端的标识信息;
    所述接入网设备接收来自第二目标终端的第二标识信息,所述第二目标终端为所述目标终端中除所述第一目标终端的一个;
    所述接入网设备向所述第一目标终端发送所述操作请求消息;
    所述接入网设备接收来自所述第二目标终端的第二执行结果,所述第二执行结果为执行所述第一操作的执行结果。
  5. 根据权利要求4所述的方法,其特征在于,在所述接入网设备接收来自所述第二 目标终端的第二执行结果后,所述方法还包括:
    所述接入网设备向移动性管理功能网元发送第二消息,所述第二消息中包括所述第一标识信息和所述第一执行结果、所述第二标识信息和所述第二执行结果;
    或者,
    所述接入网设备接收来第一接收网元的地址,所述地址为所述第一接收网元接收信息的地址;
    所述接入网设备根据所述地址向所述第一接收网元发送第二消息,所述第二消息中包括所述第一标识信息和所述第一执行结果、所述第二标识信息和所述第二执行结果;
    或者,
    所述接入网设备接收第一隧道信息,所述第一隧道信息用于指示第二接收网元接收信息的用户面端口;
    所述接入网设备根据所述第一隧道信息向所述第二接收网元发送第二消息,所述第二消息中包括所述第一标识信息和所述第一执行结果、所述第二标识信息和所述第二执行结果。
  6. 根据权利要求3-5中任一项所述的方法,其特征在于,所述接入网设备接收所述第一隧道信息之前,所述方法还包括:
    所述接入网设备向移动性管理功能网元发送第二请求消息,所述第二请求消息用于请求获取所述第一隧道信息。
  7. 根据权利要求3-6中任一项所述的方法,其特征在于,所述方法还包括:
    所述接入网设备接收第一关联标识,所述第一关联标识用于关联所述第一请求消息与所述第一消息或用于关联所述第一请求消息和所述第二消息,
    所述第一消息和/或所述第二消息中包括所述第一关联标识。
  8. 根据权利要求1-7中任一项所述的方法,其特征在于,所述第一请求消息中还包括以下信息中的至少一种:
    第一指示信息、操作间隔时长指示信息、操作起始时刻指示信息、操作超时时刻指示信息,
    其中,所述第一指示信息用于指示所述接入网设备向所述目标终端发送所述查询请求的区域,所述操作间隔时长指示信息用于指示进行相邻两次操作之间间隔的时长、所述操作起始时刻指示信息用于指示首次进行操作的起始时刻,所述操作超时时刻指示信息用于指示最后一次操作结束的时刻。
  9. 根据权利要求8所述的方法,其特征在于,在所述第一请求消息中包括所述操作间隔时长指示信息的情况下,所述接入网设备对所述目标终端进行一次操作结束之后,所述方法还包括:
    所述接入网设备再次对所述目标终端进行操作,
    其中,再次进行操作的起始时刻和所述进行一次操作结束时刻之间的间隔为所述时长。
  10. 根据权利要求1-9中任一项所述的方法,其特征在于,所述目标终端的标识信息,包括以下信息中的至少一项:
    所述目标终端中任意一个目标终端的指示信息、所述目标终端的标识所属的取值区间、所述目标终端的标识的列表、所述目标终端所属终端组的组标识、所述目标终端所属用户 的标识信息、或者所述目标终端所属应用的标识信息。
  11. 根据权利要求1-10中任一项所述的方法,其特征在于,所述第一操作包括以下操作中的至少一个:查询终端标识、读、写、灭活、锁、块写、块擦、访问、加密、或解密。
  12. 根据权利要求1-11中任一项所述的方法,其特征在于,所述方法还包括:
    所述接入网设备发送第一信息,所述第一信息用于指示对所述目标终端进行一次操作结束。
  13. 一种通信的方法,其特征在于,包括:
    终端管理控制面功能网元接收来自应用的应用功能网元的第三请求消息,所述第三请求消息用于请求对目标终端进行第一操作,所述第三请求消息中包括所述应用的信息、所述目标终端的标识信息和所述第一操作的指示信息;
    所述终端管理控制面功能网元向接入网设备发送第一请求消息,所述第一请求消息用于请求对所述目标终端进行第一操作,其中,所述第一请求消息中包括所述目标终端的标识信息和所述第一操作的指示信息。
  14. 根据权利要求13所述的方法,其特征在于,所述终端管理控制面功能网元向所述接入网设备发送第一请求消息之前,所述方法还包括:
    所述标签管理控制面功能网元根据所述应用的信息确定终端管理用户面功能网元;
    所述终端管理控制面功能网元向所述终端管理用户面功能网元发送第四请求消息,所述第四请求消息用于请求获取第一隧道信息,所述第一隧道信息用于指示所述终端管理用户面功能网元接收数据的第一隧道信息;
    所述终端管理控制面功能网元接收来自所述终端管理功能用户面网元的所述第一隧道信息。
  15. 根据权利要求13所述的方法,其特征在于,所述终端管理控制面功能网元向所述接入网设备发送第一请求消息之前,所述方法还包括:
    所述标签管理控制面功能网元根据所述应用的信息确定所述终端管理用户面功能网元;
    所述终端管理控制面功能网元确定第一隧道信息,所述第一隧道信息用于指示所述终端管理用户面功能网元接收数据的第一隧道信息;
    所述终端管理控制面功能网元向所述终端管理用户面功能网元发送所述第一隧道信息。
  16. 根据权利要求14或15所述的方法,其特征在于,所述第一请求消息中还包括所述第一隧道信息。
  17. 根据权利要求13-16中任一项所述的方法,其特征在于,所述第一请求消息中还包括所述终端管理控制面功能网元接收通知消息的地址。
  18. 根据权利要求13-17中任一项所述的方法,其特征在于,
    所述第三请求消息中还包括所述应用的服务器接收数据的第二隧道信息;或者,
    所述终端管理控制面功能网元根据所述应用的信息确定第二隧道信息;
    其中,所述第二隧道信息为所述应用的服务器接收数据的用户面端口。
  19. 根据权利要求18所述的方法,其特征在于,所述方法还包括:
    所述终端管理控制面功能网元向所述终端管理用户面功能网元发送所述第二隧道信 息。
  20. 根据权利要求13-19中任一项所述的方法,其特征在于,所述方法还包括:
    所述终端管理控制面功能网元接收来自所述接入网设备的第一消息,所述第一消息中包所述目标终端中的第一目标终端的第一标识信息和所述第一目标终端对应的第一执行结果;
    所述终端管理控制面功能网元向所述终端管理用户面功能网元发送所述第一消息;
    或者,
    所述终端管理控制面功能网元接收来自接入网设备的第二消息,所述第二消息中包括所述目标终端中的第一目标终端的第一标识信息和所述第一目标终端对应的第一执行结果,以及第二目标终端的第二标识信息和所述第二目标终端对应的第二执行结果;
    所述终端管理控制面功能网元向所述终端管理用户面功能网元发送所述第二消息。
  21. 根据权利要求13-20中任一项所述的方法,其特征在于,所述第三请求消息中还包括以下信息中的至少一种:
    第二指示信息、所述第一操作对应的操作参数、操作间隔时长指示信息、操作起始时刻指示信息、操作超时时刻指示信息,
    其中,所述第二指示信息用于指示待执行所述第一操作的区域,所述操作间隔时长指示信息用于指示相邻两次操作之间间隔的时长、操作起始时刻指示信息用于指示首次操作的起始时刻,所述操作超时时刻指示信息用于指示最后一次操作结束的时刻;
    所述第一请求消息中还包括以下信息中的至少一种:
    第一指示信息、所述第一操作对应的操作参数、所述操作间隔时长指示信息、所述操作起始时刻指示信息、所述操作超时时刻指示信息,
    所述第一指示信息用于指示所述接入网设备向所述目标终端发送所述查询请求的区域。
  22. 根据权利要求21所述的方法,其特征在于,所述方法还包括:
    所述终端管理控制面功能网元接收来自所述接入网设备的第一信息,所述第一信息用于指示对所述目标终端进行一次操作结束;
    所述终端管理控制面功能网元根据所述第一信息触发释放所述第一隧道信息。
  23. 根据权利要求13-22中任一项所述的方法,其特征在于,所述应用的信息包括所述应用的标识或所述应用的数据网络接入标识。
  24. 一种通信的方法,其特征在于,包括:
    应用的应用功能网元向终端管理功能网元发送第三请求消息,所述第三请求消息用于请求对目标终端进行第一操作,所述第三请求消息中包括所述应用的信息、所述目标终端的标识信息和所述第一操作的指示信息;
    所述终端管理功能网元向接入网设备发送第一请求消息,所述第一请求消息用于请求对所述目标终端进行所述第一操作,其中,所述第一请求消息中包括所述目标终端的标识信息和所述第一操作的指示信息;
    所述接入网设备向所述目标终端发送查询请求消息和操作请求消息,所述查询请求用于获取所述目标终端的标识信息,所述操作请求消息用于请求所述目标终端执行所述第一操作;
    所述接入网设备接收所述目标终端中的一个或多个终端的标识信息和所述目标终端中的一个或多个终端执行所述第一操作的执行结果;
    所述接入网设备向所述终端管理功能网元发送所述目标终端中的一个或多个终端的标识信息和所述目标终端中的一个或多个终端执行所述第一操作的执行结果;
    所述终端管理功能网元向所述应用发送所述目标终端中的一个或多个终端的标识信息和所述目标终端中的一个或多个终端执行所述第一操作的执行结果。
  25. 根据权利要求24所述的方法,其特征在于,所述终端管理功能网元包括终端管理控制面功能网元和终端管理用户面功能网元,所述应用的应用功能网元向终端管理功能网元发送第三请求消息,包括:
    所述应用的应用功能网元向所述终端管理控制面功能网元发送所述第三请求消息;
    所述方法还包括:
    所述终端管理控制面功能网元根据所述应用的信息确定终端管理用户面功能网元;
    所述终端管理功能网元向接入网设备发送第一请求消息,包括:
    所述终端管理控制面功能网元向接入网设备发送第一请求消息。
  26. 根据权利要求25所述的方法,其特征在于,所述终端管理控制面功能网元向所述接入网设备发送所述第一请求消息之前,所述方法还包括:
    所述标签管理控制面功能网元根据所述应用的信息确定所述终端管理用户面功能网元;
    所述终端管理控制面功能网元向所述终端管理用户面功能网元发送第四请求消息,所述第四请求消息用于请求获取第一隧道信息,所述第一隧道信息用于指示所述终端管理用户面功能网元接收数据的第一隧道信息;
    所述终端管理控制面功能网元接收来自所述终端管理功能用户面网元的所述第一隧道信息;
    所述第一请求消息中还包括所述第一隧道信息。
  27. 根据权利要求26所述的方法,其特征在于,所述终端管理控制面功能网元向所述接入网设备发送所述第一请求消息之前,所述方法还包括:
    所述标签管理控制面功能网元根据所述应用的信息确定所述终端管理用户面功能网元;
    所述终端管理控制面功能网元确定第一隧道信息,所述第一隧道信息用于指示所述终端管理用户面功能网元接收数据的第一隧道信息;
    所述终端管理控制面功能网元向所述终端管理用户面功能网元发送所述第一隧道信息;
    所述第一请求消息中还包括所述第一隧道信息。
  28. 根据权利要求24-27中任一项所述的方法,其特征在于,所述第一请求消息中还包括所述终端管理控制面功能网元接收通知消息的地址。
  29. 根据权利要求24-28中任一项所述的方法,其特征在于,所述第三请求消息中还包括所述应用的服务器接收数据的第二隧道信息;或者,所述终端管理控制面功能网元根据所述应用的信息确定第二隧道信息;
    其中,所述第二隧道信息为所述应用的服务器接收数据的用户面端口。
  30. 根据权利要求29所述的方法,其特征在于,所述方法还包括:
    所述终端管理控制面功能网元向所述终端管理用户面功能网元发送所述第二隧道信息。
  31. 根据权利要求24-30中任一项所述的方法,其特征在于,所述方法还包括:
    所述终端管理控制面功能网元接收来自所述接入网设备的第一消息,所述第一消息中包所述目标终端中的第一目标终端的第一标识信息和所述第一目标终端对应的第一执行结果;
    所述终端管理控制面功能网元向所述终端管理用户面功能网元发送所述第一消息;
    或者,
    所述终端管理控制面功能网元接收来自接入网设备的第二消息,所述第二消息中包括所述目标终端中的第一目标终端的第一标识信息和所述第一目标终端对应的第一执行结果,以及第二目标终端的第二标识信息和所述第二目标终端对应的第二执行结果;
    所述终端管理控制面功能网元向所述终端管理用户面功能网元发送所述第二消息。
  32. 根据权利要求24-31中任一项所述的方法,其特征在于,所述方法还包括:
    所述终端管理用户面功能网元接收来自所述接入网设备的第一消息,所述第一消息中包所述目标终端中的第一目标终端的第一标识信息和所述第一目标终端对应的第一执行结果;
    或者,
    所述终端管理用户面功能网元接收来自所述接入网设备的第二消息,所述第二消息中包括所述目标终端中的第一目标终端的第一标识信息和所述第一目标终端对应的第一执行结果,以及第二目标终端的第二标识信息和所述第二目标终端对应的第二执行结果。
  33. 根据权利要求31或32所述的方法,其特征在于,所述方法还包括:
    所述终端管理用户面功能网元根据所述第二隧道信息向所述应用的应用服务器发送所述第一数据。
  34. 根据权利要求24-33中任一项所述的方法,其特征在于,所述应用的信息包括所述应用的标识或所述应用的数据网络接入标识。
  35. 一种通信的装置,其特征在于,包括用于执行如权利要求1至12中任一项所述的方法的单元或模块。
  36. 一种通信的装置,其特征在于,包括用于执行如权利要求13至23中任一项所述的方法的单元或模块。
  37. 一种通信系统,其特征在于,包括用于执行如权利要求24至34中任一项所述的方法的设备。
  38. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有计算机指令,当所述计算机指令在计算机上运行时,如权利要求1至23中任一项所述的方法被执行。
  39. 一种计算机程序产品,其特征在于,包含指令,当所述计算机指令在计算机上运行时,如权利要求1至23中任一项所述的方法被执行。
PCT/CN2022/141395 2022-01-30 2022-12-23 通信的方法和装置 WO2023142815A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210114137.4 2022-01-30
CN202210114137.4A CN116567742A (zh) 2022-01-30 2022-01-30 通信的方法和装置

Publications (1)

Publication Number Publication Date
WO2023142815A1 true WO2023142815A1 (zh) 2023-08-03

Family

ID=87470398

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/141395 WO2023142815A1 (zh) 2022-01-30 2022-12-23 通信的方法和装置

Country Status (2)

Country Link
CN (1) CN116567742A (zh)
WO (1) WO2023142815A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101931859A (zh) * 2009-06-23 2010-12-29 华为技术有限公司 一种移动通信寻呼方法、系统及装置
CN101959133A (zh) * 2009-07-15 2011-01-26 华为技术有限公司 M2m用户设备的操作控制方法、系统和m2m用户设备
CN103444231A (zh) * 2011-03-30 2013-12-11 国际商业机器公司 网络中节点集合的发现
CN109314897A (zh) * 2018-09-06 2019-02-05 北京小米移动软件有限公司 系统信息发送和接收方法、装置、设备及系统
CN113873478A (zh) * 2020-06-30 2021-12-31 华为技术有限公司 通信方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101931859A (zh) * 2009-06-23 2010-12-29 华为技术有限公司 一种移动通信寻呼方法、系统及装置
CN101959133A (zh) * 2009-07-15 2011-01-26 华为技术有限公司 M2m用户设备的操作控制方法、系统和m2m用户设备
CN103444231A (zh) * 2011-03-30 2013-12-11 国际商业机器公司 网络中节点集合的发现
CN109314897A (zh) * 2018-09-06 2019-02-05 北京小米移动软件有限公司 系统信息发送和接收方法、装置、设备及系统
CN113873478A (zh) * 2020-06-30 2021-12-31 华为技术有限公司 通信方法及装置

Also Published As

Publication number Publication date
CN116567742A (zh) 2023-08-08

Similar Documents

Publication Publication Date Title
WO2020073855A1 (zh) 建立会话的方法和装置以及发送报文的方法和装置
US11470674B2 (en) Communication method and communications apparatus
CN111031538B (zh) 一种鉴权的方法及装置
WO2021136211A1 (zh) 授权结果的确定方法及装置
US20230077391A1 (en) Communication protection method and apparatus
CN112637785B (zh) 用于多播传输的方法和装置
US20230087407A1 (en) Authentication and authorization method and apparatus
WO2021233340A1 (zh) 网络注册的方法和装置
CN113573297B (zh) 一种通信方法及装置
US20230079012A1 (en) Communication method and communication apparatus
WO2023142815A1 (zh) 通信的方法和装置
WO2022170798A1 (zh) 确定策略的方法和通信装置
CN113873492B (zh) 一种通信方法以及相关装置
WO2024055697A1 (zh) 通信方法和装置
JP7400363B2 (ja) 通信端末、基地局、及び通信方法
WO2023213184A1 (zh) 一种通信方法及通信装置
WO2023072271A1 (zh) 管理安全上下文的方法和装置
WO2024021935A1 (zh) 一种通信方法及装置
WO2021057456A1 (zh) 用于注册的方法和装置
RU2777722C2 (ru) Способ и устройство для обеспечения услуги локальной сети передачи данных на основе модели без подписки в системе беспроводной связи
US20240155325A1 (en) Information obtaining method and apparatus, and system
WO2024098937A1 (zh) 通信方法、通信装置、及存储介质
WO2023202503A1 (zh) 通信方法和装置
US20230413039A1 (en) Communication method and communication apparatus
US20240106764A1 (en) Computing power resource scheduling method and related apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22923601

Country of ref document: EP

Kind code of ref document: A1