WO2023213132A1 - Procédé de communication basé sur un découpage en tranches du réseau, appareil de communication, dispositif de réseau d'accès, et dispositif terminal - Google Patents

Procédé de communication basé sur un découpage en tranches du réseau, appareil de communication, dispositif de réseau d'accès, et dispositif terminal Download PDF

Info

Publication number
WO2023213132A1
WO2023213132A1 PCT/CN2023/080118 CN2023080118W WO2023213132A1 WO 2023213132 A1 WO2023213132 A1 WO 2023213132A1 CN 2023080118 W CN2023080118 W CN 2023080118W WO 2023213132 A1 WO2023213132 A1 WO 2023213132A1
Authority
WO
WIPO (PCT)
Prior art keywords
network slice
network
information
terminal device
access
Prior art date
Application number
PCT/CN2023/080118
Other languages
English (en)
Chinese (zh)
Inventor
孙海洋
朱方园
许胜锋
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023213132A1 publication Critical patent/WO2023213132A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/20Communication route or path selection, e.g. power-based or shortest path routing based on geographic position or location

Definitions

  • the present application relates to the field of communications, and more specifically, to a network slicing communication method, communication device, access network equipment, and terminal equipment.
  • Network slicing uses slicing technology to virtualize multiple end-to-end networks based on a common hardware. Each network has different network functions and adapts to different types of service requirements. Network slicing technology allows operators to split multiple virtual networks on a hardware infrastructure, allocate resources on demand, and flexibly combine capabilities to meet the different needs of various services.
  • Existing network slices are deployed at Tracking Area (TA) granularity, and the existing network slices are updated slowly. With the emergence of diversified services, more flexible deployment of network slices is required. For example, network slices allow network slices to be deployed at a certain time. Segment use, for example, network slicing allows use in a certain location area. The service area of the network slice may match the existing TA, but it may also be different.
  • TA Tracking Area
  • This application provides a communication method, communication device, access network equipment and terminal equipment for network slicing, which can realize that when a network slice is deployed on the network side that limits the use time and/or use location, different network element devices can be configured in the network slice. communicate below.
  • a network slice communication method is provided (for example, refer to the method executed by PCF in Figure 13), including: the policy control function network element obtains network slice information (refer to the description of step S210), wherein, The network slice information includes identification information of the network slice, and the network slice information also includes first time indication information and/or first location indication information of the network slice, where the first time indication information is used to indicate the The available time of the network slice, the first location indication information is used to indicate the available location area of the network slice, and the policy control function network element generates user routing policy information based on the information of the network slice (refer to the description of step S220); The policy control function network element sends the user routing policy information to the terminal device through the access and mobility management function network element (please refer to the description of step S230).
  • the network slice information includes identification information of the network slice
  • the network slice information also includes first time indication information and/or first location indication information of the network slice, where the first time indication information is used to indicate the The available time of the network slice, the first location indication
  • the policy control function network element obtains the information of the network slice and generates user routing policy information according to the information of the network slice.
  • the information of the network slice includes the first time indication information and/or the third time indication information. A location indication information.
  • the policy control function network element sends the user routing policy information to the terminal device through the access and mobility management function network element.
  • the terminal device receives the user routing policy information, it can based on the user route.
  • the network slice is added based on the definition of the selection policy information (such as the first time indication information and/or the first location indication information). This enables flexible deployment of network slicing and the use of network slicing in specific areas at specific times.
  • the user routing policy information includes a first user routing policy rule
  • the first user routing policy rule includes identification information of the network slice, the The identification information of the application program of the network slice service.
  • the first user routing policy rule also includes the first time window and/or the first location range corresponding to the network slice.
  • the first time window is less than or equal to the first time indication.
  • the available time indicated by the information, the first location range is less than or equal to the available location area indicated by the first location indication information.
  • the first user routing policy rule associates the network slice and the application program of the network slice service through the identification information of the network slice and the identification information of the application program of the network slice service, and the terminal device is configured according to the first user routing policy rule.
  • a user routing policy rule when the terminal device uses the application, the terminal device chooses to apply for access to the network slice.
  • the first time window is less than or equal to the available time indicated by the first time indication information
  • the first location range is less than or equal to the available location area indicated by the first location indication information, thereby preventing the terminal device from being
  • the network delay and freeze caused by the instability of the network slice can improve the user experience.
  • the first user routing policy includes a first route selection descriptor, and the first route selection descriptor includes the first time window and/or the first location range.
  • the policy control function network element obtains network slicing information, including:
  • the policy control function network element receives information about the network slice from the network slice management function network element; or,
  • the policy control function network element receives the information of the network slice from the access and mobility management function network element; or,
  • the policy control function network element receives information from the unified data repository for the network slice.
  • policy control function network element can also perform other actions performed by the PCF in Figure 13, which will not be described again here.
  • a network slicing communication method including: access and mobility management function network elements obtain network slice information (please refer to steps S310 and S510 description), the network slice information includes identification information of the network slice, and the network slice information also includes first time indication information and/or first location indication information of the network slice, where the first time indication information is In order to indicate the available time of the network slice, the first location indication information is used to indicate the available location area of the network slice;
  • the access and mobility management function network element processes the information of the network slice (please refer to the description of step S320).
  • the network element with access and mobility management functions obtains and processes the information of the network slice, which can improve the flexibility of the network side in processing the information of the network slice.
  • the access and mobility management function network element processes the information of the network slice, including: the access and mobility management function network element reports to the policy control function network element sends information about this network slice.
  • the access and mobility management function network element processes information of the network slice, including: the access and mobility management function network element processes information of the network slice according to The information generates local data network information (please refer to the description of step S320).
  • the local data network information includes the name of the local data network.
  • the local data network information also includes second time indication information and/or second location indication information.
  • the third The second time indication information is used to indicate the available time of the local data network, and the second location indication information is used to indicate the local data network.
  • the access and mobility management function network element sends the local data network information to the terminal device.
  • the access and mobility management function network element generates local data network information from the network slice information, and then sends the local data network information to the terminal device, so that the terminal device can determine whether it can apply to join based on the current time and/or current location.
  • This local data network information has little impact on existing communication processes.
  • the second location indication information is used to indicate available cells and/or available tracking areas of the local data network.
  • the communication method further includes: the access and mobility management function network element sending the local data network corresponding to the network slice to the policy control function network element. Name (please refer to the description of step S340).
  • the communication method further includes: the access and mobility management function network element sending the second time indication information and/or the policy control function network element to the policy control function network element.
  • Second location indication information please refer to the description of step S340).
  • the access and mobility management function network element processes the information of the network slice, including: in the access and mobility management function network element according to the network slice
  • the access and mobility management function network element sends the first timing information to the terminal device (refer to the description of step S530).
  • the requirement of a network slice means that the current time of the terminal device exceeds the available time of the network slice and/or the current location of the terminal device exceeds the available location area of the network slice.
  • the first timing information is used to instruct the terminal device to release the protocol data unit associated with the network slice established by the terminal device before the time indicated by the first timing information expires. Sessions can prevent the terminal device's business from being cut off instantly, thus improving the user experience.
  • the access and mobility management function network element processes the information of the network slice, including: in the access and mobility management function network element according to the network slice If the information determines that the terminal device does not meet the requirements for accessing the network slice, the access and mobility management function network element sends a reason value for denying the terminal device access to the network slice to the terminal device (please refer to step S550 Description), wherein when the terminal device does not meet the requirements for accessing the network slice, the current time of the terminal device exceeds the available time of the network slice, and the reason value for denying the terminal device access to the network slice is used to indicate to the terminal The current time of the device exceeds the available time of the network slice; or, when the terminal device does not meet the requirements for accessing the network slice and the current location of the terminal device exceeds the available location area of the network slice, the terminal device is denied access to the network slice.
  • the cause value of a network slice is used to indicate that the current location of the end device exceeds the available location area of
  • the terminal device By sending the cause value to the terminal device, the terminal device releases the protocol data unit session associated with the network slice established by the terminal device when receiving the cause value, so that the service of the terminal device will not be cut off instantly. , thereby improving user experience.
  • the access and mobility management function network element processes information of the network slice, including: the access and mobility management function network element processes information of the network slice according to information confirmation terminal If the device does not meet the requirements for accessing the network slice, the access and mobility management function network element determines the second timing information (please refer to the description of step S580), where the terminal device does not meet the requirements for accessing the network slice.
  • the requirement means that the current time of the terminal device exceeds the available time of the network slice and/or the current location of the terminal device exceeds the available location area of the network slice; when the time of the second timing information times out, the access and mobility
  • the management function network element sends a request to release the protocol data unit session established by the terminal device and associated with the network slice or the local data network to the session management function network element.
  • the access and mobility management function network element when the time of the second timing information times out and the access and mobility management function network element does not receive the message sent by the terminal device to release the network slice established by the terminal device and associated with the network slice or the local data network.
  • the access and mobility management function network element sends a request to release the protocol data unit session established by the terminal device and associated with the network slice or the local data network to the session management function network element.
  • the session management function network element releases the request of the protocol data unit session associated with the network slice established by the terminal device, thereby avoiding the problem that the terminal device fails to successfully release the protocol data unit session established with the terminal device. There is a waste of resources during the session of the protocol data unit associated with the network slice.
  • the second timing information can prevent the service of the terminal device from being cut off instantly, thereby improving user experience.
  • the first timing information is less than or equal to the second timing information.
  • the access and mobility management function network element obtains network slice information, including: the access and mobility management function network element receives information from the network slice management function The network element's information about the network slice; or, the access and mobility management function network element receives the network slice information from the unified data management network element; or, the access and mobility management function network element receives the network slice selection from Information about the network slice of functional network elements.
  • the access and mobility management function network element AMF can also perform other actions performed by the AMF in Figure 14 or Figure 16, which will not be described again here.
  • a network slice communication method is provided (for example, refer to the method executed by SMF in Figure 15), including: the session management function network element obtains network slice information (refer to the description of step S410), the network The slice information includes identification information of the network slice, and the network slice information also includes first time indication information and/or first location indication information of the network slice, where the first time indication information is used to indicate the location of the network slice.
  • the first location indication information is used to indicate the available location area of the network slice; when the session management function network element determines that the terminal device does not meet the requirements for accessing the network slice based on the information of the network slice, the The session management function network element determines the release of the protocol data unit session associated with the network slice established by the terminal device (please refer to the description of step S420), where the fact that the terminal device does not meet the requirements for accessing the network slice means that the terminal device does not meet the requirements for accessing the network slice.
  • the current time of the terminal device exceeds the available time of the network slice and/or the current location of the terminal device exceeds the available location area of the network slice.
  • the session management function network element determines that the terminal device does not meet the requirements for accessing the network slice based on the network slice information
  • the session management function network element determines the protocol data unit session associated with the network slice established by the terminal device.
  • the communication method further includes: the session management function network element sending first timing information to the terminal device (please refer to the description of step S430), the third timing information being sent to the terminal device.
  • a certain timing information is used to instruct the terminal device to release the connection established with the terminal device before the time indicated by the first timing information expires.
  • the protocol data unit session associated with this network slice
  • the first timing information is used to instruct the terminal device to release the protocol data unit associated with the network slice established by the terminal device before the time indicated by the first timing information expires. Sessions can prevent the terminal device's business from being cut off instantly, thus improving the user experience.
  • the communication method further includes: determining, in the session management function network element, that the terminal device does not meet the requirements for accessing the network slice based on the information of the network slice.
  • the session management function network element sends the reason value for denying the terminal device access to the network slice to the terminal device (please refer to the description of step S450)
  • the current time of the terminal device exceeds the available time of the network slice
  • the reason value for denying the terminal device access to the network slice is used to indicate the current time of the terminal device.
  • the time exceeds the available time of the network slice; or, when the terminal device does not meet the requirements for accessing the network slice and the current location of the terminal device exceeds the available location area of the network slice, the terminal device is denied access to the network slice.
  • the cause value is used to indicate that the current location of the end device is outside the available location area of the network slice.
  • the terminal device By sending the cause value to the terminal device, the terminal device releases the protocol data unit session associated with the network slice established by the terminal device when receiving the cause value, so that the service of the terminal device will not be cut off instantly. , thereby improving user experience.
  • the communication method further includes: the session management function network element determines that the terminal device does not meet the requirements for accessing the network slice based on the information of the network slice.
  • the session management function network element determines the second timing information (please refer to the description of step S480), where the terminal device does not meet the requirements for accessing the network slice means that the current time of the terminal device exceeds the time limit of the network slice.
  • the available time and/or the current location of the terminal device exceeds the available location area of the network slice; when the time of the second timing information times out, the session management function network element releases the session established by the terminal device and associated with the network slice. Request for protocol data unit session.
  • the session management function network element releases the request of the protocol data unit session associated with the network slice established by the terminal device, thereby avoiding the problem that the terminal device fails to successfully release the protocol data unit session established with the terminal device. There is a waste of resources during the session of the protocol data unit associated with the network slice.
  • the second timing information can prevent the service of the terminal device from being cut off instantly, thereby improving user experience.
  • the first timing information is less than or equal to the second timing information.
  • the session management function network element obtains network slice information, including: the session management function network element receives the network slice from the network slice management function network element. information; or, the session management function network element receives the information of the network slice from the unified data management network element; or,
  • the session management function network element receives the information of the network slice from the network slice selection function network element.
  • session management function network element SMF can also perform other actions performed by the SMF in Figure 15, which will not be described again here.
  • a network slicing communication method including: the access network device receives the network slicing information sent by the access and mobility management function network element (please refer to Description of step S620), the network slice information includes identification information of the network slice, and the network slice information also includes first time indication information and/or first location indication information of the network slice, wherein the first time indication The information is used to indicate the available time of the network slice, and the first location indication information is used to indicate the available location area of the network slice; in the When the access network device determines that the terminal device does not meet the requirements for accessing the network slice based on the information of the network slice, the access network device determines to release the protocol data unit session associated with the network slice established by the terminal device.
  • step S650 where the terminal device does not meet the requirements for accessing the network slice means that the current time of the terminal device exceeds the available time of the network slice and/or the current location of the terminal device exceeds the network slice.
  • the available location area for slices is
  • the access network device determines that the terminal device does not meet the requirements for accessing the network slice based on the network slice information, determines the release of the protocol data unit session associated with the network slice established by the terminal device. , realizes the flexible deployment of network slices, and achieves the effect of using network slices at specific times and specific areas.
  • the access network device determines to release the protocol data unit session associated with the network slice established by the terminal device, including: the access network device passes The broadcast message or unicast message instructs the terminal device to initiate the release of the protocol data unit session associated with the network slice before the time indicated by the first timing information times out (please refer to the description of step S660).
  • the first timing information is used to instruct the terminal device to release the protocol data unit associated with the network slice established by the terminal device before the time indicated by the first timing information expires. Sessions can prevent the terminal device's business from being cut off instantly, thus improving the user experience.
  • the access network device determines to release the protocol data unit session associated with the network slice established by the terminal device, including: the access network device
  • the terminal device sends a reason value for denying the terminal device access to the network slice, where, when the terminal device does not meet the requirements for accessing the network slice, the current time of the terminal device exceeds the available time of the network slice, and the terminal device is refused to access the network slice.
  • the reason value for the device to access the network slice is used to indicate that the current time of the terminal device exceeds the available time of the network slice; or, when the terminal device does not meet the requirements for accessing the network slice, the current location of the terminal device exceeds the available time of the network slice.
  • the available location area of the network slice is used to indicate that the current location of the terminal device exceeds the available location area of the network slice (refer to the description of step S670).
  • the access network device determines to release the protocol data unit session associated with the network slice established by the terminal device, further including: the access network device When the second timing information times out, the access network device notifies the access and mobility management function network element that the network slice is unavailable in the tracking area, and the tracking area is a cell covered by the access network device (refer to Description of step S680).
  • the access network device when the time of the second timing information times out and the access network device does not receive the message sent by the terminal device to release the protocol data unit session associated with the network slice or the local data network established by the terminal device Upon request, the access network device notifies the access and mobility management function network element that the network slice is unavailable in the tracking area, and then the access and mobility management function network element initiates the release of the network slice established by the terminal device.
  • the associated protocol data unit session This avoids waste of resources when the terminal device fails to successfully release the protocol data unit session associated with the network slice established by the terminal device.
  • the second timing information can prevent the service of the terminal device from being cut off instantly, thereby improving User feelings.
  • the first timing information is less than or equal to the second timing information.
  • the access network equipment RAN can also perform other actions performed by the RAN in Figure 17, which will not be described again here.
  • a network slicing communication method is provided (please refer to the method executed by the terminal device in Figure 15, Figure 16 or Figure 17), including: the terminal device receives the first timing information sent by the network device, and the first The timing information is used to instruct the terminal device to release the network slice established by the terminal device within the time indicated by the first timing information.
  • the associated protocol data unit session (refer to the description of step S460, step S540 or step S670); the terminal device releases the protocol data unit session before the time indicated by the timing information times out (refer to step S470, step S570 or step S670 description of).
  • the terminal device receives the timing information sent by the network device, and the terminal device releases the protocol data unit session before the time indicated by the timing information times out, thereby realizing flexible deployment of network slicing and achieving the effect of network slicing being used at a specific time and in a specific area.
  • the terminal device when the network device is an access network device, the terminal device receives the first timing information through a broadcast message or a unicast message (please refer to step S660 description of).
  • the terminal device when the network device is a core network device, the terminal device receives the first timing information through a configuration update message of the terminal device (please refer to step S440 or the description of step S540).
  • the terminal device receives a reason value sent by the network device for denying the terminal device access to the network slice (please refer to the description of step S670), wherein, when the terminal device does not meet the requirements for accessing the network slice because the current time of the terminal device exceeds the available time of the network slice, the reason value for denying the terminal device access to the network slice is used Indicate that the current time of the terminal device exceeds the available time of the network slice; or, when the terminal device does not meet the requirements for accessing the network slice, the current location of the terminal device exceeds the available location of the network slice. area, the reason value for denying the terminal device access to the network slice is used to indicate that the current location of the terminal device exceeds the available location area of the network slice.
  • the terminal device when the network device is an access network device, the terminal device receives the cause value through a broadcast message or a unicast message.
  • the terminal device when the network device is a core network device, the terminal device receives the cause value through a configuration update message of the terminal device.
  • the communication method further includes: the terminal device deleting the identification information of the network slice from a locally stored list of allowed network slice selection auxiliary information.
  • the communication method further includes: the terminal device receiving configuration information sent by the network side device, where the configuration information includes the rejected identification information of the network slice; The terminal device deletes the identification information of the network slice from the locally stored list of allowed network slice selection auxiliary information.
  • terminal device can also perform other actions performed by the terminal device in Figure 15, Figure 16 or Figure 17, which will not be described again here.
  • a network slicing communication method is provided (please refer to the method executed by the terminal device in Figure 14), including: the terminal device receives local data network information sent by the access and mobility management function network element (please refer to the steps Description of S330), wherein the local data network information includes the name of the local data network, the local data network information also includes first time indication information and/or first location indication information, and the first time indication information is used to indicate the The available time of the local data network, the first location indication information is used to indicate the available location area of the local data network, and the available location area indicated by the first location indication information is cell granularity; the terminal device according to the local data network information, Determine whether the terminal device can access the local data network (refer to the description of step S330).
  • the terminal device determines whether the terminal device can use the local data network based on the local data network information, including: when the current time of the terminal device When the available time indicated by the first time indication information is exceeded, the terminal device does not access the local data network; or,
  • the terminal device When the current location of the terminal device exceeds the available location area indicated by the first location indication information, the terminal device does not access the local data network.
  • terminal device can also perform other actions performed by the terminal device in Figure 14, which will not be described again here.
  • a communication device including a processor, a transceiver and a memory.
  • the memory is used to store instructions.
  • the processor is used to execute the instructions stored in the memory to control the transceiver to receive or send signals; the transceiver
  • the processor is configured to obtain network slice information, wherein the network slice information includes identification information of the network slice, and the network slice information also includes first time indication information and/or first location indication information of the network slice, wherein, The first time indication information is used to indicate the available time of the network slice, the first location indication information is used to indicate the available location area of the network slice, and the processor is used to generate user routing policy information according to the information of the network slice;
  • the transceiver is also used to send the user routing policy information to the terminal device through the access and mobility management function network element.
  • the user routing policy information includes a first user routing policy rule
  • the first user routing policy rule includes identification information of the network slice, the The identification information of the application program of the network slice service.
  • the first user routing policy rule also includes the first time window and/or the first location range corresponding to the network slice.
  • the first time window is less than or equal to the first time indication.
  • the available time indicated by the information, the first location range is less than or equal to the available location area indicated by the first location indication information.
  • the transceiver is specifically configured to: receive information about the network slice from the network slice management function network element; or, receive information from the access and mobility management Information about the network slice of the functional network element; or, receiving information about the network slice from the unified data repository.
  • a communication device including: a processor, a transceiver and a memory, the memory is used to store instructions, the processor is used to execute the instructions stored in the memory to control the transceiver to receive or send signals;
  • the transceiver is configured to obtain network slice information.
  • the network slice information includes identification information of the network slice.
  • the network slice information also includes first time indication information and/or first location indication information of the network slice, wherein the first time indication information and/or first location indication information A time indication information is used to indicate the available time of the network slice, and the first location indication information is used to indicate the available location area of the network slice; the processor is used to process the information of the network slice.
  • the transceiver unit is specifically configured to: send the network slice information to the policy control function network element.
  • the processor is specifically configured to: generate local data network information according to the information of the network slice, where the local data network information includes the name of the local data network, the The local data network information also includes second time indication information and/or second location indication information.
  • the second time indication information is used to indicate the available time of the local data network.
  • the second location indication information is used to indicate the local data network. available cells, wherein the available time indicated by the second time indication information is less than or equal to the available time indicated by the first time indication information, and the available cell indicated by the second location indication information is less than or equal to the first location Indicates the available location area indicated by the information; the transceiver is also used to send the local data network information to the terminal device.
  • the transceiver is further configured to: send the name of the local data network corresponding to the network slice to the policy control function network element.
  • the transceiver is further configured to: send the second time indication information and/or the second location indication information to the policy control function network element.
  • the processor is specifically configured to: determine according to the information of the network slice that the terminal device does not meet the requirements for accessing the network slice
  • the transceiver is specifically configured to: : When it is determined that the terminal device does not meet the requirements for accessing the network slice according to the information of the network slice, the first timing information is sent to the terminal device, and the first timing information is used to instruct the terminal device to wait at the first timing.
  • the time exceeds the available time of the network slice and/or the current location of the terminal device exceeds the available location area of the network slice.
  • the processor is specifically configured to: determine according to the information of the network slice that the terminal device does not meet the requirements for accessing the network slice
  • the transceiver is specifically configured to: : When it is determined that the terminal device does not meet the requirements for accessing the network slice based on the information of the network slice, send the reason value for denying the terminal device access to the network slice to the terminal device, where, when the terminal device does not meet the requirements
  • the requirement for accessing the network slice is that the current time of the terminal device exceeds the available time of the network slice, and the reason value for denying the terminal device access to the network slice is used to indicate that the current time of the terminal device exceeds the available time of the network slice.
  • the reason value for denying the terminal device access to the network slice is used to indicate to the terminal device 's current location is outside the available location area for this network slice.
  • the processor is specifically configured to: when it is determined based on the information of the network slice that the terminal device does not meet the requirements for accessing the network slice, determine 2. Timing information,
  • the terminal device does not meet the requirements for accessing the network slice means that the current time of the terminal device exceeds the available time of the network slice and/or the current location of the terminal device exceeds the available location area of the network slice;
  • the transceiver unit It is also configured to: when the time of the second timing information times out, send a request to the session management function network element to release the protocol data unit session established by the terminal device and associated with the network slice or the local data network.
  • the first timing information is less than or equal to the second timing information.
  • the transceiver is specifically configured to: receive information about the network slice from the network slice management function network element; or, receive information from the unified data management network element. Information about the network slice; or, receiving information about the network slice from the network slice selection function network element.
  • a communication device including: a processor, a transceiver and a memory, the memory is used to store instructions, the processor is used to execute the instructions stored in the memory to control the transceiver to receive or send signals;
  • the transceiver is configured to obtain network slice information.
  • the network slice information includes identification information of the network slice.
  • the network slice information also includes first time indication information and/or first location indication information of the network slice, wherein the first time indication information and/or first location indication information A time indication information is used to indicate the available time of the network slice, and the first location indication information is used to indicate the available location area of the network slice; the processor is used to determine that the terminal device is not eligible to access the network based on the information of the network slice.
  • the transceiver is further configured to: send first timing information to the terminal device, where the first timing information is used to instruct the terminal device in the first
  • the protocol data unit session established by the terminal device and associated with the network slice is released before the time indicated by the timing information expires.
  • the processor is further configured to: determine based on the information of the network slice that the terminal device does not meet the requirements for accessing the network slice; the transceiver is also configured to: When the session management function network element determines that the terminal device does not meet the requirements for accessing the network slice based on the information of the network slice, the reason value for denying the terminal device access to the network slice is sent to the terminal device, where , when the terminal device does not meet the requirements for accessing the network slice, the current time of the terminal device exceeds the available time of the network slice, and the reason value for denying the terminal device access to the network slice is used to indicate the current time of the terminal device.
  • the processor is further configured to: when the information of the network slice determines that the terminal device does not meet the requirements for accessing the network slice, determine 2. Timing information, wherein the terminal device does not meet the requirements for accessing the network slice means that the current time of the terminal device exceeds the available time of the network slice and/or the current location of the terminal device exceeds the available location area of the network slice ; When the time of the second timing information times out, the session management function network element releases the request of the protocol data unit session associated with the network slice established by the terminal device.
  • the first timing information is less than or equal to the second timing information.
  • the transceiver is specifically configured to: receive information about the network slice from the network slice management function network element; or, receive information from the unified data management network element. Information about the network slice; or, receiving information about the network slice from the network slice selection function network element.
  • an access network device including: a processor, a transceiver and a memory.
  • the memory is used to store instructions.
  • the processor is used to execute instructions stored in the memory to control the transceiver to receive or send signals.
  • the transceiver is used to receive the network slice information sent by the access and mobility management function network element.
  • the network slice information includes the identification information of the network slice.
  • the network slice information also includes the first time indication information of the network slice and /or first location indication information, wherein the first time indication information is used to indicate the available time of the network slice, and the first location indication information is used to indicate the available location area of the network slice; the processor is configured to When the network access device determines that the terminal device does not meet the requirements for accessing the network slice based on the information of the network slice, it determines to release the protocol data unit session associated with the network slice established by the terminal device, wherein the terminal device Failure to meet the requirements for accessing the network slice means that the current time of the terminal device exceeds the available time of the network slice and/or the current location of the terminal device exceeds the available location area of the network slice.
  • the transceiver is further configured to: instruct the terminal device to initiate a protocol associated with the network slice before timeout indicated by the first timing information through a broadcast message. Release of data unit session.
  • the transceiver is further configured to: when the time of the second timing information times out, notify the access and mobility management function network element that the network slice is tracking area is unavailable, the tracking area is a cell covered by the access network equipment.
  • the first timing information is less than or equal to the second timing information.
  • a terminal device including: a processor, a transceiver and a memory, the memory is used to store instructions, and the processor is used to execute instructions stored in the memory to control the transceiver to receive or send signals;
  • the transceiver is used to receive timing information sent by the network device, and the timing information is used to instruct the terminal device to respond to the timing information.
  • Release the protocol data unit session associated with the network slice established by the terminal device within the indicated time, and the identification information of the network slice is the identification information of the network slice; the processor is configured to release the protocol before the time indicated by the timing information times out. Data unit session.
  • the transceiver when the network device is an access network device, the transceiver receives the timing information through a broadcast message.
  • the transceiver when the network device is a core network device, the transceiver receives the timing information through a configuration update message of the terminal device.
  • the transceiver receives a reason value sent by a network device for denying the terminal device access to the network slice, wherein when the terminal The device does not meet the requirements for accessing the network slice because the current time of the terminal device exceeds the available time of the network slice, and the reason value for denying the terminal device access to the network slice is used to indicate that the terminal device The current time exceeds the available time of the network slice; or, when the terminal device does not meet the requirements for accessing the network slice because the current location of the terminal device exceeds the available location area of the network slice, the terminal is rejected
  • the reason value for the device to access the network slice is used to indicate that the current location of the terminal device exceeds the available location area of the network slice.
  • the transceiver when the network device is an access network device, the transceiver receives the cause value through a unicast message.
  • the transceiver when the network device is a core network device, the transceiver receives the cause value through a configuration update message of the terminal device.
  • the processor is further configured to: delete the identification information of the network slice from a locally stored list of allowed network slice selection auxiliary information.
  • a terminal device including: a processor, a transceiver and a memory, the memory is used to store instructions, and the processor is used to execute the instructions stored in the memory to control the transceiver to receive or send signals;
  • the transceiver is used to receive local data network information sent by the access and mobility management function network element, where the local data network information includes the name of the local data network, and the local data network information also includes first time indication information and/or third time indication information.
  • a location indication information is used to indicate the available time of the local data network
  • the first location indication information is used to indicate the available location area of the local data network, the available location indicated by the first location indication information
  • the area is a cell granularity
  • the processor is used to determine whether the terminal device can access the local data network based on the local data network information.
  • the processor is specifically configured to: when the current time of the terminal device exceeds the available time indicated by the first time indication information, the terminal The device does not access the local data network; or, when the current location of the terminal device exceeds the available location area indicated by the first location indication information, the terminal device does not access the local data network.
  • a thirteenth aspect provides a computer program product, which includes instructions that, when run on a computer, cause the computer to perform the method in the first aspect or any possible implementation of the first aspect, or Perform the method in the second aspect or any possible implementation of the second aspect, or perform the method in the third aspect or any possible implementation of the third aspect, or perform the fourth aspect or any possible implementation of the fourth aspect.
  • a computer-readable storage medium stores computer A program, when the computer program is executed, for performing a method in the first aspect or any possible implementation of the first aspect, or performing a method in the second aspect or any possible implementation of the second aspect, or Perform the method in the third aspect or any possible implementation of the third aspect, or perform the method in the fourth aspect or any possible implementation of the fourth aspect, or perform the fifth aspect or any possible implementation of the fifth aspect.
  • a chip system in a fifteenth aspect, includes a processor for the communication device to implement the functions involved in the above aspects, such as generating, receiving, sending, or processing data involved in the above methods. and/or information.
  • the chip system also includes a memory, which is used to store necessary program instructions and data of the communication device.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • a communication system which includes a device having the functions of implementing the methods and various possible designs of the above-mentioned first aspect, and a device having the functions of implementing the methods and various possible designs of the above-mentioned fourth aspect.
  • the communication system includes a device with functions that implement The methods of the second aspect and devices with various possible designs, the devices with the functions of the fourth aspect and the devices with the functions of the sixth aspect, and the devices with the functions of the sixth aspect A device with functions; or, the communication system includes a device with functions that implement the methods of the third aspect and various possible designs, a device with functions that implements the methods of the fourth aspect and various possible designs, and a device with Devices that implement the methods of the sixth aspect and various possible designed functions.
  • Figure 1 shows a schematic scene diagram of a 5G supported eMBB scenario provided by this application
  • Figure 2 shows a schematic diagram of a 5G network slicing architecture provided by this application
  • Figure 3 shows a schematic block diagram of the types of network slicing corresponding to the three typical scenarios supported by 5G provided by this application;
  • Figure 4 shows a schematic flow chart of a method for UE slice selection in the registration process provided by this application
  • Figure 5 shows a schematic structural diagram of the NSSP provided by this application
  • Figure 6 shows a schematic flow chart of routing data packets to PDU sessions provided by this application
  • Figure 7 shows a schematic diagram of a network architecture applied in this application
  • Figure 8 shows a schematic diagram of another network architecture applied in this application.
  • Figure 9 shows a schematic diagram of another network architecture applied in this application.
  • Figure 10 shows a schematic diagram of another network architecture applied in this application.
  • Figure 11 shows a schematic diagram of another network architecture applied in this application.
  • Figure 12 shows a schematic diagram of another network architecture applied in this application.
  • Figure 13 shows a schematic flow chart of a network slicing communication method according to the present application.
  • Figure 14 shows a schematic flow chart of a network slicing communication method according to the present application.
  • Figure 15 shows a schematic flow chart of a network slicing communication method according to the present application.
  • Figure 16 shows a schematic flow chart of a network slicing communication method according to the present application.
  • Figure 17 shows a schematic flow chart of a network slicing communication method according to the present application.
  • Figure 18 shows a schematic block diagram of a communication device according to the present application.
  • Figure 19 shows a schematic block diagram of a communication device of the present application
  • Figure 20 shows a schematic structural diagram of a terminal device of the present application
  • Figure 21 shows a schematic structural diagram of an access network device according to the present application.
  • GSM global system for mobile communications
  • CDMA code division multiple access
  • WCDMA wideband code division multiple access
  • GPRS general packet radio service
  • LTE long term evolution
  • FDD frequency division duplex
  • TDD LTE time division duplex time division duplex
  • UMTS universal mobile telecommunication system
  • WiMAX global interoperability for microwave access
  • 5G fifth generation
  • 5G New radio
  • NR New radio
  • the terminal equipment in this application can also be called: user equipment (UE), mobile station (MS), mobile terminal (MT), access terminal, user unit, user station, mobile station , mobile station, remote station, remote terminal, mobile equipment, user terminal, terminal, wireless communication equipment, user agent or user device, etc.
  • UE user equipment
  • MS mobile station
  • MT mobile terminal
  • access terminal user unit, user station, mobile station , mobile station, remote station, remote terminal, mobile equipment, user terminal, terminal, wireless communication equipment, user agent or user device, etc.
  • the terminal device may be a wireless terminal or a wired terminal.
  • the wireless terminal may be a device that provides voice and/or other service data connectivity to the user, a handheld device with a wireless connection function, or other processing equipment connected to a wireless modem.
  • Wireless terminals can communicate with one or more core networks via a Radio Access Network (RAN).
  • RAN Radio Access Network
  • the wireless terminals can be mobile terminals, such as mobile phones (or "cellular" phones) and computers with mobile terminals. , for example, may be portable, pocket-sized, handheld, computer-built-in, or vehicle-mounted mobile devices that exchange voice and/or data with the wireless access network.
  • Wireless terminals can also be called systems, Subscriber Units, Subscriber Stations, Mobile Stations, Mobile stations, Remote Stations, Remote Terminals, and Connectors.
  • Access Terminal User Terminal, User Agent, User Device or User Equipment, mobile internet device (MID), wearable device, virtual reality reality, VR) equipment, augmented reality (AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical surgery , wireless terminals in smart grid, wireless terminals in transportation safety, wireless terminals in smart city, wireless terminals in smart home, vehicle-mounted equipment, wearables Equipment, terminal equipment in the 5G network or terminal equipment in the future evolved public land mobile communication network (public land mobile network, PLMN), etc.
  • PLMN public land mobile network
  • a wearable device may also be called a wearable smart device, which is an application wearable device.
  • Wearable technology is a general term for intelligently designing and developing wearable devices for daily wear, such as glasses, gloves, watches, clothing, and shoes.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories.
  • Wearable devices are not just hardware devices, but also achieve powerful functions through software support, data interaction, and cloud interaction.
  • Broadly defined wearable smart devices include full-featured, large-sized devices that can achieve complete or partial functions without relying on smartphones, such as smart watches or smart glasses, and those that only focus on a certain type of application function and need to cooperate with other devices such as smartphones. Use, such as various types of smart bracelets, smart jewelry, etc. for physical sign monitoring.
  • the terminal device can also be a terminal device in the Internet of things (IoT) system.
  • IoT Internet of things
  • Its main technical feature is to connect items with the network through communication technology. Connect, thereby realizing an intelligent network of human-computer interconnection and physical-object interconnection.
  • the various terminal devices introduced above can be considered as vehicle-mounted terminal equipment if they are located on the vehicle (for example, placed or installed in the vehicle).
  • vehicle-mounted terminal equipment is also called an on-board unit (OBU), for example. ).
  • OBU on-board unit
  • the terminal device may also include a relay.
  • a relay any device that can perform data communication with the base station.
  • the access network device in this application may be a device used to communicate with a terminal device, and may be a base station, an access point, or a network device, or may refer to a device in the access network that communicates with a terminal device through one or more sectors on the air interface.
  • the network equipment may be used to convert received air frames to and from IP packets and act as a router between the wireless terminal and the remainder of the access network, which may include an Internet Protocol (IP) network.
  • IP Internet Protocol
  • Network devices also coordinate attribute management of the air interface.
  • the access network equipment can be a Base Transceiver Station (BTS) in Global System of Mobile communication (GSM) or Code Division Multiple Access (CDMA), or it can be a broadband code division
  • BTS Base Transceiver Station
  • GSM Global System of Mobile communication
  • CDMA Code Division Multiple Access
  • the base station (NodeB, NB) in the multiple access (Wideband Code Division Multiple Access, WCDMA) can also be the evolved base station (evolved NodeB, eNB or eNodeB) in the LTE system, or it can be the cloud wireless access network (cloud radio access network (CRAN) scenario, or the access device can be a relay station, access point, vehicle-mounted device, wearable device, access device in the 5G network or network equipment in the future evolved PLMN network, etc.
  • it can be an access point (AP) in WLAN, or it can be a gNB in a new wireless system (new radio, NR) system.
  • AP access point
  • WLAN new wireless system
  • NR new
  • the access network device is a device in the access network (radio access network, RAN), or in other words, a RAN node that connects the terminal device to the wireless network.
  • RAN radio access network
  • the access network equipment you can enumerate: gNB, transmission reception point (TRP), evolved Node B (evolved Node B, eNB), radio network controller (radio network controller) , RNC), Node B (Node B, NB), base station controller (BSC), base transceiver station (BTS), home base station (for example, home evolved NodeB, or home Node B, HNB ), baseband unit (base band unit, BBU), or wireless fidelity (wireless fidelity, Wifi) access point (access point, AP), etc.
  • TRP transmission reception point
  • eNB evolved Node B
  • eNB radio network controller
  • RNC Radio network controller
  • Node B Node B
  • BSC base station controller
  • BTS base transceiver station
  • home base station
  • the access network equipment provides services for the cell, and the terminal equipment communicates with the access network equipment through the transmission resources (for example, frequency domain resources, or spectrum resources) used by the cell.
  • the cell may be an access network equipment (for example, a base station). ).
  • the cell may belong to a macro base station or a base station corresponding to a small cell.
  • the small cell here may include: metro cell, micro cell, or pico cell. ), femto cells, etc. These small cells have the characteristics of small coverage and low transmit power, and are suitable for providing High-speed data transmission service.
  • 5G will usher in an era of Internet of Everything.
  • 5G supports Enhanced Mobile Broadband (eMBB), Massive Machine Type Communication (mMTC) and High-Reliable Low Latency Communications (uRLLC). ) three major scenes.
  • the three major scenarios include diverse and differentiated applications.
  • eMBB is based on breakthroughs in spectrum utilization and spectrum bandwidth technology on the wireless side.
  • 5G can provide a transmission rate that is more than 10 times faster than 4G.
  • AR Augmented Reality
  • VR Virtual Reality
  • 4G High-definition video live broadcast
  • MIoT uses technologies such as multi-user shared access and ultra-dense heterogeneous networks.
  • 5G can support access to 1 million devices per square kilometer, which is 10 times that of 4G, for example.
  • public facilities such as street lights, manhole covers, and water meters already have network connection capabilities and can be managed remotely, but 5G will bring greater innovation.
  • public equipment in various industries in the city can be connected to the intelligent management platform.
  • the most typical application of uRRLC in 5G scenarios is autonomous driving.
  • the most common scenarios for autonomous driving include sudden braking, vehicle-to-vehicle, vehicle-to-person, vehicle-to-infrastructure and other multi-channel communications at the same time, which requires instantaneous processing of a large amount of data and decision making. Therefore, the network needs to have large bandwidth, low latency and high reliability at the same time. 5G network has the ability to cope with this scenario.
  • one network is used to meet all application scenarios and customer groups. For example, if the network wants to provide NB-IoT capabilities, it must enable NB-related features on the network elements. To build network reliability, it must add redundant backup at the device level of the network elements. , by continuously adding features to meet the constant demands of the mass market.
  • Network slicing uses slicing technology to virtualize multiple end-to-end networks based on a common hardware. Each network has different network functions and adapts to different types of service requirements.
  • Figure 2 is a schematic diagram of a 5G network slicing architecture provided by this application. After the operator purchases physical resources, it uses the physical resources to virtualize an eMBB slicing network for mass Internet services, and then targets the smart meter reading needs of certain manufacturers in vertical industries. , using physical resources to virtualize a mMTC slice network, and the two slice networks provide services for different business scenarios.
  • Network slicing technology allows operators to split multiple virtual networks on a hardware infrastructure, allocate resources on demand, and flexibly combine capabilities to meet the different needs of various businesses. When new demands are raised and the current network cannot meet the requirements, operators only need to virtualize a new slice network for this demand without affecting the existing slice network, so as to launch services as quickly as possible.
  • mMTC can also be called Massive Internet of Things (MIoT).
  • MIoT Massive Internet of Things
  • FIG. 3 is a schematic block diagram of a type of network slicing corresponding to three typical scenarios supported by 5G provided by this application.
  • eMBB services such as Internet access, cloud games, high-definition video and voice require a transmission rate of 10Gbps.
  • the type of network slice corresponding to eMBB services is eMBB slicing; mMTC services such as smart homes, smart meter reading and safe cities require a connection density of millions square kilometers and low power consumption, the corresponding network slicing type is mmTC slice; uRLLC services such as autonomous driving, telemedicine and other high-reliability services require millisecond-level latency, and the corresponding network slicing type is uRLLC slice.
  • the three major characteristics of network slicing are isolation, on-demand customization and end-to-end.
  • on-demand customization includes providing slice life cycle on demand, distributed deployment on demand, capacity on demand, and network services on demand.
  • Isolation includes resource isolation, security isolation, and OAM isolation. Different domains can use different isolation technologies.
  • End-to-end network slicing is an end-to-end network, including access network, transmission network and core network, and requires a cross-domain slicing management system.
  • the identification information of the network slice (Single Network Slice Selection Assistance Information, S-NSSAI) is used to identify a network slice.
  • S-NSSAI Single Network Slice Selection Assistance Information
  • one S-NSSAI can be associated with one or more network slicing instances, and one network slicing instance can be associated with one or more S-NSSAI.
  • S-NSSAI includes two parts: slice service type (Slice/ServiceType, SST) and slice difference (Slice Differentiator, SD):
  • SST refers to the expected behavior of network slicing in terms of features and services.
  • the standard value range of SST is 1, 2, and 3.
  • the value 1 represents eMBB
  • 2 represents URLLC
  • 3 represents mMTC.
  • SD is optional information used to supplement SST to distinguish multiple network slices of the same slice/service type.
  • the two parts SST and SD are combined to represent the slice type and multiple slices of the same slice type, as shown in Table 1.
  • the S-NSSAI values are 0x01000000, 0x02000000, and 0x03000000, which respectively represent eMBB type slices, uRLLC type slices, and MIoT type slices.
  • the S-NSSAI values 0x01000001 and 0x01000002 represent eMBB type slices, serving user group 1 and user group 2 respectively.
  • NSSAI Network Slice Selection Assistance Information
  • the NSSAI used in 5G networks include Requested NSSAI, Allowed NSSAI, Configured NSSAI, and Subscribed S-NSSAI(s). Their specific definitions are shown in Table 2. .
  • Figure 4 is a schematic flow chart of a method 100 for UE slice selection in the registration process provided by this application.
  • S110 When the UE registers on a public land mobile network (Public Land Mobile Network, PLMN) through an access type, it sends a registration request message to the RAN. If the Configured NSSAI of this PLMN or the Allowed NSSAI of this access type of this PLMN is stored on the UE, then the UE will register the request message in the non-access stratum (NAS) and the access stratum (AS) The message carries Requested NSSAI information, and Requested NSSAI contains the S-NSSAI of the slice that the UE requests access to.
  • PLMN Public Land Mobile Network
  • RAN selects the original Initial AMF based on the Globally Unique AMF Identifier (GUAMI) or Requested NSSAI, and sends a registration request message to the Initial AMF. If the UE does not provide the Requested NSSAI and GUAMI in the access layer message, the RAN shall send the registration request message from the UE to the default AMF (default AMF).
  • GUIMI Globally Unique AMF Identifier
  • Requested NSSAI Requested NSSAI
  • Initial AMF queries Unified Data Management (UDM) to obtain UE subscription information including Subscribed S-NSSAIs.
  • UDM Unified Data Management
  • Initial AMF determines whether it can provide services to the UE based on the received Requested NSSAI, Subscribed S-NSSAI and local configuration. If the AMF can serve the UE, the Initial AMF is still the serving AMF of the UE, and then the AMF constructs the Allowed NSSAI based on the Subscribed S-NSSAI and the Requested NSSAI and returns it to the UE through the registration acceptance message. If the Initial AMF cannot serve the UE or cannot make a judgment, the AMF queries the Network Slice Selection Function (NSSF). The S-NSSAI supported by each relevant TA will be configured in AMF. This information is reported by the RAN when establishing a connection with the AMF.
  • NSSF Network Slice Selection Function
  • AMF sends the Requested NSSAI, Subscribed S-NSSAI, PLMN of the User Permanent Identifier (Subscription Permanent Identifier, SUPI), Tracking Area Identity (TAI) and other information to NSSF for query.
  • SUPI Subscribed S-NSSAI
  • PLMN Public Land Mobile Network
  • TAI Tracking Area Identity
  • NSSF selects the AMF Set or candidate AMF list that can serve the UE based on the received information and local configuration, the Allowed NSSAI applicable to this access type, and may also select network slice instances and instances that serve the UE. It is used to select the network storage function (NF Repository Function, NRF) of the network function (Network Function, NF) and send this information to the Initial AMF.
  • NRF Network Repository Function
  • the Initial AMF obtains the candidate AMF list by querying the NRF.
  • NRF returns a set of available AMF lists, including AMF Pointer (pointer) and address information.
  • Initial AMF selects one as the target AMF.
  • the Initial AMF needs to send the UE's registration request message to the RAN.
  • the message sent by the Initial AMF to the RAN contains AMF Set and Allowed NSSAI.
  • the RAN determines the target AMF based on the AMF Set, Allowed NSSAI and local configuration, and the RAN sends the UE's registration request message to the target AMF, which contains the AMF Set and Allowed NSSAI.
  • the Initial AMF decides to send the NAS message directly to the target AMF based on the local policy and subscription information, then the Initial AMF sends the UE registration request message and other information obtained from the NSSF except the AMF set to the target AMF.
  • Reroute NAS message includes target AMF Set information and registration request message, as well as related information obtained from NSSF.
  • the target AMF After the target AMF receives the registration request message sent in S180 or S170b, the target AMF continues to execute the relevant steps of the registration process.
  • the target AMF sends a registration acceptance message to the RAN, which carries information such as Allowed NSSAI and NSSP.
  • RAN sends a registration acceptance message to the UE, which carries information such as Allowed NSSAI and NSSP.
  • the PDU When the UE joins the network slice, the UE needs to select an appropriate protocol data unit (PDU) session for the uplink service flow.
  • the PDU associates a user terminal UE with the data network DN, and the PDU session provides a PDU connection service.
  • the PDU session established between the terminal device and the network device has attributes such as network slicing, DNN and session service continuity (session service continuity, SSC) mode.
  • the 3rd generation partnership project (3GPP) defines user URSP to determine the correspondence between application (APP) and slice, DNN and SSC modes.
  • the association between the identification information of the application service and the network slice is determined by the Network Slice Selection Policy (NSSP).
  • Figure 5 is a schematic structure diagram of the NSSP provided by this application.
  • the UE associates the APP id and S-NSSAI through the NSSP.
  • NSSP is part of the URSP (UE Route Selection Policy, UE routing policy) rule.
  • URSP is issued to the terminal device by the PCF through the AMF.
  • URSP includes one or more URSP rules.
  • a URSP rule mainly includes two parts: Traffic Descriptor and Route Selection Descriptor.
  • Traffic descriptor includes the names or logos of multiple APPs, etc.
  • Route Selection Descriptor includes network slice selection information corresponding to each APP, as well as wildcard network slice selection information, that is, APPs not included in Traffic descriptor can use it.
  • Network slice selection information and more are examples of the URSP information.
  • the form of the URSP information can be seen in Table 3
  • the content of the URSP information can be seen in Table 4
  • the Route Selection Descriptor can be seen in Table 5.
  • the UE may trigger the establishment or modification of the PDU session. For example, if it does not meet the requirements When a PDU session is requested, the UE will initiate the PDU session establishment process; when there is a session that meets the requirements, the existing PDU session may be directly used, and the UE will route the data packet to the PDU session that meets the requirements (if multiple UEs are configured, the Wait to pick one). Each time the UE detects a new application, the UE evaluates whether the application matches the traffic descriptor in the rule in the order of rule precedence.
  • the UE selects the route selection descriptor (Route Selection Descriptor, RSD) in the rule in the order of route selection descriptor priority (Route Selection Descriptor Precedence).
  • RSD Route Selection Descriptor
  • the RSD is invalid (valid, or no longer valid), jump to the next RSD, otherwise select the RSD.
  • a routing descriptor for a URSP rule should be considered valid only if all of the following conditions are met:
  • S-NSSAI(s) are included in the allowed NSSAI(s) in the non-roaming case, or included in the mapping of allowed NSSAI to HPLMN S-NSSAI(s) in the roaming case.
  • LADN Local Area Data Network
  • the time window and location standards in RSD are determined by the corresponding services.
  • the background traffic service stipulates specific service time and location.
  • Background traffic services include software update services on terminal devices.
  • Figure 6 is a schematic flowchart of routing data packets to a PDU session provided by this application.
  • the UE selects an appropriate PDU session for the uplink service flow according to the URSP.
  • the UE routes data packets of different uplink services to different PDU sessions according to the URSP.
  • data packet A can be routed to the session of DNN1, S-NSSAI-a, SSC1;
  • data packet B can be routed to the session of DNN1, S-NSSAI-a, SSC2, or to the session of DNN1, S-NSSAI-a, SSC1.
  • Data packet C can be routed to the sessions of DNN2, S-NSSAI-a, SSC3;
  • Data packet D can be routed to the sessions of DNN1, S-NSSAI-b, SSC1;
  • Data packet E can be routed to DNN2, S -NSSAI-a, SSC3 session;
  • packet F can be routed to DNN2, S-NSSAI-c, SSC3 session.
  • the above network slices are deployed at TA granularity. That is, when the RAN reports the supported S-NSSAI to the AMF, it reports the TA and the corresponding S-NSSAI.
  • the network side will consider the TA to be homogeneous, that is, any area within a TA supports the same network slice.
  • Network slicing is deployed for services in service areas. As network slicing deployment increases, the service area of the network slicing may match the existing TA, but it may also be different. For example, the service area of a network slice is not the entire TA, but a part of the TA.
  • the network slice may not always be able to provide services, and may only be able to provide services within a specified time.
  • UE and network configurations may be affected. For example, the Configured NSSAI may change when this network slice becomes available, which may affect the Allowed NSSAI and other parameters.
  • this network slice is discontinued, that is, when this network slice is no longer available, the UE and network configuration may also be affected by the above.
  • FIG. 7 shows a schematic diagram of a network architecture applied in this application.
  • the network architecture is, for example, a service-oriented architecture of a 5G network.
  • the network architecture mainly includes terminal equipment (User Equipment, UE), access network (Access Network, AN) equipment, access and mobility management function (AMF), session management Function (Session Management Function, SMF), User Plane Function (UPF), Policy Control function (PCF), Unified Data Management (UDM), System 1.
  • Data warehousing function Unified Data Repository, UDR
  • data network Data Network
  • DN data network
  • NSSF Network Slice Selection Function
  • NSMF Network Slice Management Function
  • AMF provides mobility management functions in the core network and is mainly responsible for access and mobility control, such as user location update, user registration network, user switching, etc., including registration management (RM) and connection management. (connection management, CM), access authentication and access authorization, reachability management and mobility management, etc.
  • RM registration management
  • CM connection management
  • access authentication and access authorization access authorization
  • reachability management mobility management
  • SMF is the session management function in the core network and is mainly responsible for session management in the mobile network, such as session establishment, modification, and release. Specific functions include assigning IP addresses to users and selecting UPFs that provide message forwarding functions. In addition to mobility management of the UE, the AMF is also responsible for forwarding session management related messages between the UE and the SMF.
  • UPF is the user plane function in the core network. It mainly provides user plane support and is responsible for forwarding and receiving user data in terminal devices. It can receive user data from the data network and transmit it to the terminal device through the access network device; the UPF network element can also receive user data from the terminal device through the access network device and forward it to the data network.
  • the transmission resources and scheduling functions in the UPF network element that provide services for terminal equipment are managed and controlled by the SMF network element.
  • PCF policy management function in the core network. It mainly supports the provision of a unified policy framework to control network behavior, provides policy rules to the control layer network functions, and is responsible for obtaining user subscription information related to policy decisions. Responsible for formulating policies related to UE mobility management, session management, and charging.
  • UDM is the contract database in the core network. It stores user contract data in the 5G network and is responsible for user authentication and authentication-related functions. Specifically, it includes: authentication credential processing, user identity processing, contract information management, access authorization, etc.
  • UDR is a unified data warehousing function in the core network. It is used by UDM to store or retrieve subscription data of user devices, and for PCF to store or read policy data.
  • DN is a service network that provides users with data transmission services, such as IMS (IP Multi-media Service, IP Multimedia Service), Internet, etc.
  • IMS IP Multi-media Service, IP Multimedia Service
  • the UE accesses the data network through the PDU session established between the UE and the DN.
  • NSMF is a newly introduced network element in this application. It is used by operators to deploy network slicing and can notify other network elements of the information about deploying network slicing.
  • the UE communicates with the (R)AN device through the Uu interface for access layer connection to exchange access layer messages and wireless data transmission.
  • the UE communicates with the AMF through the N1 interface for non-access layer (Non-Access Stratum, NAS) connection to exchange NAS messages;
  • the AN device is connected to the AMF through the N2 interface, and the AN device is connected to the UPF through the N3 interface; multiple UPFs are connected through the N9 interface, and the UPF is connected to the DN through the N6 interface.
  • NAS non-Access Stratum
  • the UPF The N4 interface is connected to SMF; SMF is connected to PCF through N7 interface, SMF is connected to UDM through N10 interface, SMF controls UPF through N4 interface, and at the same time, SMF is connected to AMF through N11 interface; multiple AMFs are connected through N14 interface, AMF It connects to UDM through N8 interface, AMF connects to PCF through N15 interface; UDM connects to UDR through N35 interface, PCF connects to UDR through N36 interface; NSMF connects to PCF through N90 interface; NSMF connects to UDM through N91 interface; NSMF connects through N92 The interface is connected to NSSF; NSMF is connected to AMF through N93 interface; NSMF is connected to SMF through N94 interface.
  • FIG. 7 is only an exemplary architecture diagram.
  • the network architecture may also include other functional units or functional network elements, which is not limited in this application.
  • AMF Access Management Function
  • SMF Access Management Function
  • PCF Policy and Charging Function
  • session management functions such as recording, releasing and changing user plane transmission paths, as well as analyzing some slice-related data (such as congestion), terminal device-related
  • UPF mainly completes functions such as routing and forwarding of user plane data, such as: responsible for data packet filtering, data transmission/forwarding, rate control, and generation of accounting information for terminal devices.
  • the application scenario shown in Figure 7 can also include more network nodes, such as other AMFs, and the access network equipment or terminal equipment included in the application scenario shown in Figure 7 can be the various forms of access networks mentioned above. equipment or terminal equipment. This application is no longer shown one by one in the drawings.
  • FIG 8 shows a schematic diagram of another network architecture applied in this application.
  • the network architecture is, for example, a service-oriented architecture of a 5G network.
  • control plane functions such as AMF, SMF, UPF, PCF, UDR, UDM, NSSF, and NSMF use service-based interfaces to interact.
  • AMF provides external service interface Namf
  • SMF provides external service interface Nsmf
  • PCF provides external service interface Npcf
  • UDM provides external service interface Nudm
  • NSSF provides external service interface Nnssf
  • UDR provides external services.
  • interface Nudr the service-oriented interface Nudm provided by UDM to the outside world
  • the service-oriented interface Nnsmf provided by NSMF to the outside world.
  • the network architecture shown in Figure 7 and Figure 8 is the system architecture in the non-roaming scenario.
  • the following is a schematic diagram of the network architecture in the roaming scenario.
  • FIG 9 shows a schematic diagram of another network architecture applied in this application.
  • the network architecture is, for example, a service-oriented architecture of a 5G network.
  • the network architecture is a roaming network architecture, such as a local breakout (LBO) roaming scenario.
  • the 5G network includes the home public land mobile network (HPLMN) and the visited public land mobile network (VPLMN).
  • HPLMN is the home network of the UE
  • VPLMN is the roaming network of the UE.
  • services need to be offloaded at the VPLMN, that is, the UE's services need to be routed to the DN of the VPLMN.
  • VPLMN and HPLMN communicate through the visited security edge protection proxy (vSEPP) and the home security edge protection proxy (hSEPP).
  • vSEPP visited security edge protection proxy
  • hSEPP home security edge protection proxy
  • the UE accesses the 5G network through the (R)AN, and the UE communicates with the AMF through the N1 interface (referred to as N1); the (R)AN network element communicates with the AMF through the N2 interface (referred to as N2) ; The (R)AN network element communicates with the UPF through the N3 interface (referred to as N3); the SMF communicates with the UPF through the N4 interface (referred to as N4), and the UPF accesses the DN through the N6 interface (referred to as N6).
  • N1 interface referred to as N1
  • the (R)AN network element communicates with the AMF through the N2 interface (referred to as N2) ;
  • the (R)AN network element communicates with the UPF through the N3 interface (referred to as N3); the SMF communicates with the UPF through the N4 interface (referred to as N4), and the UPF accesses the DN through the N6 interface (referred to as N6).
  • VPLMN control plane functions such as NSSF, AMF, SMF, and PCF shown in Figure 9 use service-based interfaces for interaction.
  • HPLMN's UDM, PCF, NSSF and other control plane functions shown in Figure 9 also use service-based interfaces for interaction.
  • FIG 10 shows a schematic diagram of another network architecture applied in this application, and the network architecture is a roaming network architecture, such as an LBO roaming scenario.
  • the 5G network includes HPLMN and VPLMN.
  • NSSF, UE, (R)AN, SMF in the VPLMN, and UDM and NSMF in the HPLMN can communicate with the AMF in the VPLMN.
  • the SMF in the VPLMN can also be combined with the UPF, PCF (also called vPCF) and HPLMN in the VPLMN.
  • UDM communication within The PCF within the VPLMN can also communicate with the PCF within the HPLMN (also known as hPCF).
  • the UPF in the VPLMN can also communicate with the (R)AN and DN in the VPLMN.
  • Nxx between two network elements indicates the interface between the two network elements.
  • FIG 11 shows a schematic diagram of another network architecture applied in this application.
  • the network architecture is, for example, a service-oriented architecture of a 5G network.
  • the network architecture is a roaming network architecture, such as a home routed (HR) roaming scenario.
  • the 5G network includes HPLMN and VPLMN.
  • HPLMN is the home network of the UE
  • VPLMN is the roaming network of the UE.
  • the VPLMN and HPLMN communicate through vSEPP and hSEPP.
  • services need to be offloaded at the HPLMN, that is, the UE's services need to be routed to the DN of the HPLMN.
  • the UPF in the VPLMN communicates with the UPF in the HPLMN through the N9 interface (referred to as N9).
  • control plane functions such as NSSF, AMF, SMF, or PCF of VPLMN shown in Figure 11 use service-based interfaces for interaction.
  • HPLMN's UDM, PCF, NSSF and other control plane functions shown in Figure 11 also use service-based interfaces for interaction.
  • FIG 12 is a schematic diagram of another network architecture applied in this application, and the network architecture is a roaming network architecture, such as an HR roaming scenario.
  • the 5G network includes HPLMN and VPLMN.
  • NSSF, UE, (R)AN, SMF, PCF in the VPLMN, and AUSF and UDM in the HPLMN can communicate with the AMF in the VPLMN.
  • the SMF in the VPLMN can also communicate with the UPF in the VPLMN and the SMF in the HPLMN.
  • the PCF in the VPLMN can also communicate with the PCF in the HPLMN.
  • the UPF in the VPLMN can also communicate with the (R)AN in the VPLMN and the UPF in the HPLMN.
  • the NSSF in the VPLMN can also communicate with the NSSF in the HPLMN.
  • the SMF in the HPLMN can also communicate with the UPF, UDM and PCF in the HPLMN.
  • the UPF in the HPLMN can also access the DN in the VPLMN.
  • Nxx between two network elements indicates the interface between the two network elements.
  • FIG. 13 is a schematic flow chart of a network slicing communication method 200 of this application. This method 200 can be applied in the above application scenarios, and of course also It can be applied in other communication scenarios and is not limited in this application.
  • the method 200 shown in FIG. 13 may include S210 to S250. Each step in the method 200 is described in detail below with reference to FIG. 13 .
  • the PCF obtains network slice information.
  • the network slice information includes the identification information of the network slice.
  • the network slice information also includes the first time indication information and/or the first location indication information of the network slice, wherein the The first time indication information is used to indicate the available time of the network slice, and the first location indication information is used to indicate the available location area of the network slice.
  • the identification information of the network slice may be the identification information of the network slice (Single Network Slice Selection Assistance Information, S-NSSAI).
  • S-NSSAI Single Network Slice Selection Assistance Information
  • the first time indication information includes a set of start time and end time, or multiple sets of start time and end time.
  • the start time included in the first time indication information is March 6, 2022
  • the end time is March 7, 2022.
  • the first set of start time included in the first time indication information is March 6, 2022
  • the end time is March 7, 2022
  • the second group starts on April 6, 2022, and ends on April 7, 2022.
  • the start time and end time units included in the first time indication information may be days, hours, etc.
  • the first time indication information contains a start time of 00:00:00 on March 6, 2022, and an end time of 2022 March 7, 23:59:59.
  • the start time or end time included in the first time indication information can be an absolute time, or an offset relative to a certain time.
  • the initial time can be set to 00, January 1, 1970: 00:00
  • the offset of the start time is 8 hours (or 28,800 seconds), that is, the start time is 08:00:00 on January 1, 1970
  • the offset of the end time is 10 hours (or 36, 000 seconds), that is, the end time is 10:00:00 on January 1, 1970.
  • the first location indication information may include one or more of the following information: cell identification (list), global RAN node identification list, tracking area identification (list).
  • the cell identifier (list) may specifically be the cell identifier or identifier list of Evolved Universal Terrestrial Radio Access Network (Evolved Universal Terrestrial Radio Access Network, E-UTRAN) E-UTRAN or New Radio (New Radio, NR). This can mean that the network slice can provide services only within the service range of the corresponding cell, RAN node, or tracking area.
  • the tracking area identifier (list) contained in the first location indication information will be appended with the cell identifier (list). In this way, the location where the network slice indicated by the first location indication information is available The area may be at cell granularity, which is smaller than the location area available in prior art network slicing.
  • the network slice information includes the first time indication information
  • PCF can know which network slice can only provide services within a specific time, and the available time of the network slice can be determined through the first time Instructions are reflected.
  • the network slice information includes the first location indication information
  • PCF can know which network slice can only provide services within a specific location range, and the available location range of the network slice can be determined through the first location indication information. to reflect.
  • the PCF may obtain information about the network slice in the following ways.
  • NSMF configures the network slice information on the PCF.
  • the NSMF sends the network slice information to the PCF.
  • the PCF receives the network slice information sent by the NSMF.
  • the NSMF can be a network management (Operation Administration and Maintenance, OAM), or a newly introduced functional network element.
  • OAM Operaation Administration and Maintenance
  • the newly introduced functional network element can be used by operators to deploy network slicing.
  • the NSMF can send the network slice information to the UDR, and then introduce the network slice information into the UDR, and the PCF accesses the UDR to obtain the network slice information.
  • the NSMF sends the network slice information to the PCF through UDM/NSSF and AMF.
  • the NSMF sends the network slice information to the UDM/NSSF.
  • the UDM/NSSF receives and sends the network slice information to the AMF.
  • the AMF receives and sends the network slice information to the PCF.
  • the NSMF can also directly send the network slice information to the AMF.
  • the AMF receives and sends the network slice information to the PCF.
  • the NSMF directly sends the network slice information to the AMF.
  • the AMF forwards the network slice information to the PCF.
  • the OAM directly configures the network slice information locally in the AMF, and the AMF sends the configured network slice information to the PCF.
  • the operator directly configures the network slice information locally in the AMF through OAM, and the AMF sends the configured network slice information to the PCF.
  • the AMF may send the network slice information to the PCF in the following two ways.
  • the AMF when the AMF receives the network slice information, it can actively send the network slice information to the PCF.
  • the PCF can subscribe to the AMF when the AMF obtains the network slice information or the network slice information changes (as indicated by the first time indication information of the network slice).
  • the AMF sends the network slice information to the PCF.
  • the AMF may or may not support the network slice.
  • the AMF does not support the network slice and cannot provide services to the UE.
  • the AMF can query the NSSF, and the NSSF selects an AMF Set or candidate that can serve the UE.
  • AMF list you can refer to method 100 here.
  • the PCF can directly obtain the network slice information from the NSSF.
  • the PCF can request network slice information from the NSSF, and the NSSF receives the request and sends the network slice information to the PCF; or, the AMF can send the identification information of the PCF to the NSSF, and the NSSF The identification information of the PCF sends the information of the network slice to the PCF.
  • the above S210 describes various forms in which the PCF obtains the information of the network slice.
  • the UDM after obtaining the information of the network slice, the UDM can update the Subscribed S-NSSAI of the terminal device.
  • the UDM when the UDM obtains the information of the network slice, the UDM can add the identification information of the network slice to the Subscribed S-NSSAI signed by the UE, indicating that the UE can use the network slice.
  • the available time and/or available location limited by the network slice it can be controlled through other network elements, such as PCF.
  • the UDM can also add the first time indication information and/or the first location indication information of the network slice to the UE Subscribed S-NSSAI, so as to limit the UE to only use the available time indicated by the first time indication information. and/or the available location indicated by the first location indication information uses the network slice.
  • the network side will update the Configured NSSAI stored by the UE according to the UE's Subscribed S-NSSAI, and add the network slice information to the Configured NSSAI stored by the UE.
  • the UE can update the Configured NSSAI stored in the UE according to the Configured NSSAI
  • the network slice information is used to determine whether the UE can use the network slice at the current time and/or current location.
  • the AMF can update the Configured NSSAI of the terminal device. For example, AMF adds the network slice information to the Configured NSSAI stored by the UE, and the UE can determine whether the UE can use the network slice at the current time and/or current location based on the network slice information in the Configured NSSAI.
  • S220 The PCF generates URSP information based on the network slice information.
  • the URSP information includes a first user routing policy rule
  • the first URSP rule includes identification information of the network slice and identification information of an application served by the network slice
  • the first URSP rule also includes the network slice corresponding to A first time window and/or a first position range.
  • the PCF sets the first time window and/or the first location range corresponding to the network slice according to the received network slice information. For example, when the network slice information includes the first time indication information, the PCF may set the first time window to be less than or equal to the possible time window indicated by the first time indication information. use time. When the network slice information includes the first location indication information, the PCF may set the first location range to be less than or equal to the available location area indicated by the first location indication information.
  • the setting of the first time window in the URSP rule takes into account the available time of the network slice, and/or the setting of the first location range in the URSP rule takes into account the network slice. of available location areas.
  • the first URSP rule includes a first routing descriptor RSD including the first time window and/or the first location range.
  • the AMF receives the URSP information.
  • the AMF sends the URSP information to the UE.
  • the UE receives the URSP information.
  • S250 The UE executes the URSP information.
  • the UE determines the network slice according to the first URSP rule in the URSP information. After determining the network slice, the UE can perform the following two operations.
  • the UE has already accessed the network slice at this time. For example, when the UE receives the above-mentioned updated Configure NSSAI, the UE may initiate a message to the network side to access the network slice and successfully access the network slice. This network slice. If the UE has accessed the network slice at this time, the UE can select an appropriate PDU session based on the URSP information. If there is no PDU session that conforms to the first URSP rule, the UE will initiate a PDU session establishment process; if there is a session that conforms to the first URSP rule, the UE can directly use the existing PDU session.
  • the UE has not accessed the network slice at this time, and the UE may initiate a message to the network side to access the network slice.
  • the AMF, the NSSF or the UDM on the network side stores the information of the network slice.
  • the NSSF, the AMF or the UDM uses the first time indication information of the network slice and the /Or the first location indication information determines whether the UE can use the network slice.
  • the AMF determines whether the UE can use the network slice based on the first location indication information of the network slice
  • the AMF can subscribe to (or obtain) the location information of the UE from the RAN based on the network slice.
  • a reporting area (Presence Reporting Area, PRA) can be set according to the first location indication information of the network slice, and the PRA is sent to the RAN, and the RAN reports whether the UE is within the PRA range.
  • PRA Presence Reporting Area
  • the AMF can also use other methods to subscribe to the RAN for the location of the UE.
  • the AMF determines that the UE can currently use the network slice and continues the access process. After the UE accesses the network slice, the UE can select an appropriate PDU session based on the URSP information. When the current location of the UE exceeds the available location area of the network slice, the AMF determines that the UE cannot currently use the network slice.
  • the AMF determines whether the UE can use the network slice based on the first time indication information of the network slice, if the current time exceeds the available time of the network slice, the AMF determines that the UE cannot currently use the network slice.
  • the AMF After the AMF determines that the UE cannot currently use the network slice, it can perform one or more of the following actions:
  • AMF sets the network slice as a rejected network slice.
  • the AMF triggers the SMF to release the PDU session associated with the network slice.
  • the PDU session may be established by the UE when it meets the available location area of the network slice and/or checks the available time.
  • the UE obtains the first time indication information and/or the first location indication of the network slice.
  • Information to determine whether the UE can use the network slice achieving the effect of using the network slice at a specific time and in a specific area. If the UE determines incorrectly, for example, the current time has exceeded the available time indicated by the first time indication information and/or the current location of the UE has exceeded the available location area indicated by the first location indication information, but the UE does determine that it can access the Network slicing, the network side can also perform verification again at this time.
  • the UE determines a suitable PDU session according to the URSP information.
  • the URSP information includes the first time window and/or the first location range.
  • the first time window setting takes into account the available time of the network slice.
  • the first location range The setting takes into account the available location area of the network slice.
  • the PDU session determined by the UE based on the URSP information satisfies the available time and/or available location area of the network slice, thereby achieving the effect of using the network slice at a specific time and in a specific area. As a result, network slicing can be deployed flexibly on the network side.
  • the PCF may also send first session indication information to the UE, where the first session indication information includes the limited usage time of the network slice, and the first session indication information is used to indicate when the limited usage time of the network slice
  • the UE releases the PDU session (or re-evaluates the validity of the URSP rule (or RSD)), and the PDU session is associated with the network slice established by the UE.
  • the limited usage time may be less than or equal to the time indicated by the first time window in the URSP information.
  • the time indicated by the first time window is from ten o'clock to twelve o'clock on a certain day, and the limited usage time is From ten to eleven fifty on a certain day.
  • the limited usage time is less than the time indicated by the first time window in the URSP information.
  • the PCF may also send second session indication information to the UE.
  • the second session indication information is used to indicate that when the UE detects that the routing verification conditions are not met, the UE should immediately release the PDU session.
  • the PDU session is a session established by the UE and associated with the network slice.
  • the first session indication information and the second session indication information may be included in the URSP information, for example, the first session indication information and the second session indication information are included in the RSD in the URSP information. Instructions.
  • the PCF may send the first session indication information, the second session indication information and the URSP information to the UE through one message.
  • the PCF may send the first session indication information, the second session indication information and the URSP information to the UE through different messages.
  • NSSF or AMF can update its allowed network slice list according to the information of the network slice. For example, at the current moment, within the time indicated by the first time indication information of the network slice, NSSF or AMF is within the allowed network slice. Add the identifier of the network slice to the list; if the current time is not within the time indicated by the first time indication information of the network slice, NSSF or AMF deletes the identifier of the network slice from the allowed network slice list.
  • the AMF when the operator deletes the network slice, if the network slice is in the allowed network slice of the UE through the end device configuration update (User equipment configuration update, UCU) process, the AMF should set the network slice to a denied network. Slicing, if the UE does not release the PDU session in time, the AMF triggers the PDU session release. For the process of the AMF triggering the PDU session release, please refer to the steps in method 500.
  • the AMF can also configure the available location area of the network slice (or the NSSF sends the available location area of the network slice to the AMF) and subscribe to the location of the UE.
  • the AMF should trigger Send PDU session release. If the operator wants to wait for the UE to enter the connection management idle state (connection management-IDLE, CM-IDLE) and let the UE release it by itself, no other action is required.
  • the UE may perform such changes based on the implementation. For example, the UE releases the PDU session immediately, or when the UE enters the CM-IDLE state, the UE releases the PDU session.
  • FIG. 13 is a schematic flow chart of a network slicing communication method 300 of the present application.
  • the method 300 can be applied in the above application scenarios, and of course can also be applied in other communication scenarios, which is not limited in this application.
  • the method 300 shown in FIG. 14 may include S310 to S370. Each step in the method 300 will be described in detail below with reference to Figure 14.
  • the AMF obtains network slice information.
  • the network slice information includes the identification information of the network slice.
  • the network slice information also includes the first time indication information and/or the first location indication information of the network slice, where the The first time indication information is used to indicate the available time of the network slice, and the first location indication information is used to indicate the available location area of the network slice.
  • first time indication information and first location indication information of the network slice For the identification information, first time indication information and first location indication information of the network slice, reference can be made to the relevant description of Figure 12 above, which will not be described again here.
  • the AMF may obtain information about the network slice in the following ways.
  • the NSMF sends the network slice information to the AMF.
  • the AMF receives the information of the network slice sent by the NSMF.
  • the OAM configures the network slice information locally in the AMF.
  • the NSMF sends the network slice information to the AMF through the UDM/NSSF.
  • the NSMF sends the network slice information to the UDM/NSSF.
  • the UDM/NSSF receives and sends the network slice information to the AMF.
  • the NSMF configures the network slice information on the UDM/NSSF.
  • the UDM/NSSF sends the network slice information to the AMF.
  • the above S310 describes various forms in which the AMF obtains information about the network slice.
  • the UDM can update the Subscribed S-NSSAI of the terminal device.
  • the specific process of UDM updating the Subscribed S-NSSAI of the terminal device can be referred to the relevant description in Figure 12, and will not be described again here.
  • the AMF generates local data network (Local Area Data Network, LADN) information according to the information of the network slice.
  • LADN Local Area Data Network
  • the AMF generates the LADN information according to the information of the network slice (such as the identification information of the network slice, the first time indication information and/or the first location indication information).
  • the AMF may convert the identification information of the network slice into the name DNN of the local data network.
  • the AMF locally stores multiple network slice identification information and multiple DNN correspondence tables, and the AMF determines the DNN corresponding to the network slice identification information based on the network slice identification information and the correspondence table. For another example, if the correspondence table does not include the identification information of the network slice, AMF can allocate a DNN to the network slice based on the operator's policy.
  • the AMF may determine the second time indication information and/or the second time indication information and/or the first location indication information based on the first time indication information and/or the first location indication information of the network slice.
  • Position indication information The second time indication information is used to indicate the available time of the local data network, and the available time indicated by the second time indication information is less than or equal to the available time indicated by the first time indication information.
  • the second location indication information is used to indicate available cells of the local data network, and the available cells indicated by the second location indication information are smaller than or equal to the available location area indicated by the first location indication information.
  • the LADN information includes DNN.
  • the LADN information includes DNN and second time indication information.
  • the LADN information includes the name DNN of the local data network and the second location indication information.
  • the LADN information includes the name DNN of the local data network, second time indication information, and second location indication information.
  • the available location area may be a cell granularity area or a TA granularity area.
  • the form of the second time indication information may refer to the form of the first time indication information, which will not be described again here.
  • the second time indication information may be the time length of the LADN service.
  • the second location indication information may include a cell identifier (list), that is, the LADN information may be cell granularity, that is, the LADN service area corresponding to the LADN DNN may include cell granularity information.
  • list the LADN information may be cell granularity, that is, the LADN service area corresponding to the LADN DNN may include cell granularity information.
  • the second location indication information may include a tracking area identifier (list) and a cell identifier (list).
  • the network (such as OAM) can also directly configure the above LADN information on AMF (for example, it can be configured based on network slice information; of course, it can also be configured based on other information, such as OAM directly configured on AMF to limit the usage time. and/or cell-granular LADN information in the AMF, etc., which can enable flexible configuration of information on the AMF).
  • OAM can also directly configure the above LADN information on AMF (for example, it can be configured based on network slice information; of course, it can also be configured based on other information, such as OAM directly configured on AMF to limit the usage time. and/or cell-granular LADN information in the AMF, etc., which can enable flexible configuration of information on the AMF).
  • the AMF does not need to generate the LADN information based on the network slice information, but the UDM generates the LADN information based on the network slice information and sends the LADN to the AMF.
  • AMF when AMF obtains the information of the network slice, after converting the identification information of the network slice into a DNN, it can update the UE's subscription information in the UDM (that is, add the DNN to the DNN subscribed by the UE), indicating that the UE can Use this DNN.
  • the second time indication information and/or the second location indication information of the DNN can also be added to the subscription information of the UE, so as to limit the UE to only use the available time and/or indicated by the second time indication information. Or the available location indicated by the second location indication information uses the DNN.
  • the AMF sends the LADN information to the UE.
  • the LADN information includes the name DNN of the local data network.
  • the UE can determine whether the UE can access the DNN based on the configured URSP information or the URSP re-issued by the PCF.
  • the LADN information includes the name DNN of the local data network, and the LADN information also includes the second time indication information and/or the second location indication information.
  • the UE may determine whether the UE can request access to the LADN based on the second time indication information and/or the second location indication information included in the LADN.
  • the UE may determine that the network served by the first application is the DNN according to the configured URSP, and the UE may determine according to the third network information included in the LADN information.
  • Second time indication information and/or the second location indication information determine whether the UE can request access to the DNN.
  • the UE When the current time of the UE exceeds the available time indicated by the second time indication information, the UE does not request access to the local data network; or when the current location of the UE exceeds the available time indicated by the second location indication information When in the location area, the UE does not request access to the local data network.
  • the UE when the UE is not in the LADN available location area, the UE:
  • the UE can also release the existing PDU session of this LADN DNN.
  • the UE may have accessed the LADN DNN before, but the current location of the UE is not in the LADN available location area.
  • the UE when the UE is not available during the LADN availability time, the UE:
  • the UE can also release the existing PDU session of this LADN DNN.
  • the UE may have accessed the LADN DNN before, but the current time exceeds the available time of the LADN DNN.
  • the UE when the UE is in the LADN available location area and/or available time (when the LADN has both available location area and available time, the UE must meet the conditions of being in the LADN available location area and available time at the same time), the UE:
  • the LADN information sent by the AMF to the UE indicates the available time of the LADN DNN.
  • the available time of the LADN DNN is determined based on the available time of the network slice, thus achieving the effect of using the network slice at a specific time.
  • the LADN information sent to the UE by the AMF also indicates the available location area of the LADN DNN.
  • the available location area of the LADN DNN is determined based on the available location area of the network slice, thus achieving the effect of using the network slice in a specific location area.
  • the AMF sends the DNN of the local data network corresponding to the network slice to the PCF.
  • the AMF may also send the second time indication information and/or the second location indication information to the PCF.
  • the AMF can also send the identification information of the network slice corresponding to the LADN DNN to the PCF.
  • S350 The PCF receives the DNN, and the PCF generates URSP information based on the DNN.
  • the PCF generates URSP information according to the DNN, the second time indication information and/or the second location indication information.
  • the URSP information includes a first URSP rule, and the first URSP rule includes identification information of the DNN and the application program served by the DNN; or, the first URSP rule includes the DNN and the application program served by the DNN.
  • the first URSP rule also includes a first time window and/or a first location range corresponding to the DNN.
  • the first time window is less than or equal to the available time indicated by the second time indication information.
  • the first location range is smaller than or equal to the available location area indicated by the second location indication information.
  • the first URSP rule includes a first routing descriptor RSD, and the first RSD includes a first time window and/or a first location range corresponding to the network slice.
  • the PCF can determine the corresponding relationship between the application and the DNN based on the corresponding relationship between the application and the identification information of the network slice and the identification information of the network slice corresponding to the LADN DNN (that is, determine the TD and the corresponding RSD).
  • the PCF sends the URSP information to the UE through the AMF.
  • S370 The UE executes the URSP information.
  • Steps S350 to S370 are optional steps. Because the URSP may have been configured on the UE, and the URSP includes the LADN DNN, at this time, the PCF side does not need to send URSP information. This can reduce signaling overhead and save network resources.
  • the UE can determine the appropriate PDU session based on the URSP information, so as to avoid the end of the DNN. Time or the edge area of the DNN available location, network delays and freezes caused by instability of the DNN network (such as sudden interruptions) can improve user experience.
  • the UE may initiate a message to the network side to access the DNN included in the LADN information; or, when the UE is triggered by the first application, the UE may The configured URSP or the URSP information received through S360 determines that the network served by the first application is the DNN.
  • the UE can initiate a message to the network side to access the DNN, and the first application is an application served by the DNN.
  • the URSP information includes the identification information of the first application.
  • the UE accesses the DNN
  • the UE determines the PDU session mapped by the first application based on the configured URSP or the URSP information received through S360.
  • the UE determines whether the UE can use the network slice based on obtaining the LADN information, thereby achieving the effect of using the network slice in a specific time and in a specific area. If the UE determines incorrectly, for example, the current time has exceeded the available time indicated by the second time indication information and/or the current location of the UE has exceeded the available location area indicated by the second location indication information, but the UE determines that it can access the DNN, at this time the network side such as AMF and SMF can be verified again. At the same time, when the UE determines a suitable PDU session based on the URSP information issued by the PCF, the URSP information includes the first time window and/or the first location range.
  • the first time window setting takes into account the available time of the DNN.
  • the setting of the first location range takes into account the available location area of the DNN.
  • the PDU session determined by the UE based on the URSP information satisfies the available time and/or available location area of the DNN, thereby achieving the goal of using the network slice in a specific time and area. Effect. As a result, network slicing can be deployed flexibly on the network side.
  • method 300 may also include the AMF subscribing the location of the UE to the RAN.
  • the AMF sends the LADN information to the RAN, and the RAN reports the current actual location of the UE according to the second location indication information included in the LADN information or reports whether the UE is within the location range indicated by the second location indication information.
  • the AMF subscribes to the RAN for the location of the UE based on the LADN information.
  • the AMF can subscribe (or obtain) the location information of the UE to the RAN based on the LADN information.
  • the AMF sets a reporting area (Presence Reporting Area, PRA) based on the location indication information of the LADN information, and sends the PRA to the access
  • PRA Presence Reporting Area
  • the network equipment RAN reports whether the UE is within the PRA range, and the AMF determines whether the UE can use the DNN based on the UE's current location.
  • the SMF on the network side will also verify whether the UE can access the DNN when the UE initiates a message to access the DNN.
  • the SMF when the SMF receives a request from the UE to establish a PDU session with the LADN DNN, it can subscribe to the "UE mobility event notification" and/or "UE service time notification" to the AMF, so that the AMF reports to the SMF whether the UE In available location area and/or available time. Specifically include the following situations:
  • the SMF when the SMF is informed by the AMF that the UE exists in the LADN available location area and/or available time as OUT (that is, the UE is not in the LADN available location area and/or available time), the SMF should:
  • the SMF can release the PDU session.
  • the SMF when the SMF is informed by the AMF that the UE exists in the LADN available location area and/or the available time is IN (that is, the UE is in the LADN available location area and/or available time), the SMF should: enable data notification.
  • the SMF receives downlink data or data notifications from the UPF, the network triggering the LADN PDU session triggers the service request process to activate the UP connection.
  • the SMF when the SMF is informed that the presence of the UE in the LADN available location area and/or available time is unknown, the SMF can: enable data notification, SMF subscribes to the UPF for events of received downlink data packets, and the UPF The SMF will be notified when the first downlink data packet (of a certain quality of service flow) is received. In this way, when the SMF receives downlink data or data notifications from the UPF, the network that triggers the LADN PDU session triggers the service request process. to activate the UP connection.
  • the SMF can also obtain (from AMF or UDM) the available location area and/or available time corresponding to the LADN DNN.
  • the AMF or UDM sends the available location area and/or available time corresponding to the LADN DNN to the SMF.
  • the SMF determines whether the UE is in the LADN available location area and/or available time based on the available location area and/or available time corresponding to the LADN DNN and the location of the UE. in particular:
  • the SMF determines that the UE exists in the LADN available location area and/or available time, it is OUT (that is, the UE is not in the LADN service area or service time window), or when the SMF determines that the UE exists in the LADN available location area and/or available time. /or the available time is IN (that is, the UE is in the LADN service area or service time window), or when the SMF determines that the UE is unknown in the LADN available location area and/or available time, the SMF can perform corresponding operations. Refer to the previous description and will not go into details here.
  • the SMF determines whether the UE is in the available location area and/or available time of the LADN based on the indication received from the AMF. Available location areas and/or available times for this LADN. In the case where the DNN is the LAND DNN, if the SMF does not receive the indication sent by the AMF, the SMF considers that the UE is not in the available location area and/or available time of the LADN. If the UE is not in the available location area and/or available time of the LADN, the SMF rejects the session management request corresponding to the LADN.
  • SM session management
  • the PCF may also send first session indication information to the UE, where the first session indication information includes the limited usage time of the network slice, and the first session indication information is used to indicate when the limited usage time of the network slice Upon expiration, the UE releases the PDU session (or re-evaluates the validity of the URSP rule (or RSD)), and the PDU session is associated with the network slice established by the UE.
  • the first session indication information includes the limited usage time of the network slice
  • the first session indication information is used to indicate when the limited usage time of the network slice
  • the UE releases the PDU session (or re-evaluates the validity of the URSP rule (or RSD)), and the PDU session is associated with the network slice established by the UE.
  • the PCF may also send second session indication information to the UE.
  • the second session indication information is used to indicate that when the UE detects that the routing verification conditions are not met, the UE should immediately release the PDU session.
  • the PDU session is a session established by the UE and associated with the network slice.
  • the AMF can determine whether the UE meets the requirements for accessing the network slice based on the network slice information, the usage time of the network slice, and the UE location. If the UE does not meet the requirements, When, for example, the current location of the UE exceeds the available location area of the network slice and/or the current time exceeds the available time of the network slice.
  • the AMF sends timing information to the UE.
  • the timing information is used to instruct the UE to release the PDU session before the time indicated by the timing information expires.
  • the service network of the PDU session is the network slice. For details, please refer to the relevant description of method 500 below.
  • FIG. 15 is a schematic flow chart of a network slicing communication method 400 of this application.
  • the method 400 can be applied in the above application scenarios, and of course can also be applied in other communication scenarios, which is not limited in this application.
  • the method 400 shown in FIG. 15 may include S410 to S480. Each step in the method 400 will be described in detail below with reference to Figure 15.
  • the SMF obtains network slice information.
  • the network slice information includes the identification information of the network slice.
  • the network slice information also includes the first time indication information and/or the first location indication information of the network slice, where, the The first time indication information is used to indicate the available time of the network slice, and the first location indication information is used to indicate the available location area of the network slice.
  • identification information of the network slice may refer to the relevant description in the above method 200, and will not be described again here.
  • the SMF may obtain information about the network slice in the following ways.
  • the NSMF sends the network slice information to the SMF.
  • the SMF receives the information of the network slice sent by the NSMF.
  • the NSMF configures the network slice information on the SMF.
  • the NSMF sends the network slice information to the SMF through UDM/NSSF.
  • the NSMF sends the network slice information to the UDM/NSSF.
  • the UDM/NSSF receives and sends the network slice information to the SMF.
  • the NSMF configures the network slice information on the UDM/NSSF.
  • the UDM/NSSF sends the network slice information to the SMF.
  • the SMF may also send the network slice information to the AMF, so that the network slice information is stored in the AMF.
  • the AMF, the NSSF or the UDM stores the information of the network slice, so that when the UE applies to join the network slice, the NSSF, the AMF or the UDM will be based on the first time of the network slice.
  • the interval indication information and the first location indication information are used to determine whether the UE can use the network slice.
  • the network side determines whether the UE can use the network slice based on the information of the network slice. Refer to the relevant description in S250 in method 200.
  • the SMF determines that the UE does not meet the requirements for accessing the network slice according to the information of the network slice.
  • the SMF determines the release of the PDU session associated with the network slice established by the UE.
  • the fact that the UE does not meet the requirements for accessing the network slice means that the current time of the UE exceeds the available time of the network slice and/or the current location of the UE exceeds the available location area of the network slice.
  • the SMF may determine whether the UE meets the requirements for accessing the network slice based on the UE's location information.
  • the SMF can subscribe to the AMF for the location information of the UE.
  • the SMF can send the identification information of the terminal device to the AMF, instructing the AMF to report the location information of the UE, and the AMF reports to the SMF whether the UE is in the available location area of the network slice.
  • the SMF determines whether the UE meets the requirements for accessing the network slice based on whether the UE is in the available location area of the network slice reported by the AMF.
  • the SMF can also use other methods to subscribe to the AMF for the UE's location.
  • the SMF may determine whether the UE meets the requirements for accessing the network slice based on the current time. If the current time exceeds the available time of the network slice, the SMF determines that the UE does not meet the requirements for accessing the network slice.
  • the SMF After the SMF determines the release of the PDU session, it can trigger the UE to release the PDU session, or it can directly release the PDU session itself, or it can perform both methods.
  • SMF to trigger the UE to release the PDU session please refer to the description of steps S430-S570 below.
  • SMF itself can directly release the PDU session by referring to the description of step S480 below.
  • the SMF sends first timing information to the UE.
  • the first timing information is used to instruct the UE to initiate the release of the PDU session associated with the network slice established by the UE before the time indicated by the first timing information expires. ask.
  • S440 The UE receives the first timing information sent by the SMF.
  • the SMF sends the reason value for denying the UE access to the network slice to the UE.
  • the current time of the UE exceeds the available time of the network slice
  • the reason value for denying the UE access to the network slice is used to indicate that the current time of the UE exceeds the available time of the network slice.
  • step S430 and step S450 may be the same message, and the SMF may simultaneously send the first timing information and the cause value to the UE.
  • the SMF can send the first timing information and/or the reason value through the terminal equipment update (User Equipment Configuration update, UCU) process.
  • the terminal equipment update User Equipment Configuration update, UCU
  • steps S430 and S450 may be performed.
  • S460 The UE receives the reason value sent by the SMF for denying the UE access to the network slice.
  • S470 The UE initiates a request to release the PDU session associated with the network slice established by the UE according to the first timing information and/or the cause value, and releases the PDU session.
  • the UE when the UE only receives the first timing information, the UE times out within the time indicated by the first timing information. A request was previously initiated to release the PDU session associated with the network slice established by the UE, and the PDU session is released.
  • the UE when the UE only receives the reason value, the UE can immediately initiate a request to release the PDU session associated with the network slice established by the UE and release the PDU session; or, the UE can choose to release the PDU session based on its actual situation. Initiate a request to release the PDU session associated with the network slice established by the UE at a certain time, and release the PDU session.
  • the UE receives the first timing information and the cause value at the same time, and the UE initiates a request to release the PDU session associated with the network slice established by the UE before the time indicated by the first timing information times out, and releases the PDU session established by the UE. PDU session.
  • the UE may update the network slice to be an unavailable network slice. For example, the UE deletes the identification information of the network slice from the locally stored identification information list of allowed network slices. The UE re-evaluates the URSP rules related to the corresponding network slice, and the RSD (or URSP) including the corresponding network slice is illegal.
  • the UE receives the configuration information sent by the network side device, and the configuration information includes the identification information of the rejected network slice; the UE removes the identification information of the network slice from the locally stored identification information list of allowed network slices. delete.
  • the UE can initiate a new PDU session, such as re-evaluating the URSP, judging whether it can be associated with a new network slice based on the new URSP, and initiating a new PDU session.
  • a new PDU session such as re-evaluating the URSP, judging whether it can be associated with a new network slice based on the new URSP, and initiating a new PDU session.
  • the SMF does not receive a request sent by the UE to release the PDU session associated with the network slice established by the UE, and the SMF determines the release of the PDU session associated with the network slice established by the UE.
  • the SMF immediately releases the PDU session associated with the network slice established by the UE.
  • the SMF determines the second timing information, and when the time of the second timing information times out, the SMF releases the PDU session associated with the network slice established by the UE.
  • the first timing information may be less than or equal to the second timing information.
  • the first timing information is the time used by the UE to release the PDU session associated with the network slice
  • the second timing information is the time used by the SMF to release the PDU session associated with the network slice.
  • the first timing information and the second timing information may be timers. For example, the first timing information is timed to 1 second, and the second timing information is timed to 2 seconds.
  • the UE releases the PDU session associated with the network slice established by the UE within 1 second, and the SMF releases the PDU session associated with the network slice established by the UE within 2 seconds.
  • the SMF sets the first timing information and the second timing information so that the UE side will not immediately stop the ongoing service, and the first timing information is smaller than the second timing information, leaving more sufficient time for the UE side. , which can improve user experience.
  • step S480 is an optional step.
  • the SMF can actively release the PDU session.
  • the SMF instructs the UE to release the PDU session according to the network slice information, or when the UE fails to successfully release the PDU session, the SMF actively releases the PDU session, thereby realizing flexible deployment of network slices and reaching the network The effect of slicing in a specific area at a specific time.
  • the SMF can set timing information to instruct the UE to release the PDU session or actively release the PDU session. The timing information can prevent the UE's services from being cut off instantly, thus improving the user experience.
  • FIG. 16 is a schematic flow chart of a network slicing communication method 500 of the present application. This method 500 can be applied in the above application scenarios, of course It can also be applied in other communication scenarios, and this application is not limited here.
  • the method 500 shown in FIG. 16 may include S510 to S580. Each step in the method 500 will be described in detail below with reference to Figure 16 .
  • the AMF obtains network slice information.
  • the network slice information includes the identification information of the network slice.
  • the network slice information also includes the first time indication information and/or the second location indication information of the network slice, where the The first time indication information is used to indicate the available time of the network slice, and the first location indication information is used to indicate the available location area of the network slice.
  • identification information of the network slice may refer to the relevant description in the above method 200, and will not be described again here.
  • the AMF may store the network slice information in the NSSF or UDM.
  • the AMF, the NSSF or the UDM stores the network slice information, so that the UE can
  • the NSSF or the AMF or the UDM determines whether the UE can use the network slice based on the first time indication information and the first location indication information of the network slice.
  • the network side determines whether the UE can use the network slice based on the information of the network slice.
  • the AMF determines that the UE does not meet the requirements for accessing the network slice according to the information of the network slice.
  • the AMF determines the release of the PDU session associated with the network slice or the local data network established by the UE.
  • the fact that the UE does not meet the requirements for accessing the network slice means that the current time of the UE exceeds the available time of the network slice and/or the current location of the UE exceeds the available location area of the network slice.
  • the AMF may determine whether the UE meets the requirements for accessing the network slice based on the UE's location information.
  • the AMF can subscribe to (or obtain) the location information of the UE from the RAN based on the information of the network slice, and the AMF can set a reporting area (Presence Reporting Area, PRA) based on the first location indication information of the network slice, and The PRA is sent to the RAN, and the RAN reports the actual location of the UE.
  • PRA Presence Reporting Area
  • the AMF can determine whether the UE meets the requirements for accessing the network slice based on the current actual location information of the UE.
  • the AMF can also use other methods to subscribe to the RAN for the location of the UE.
  • the AMF may determine whether the UE meets the requirements for accessing the network slice based on the current time. If the current time exceeds the available time of the network slice, the AMF determines that the UE does not meet the requirements for accessing the network slice.
  • the AMF After the AMF determines the release of the PDU session, it can trigger the UE to release the PDU session, or it can trigger the SMF to release the PDU session, or both of these methods can be performed.
  • AMF to trigger the UE to release the PDU session please refer to the description of steps S530-S570 below.
  • AMF to trigger SMF to release the PDU session please refer to the description of step S580 below.
  • the AMF sends the first timing information to the UE.
  • the first timing information is used to instruct the UE to initiate the release of the network slice or the local data network established by the UE before the time indicated by the first timing information expires. Request for associated PDU session.
  • S540 The UE receives the first timing information sent by the AMF.
  • the AMF sends the reason value for denying the UE access to the network slice to the UE.
  • the current time of the UE exceeds the available time of the network slice
  • the reason value for denying the UE access to the network slice is used to indicate that the current time of the UE exceeds the available time of the network slice.
  • step S530 and step S550 may be the same message, and the AMF may simultaneously send the first timing information and the cause value to the UE.
  • the AMF can send the first timing information and/or cause value through the UCU process.
  • step S530 and step S550 may be performed.
  • S560 The UE receives the reason value sent by the AMF for denying the UE access to the network slice.
  • S570 The UE initiates a request to release the PDU session associated with the network slice established by the UE according to the first timing information and/or the cause value, and releases the PDU session.
  • S580 The AMF does not receive a request sent by the UE to release the PDU session associated with the network slice established by the UE, and the AMF determines the release of the PDU session associated with the network slice established by the UE.
  • the AMF immediately sends a request to release the PDU session associated with the network slice established by the UE to the SMF.
  • the AMF determines the second timing information, and when the time of the second timing information times out, the AMF sends a request to the SMF to release the PDU session associated with the network slice established by the UE.
  • the first timing information may be less than or equal to the second timing information.
  • the first timing information is the time used by the UE to release the PDU session associated with the network slice
  • the second timing information is the time used by the AMF to release the PDU session associated with the network slice.
  • the first timing information and the second timing information may be timers. For example, the first timing information is timed to 1 second, and the second timing information is timed to 2 seconds.
  • the UE releases the PDU session associated with the network slice established by the UE within 1 second, and the AMF sends a request to release the PDU session associated with the network slice established by the UE to the SMF within 2 seconds.
  • the AMF sets the first timing information and the second timing information so that the UE side will not stop the ongoing service immediately, and the first timing information is smaller than the second timing information, leaving more sufficient time for the UE side. , which can improve user experience.
  • step S580 is an optional step.
  • the AMF may send a request to the SMF to release the PDU session associated with the network slice established by the UE.
  • the AMF instructs the UE to release the PDU session according to the network slice information, or when the UE fails to successfully release the PDU session, the AMF can send a release message to the SMF that is associated with the network slice established by the UE. PDU session request, thereby realizing flexible deployment of network slices and achieving the effect of using network slices at specific times and in specific areas.
  • the SMF can set timing information to instruct the UE to release the PDU session or actively release the PDU session. The timing information can prevent the UE's services from being cut off instantly, thus improving the user experience.
  • FIG. 17 is a schematic flow chart of a network slicing communication method 600 of the present application. This method 600 can be applied in the above application scenarios, and of course can also be applied in other communication scenarios, which is not limited in this application.
  • the method 600 shown in FIG. 17 may include S610 to S690. Each step in the method 600 will be described in detail below with reference to Figure 17.
  • AMF obtains network slice information.
  • the network slice information includes the S-NSSAI of the network slice.
  • the network slice information also includes the first time indication information and/or the first location indication information of the network slice, where, The first time indication information is used to indicate the available time of the network slice, and the first location indication information is used to indicate the available location area of the network slice.
  • identification information of the network slice may refer to the relevant description in the above method 200, and will not be described again here.
  • the specific process for the AMF to obtain the information of the network slice may refer to the description of the above step S310, which will not be described again here.
  • the AMF, NSSF or UDM may store the network slice information.
  • the AMF, NSSF or UDM stores the network slice information, so that the UE
  • the NSSF or the AMF or the UDM determines whether the UE can use the network slice based on the first time indication information and the first location indication information of the network slice.
  • the network side determines whether the UE can use the network slice based on the information of the network slice. Refer to the relevant description in S250 in method 200.
  • the AMF sends the network slice information to the access network device RAN.
  • the AMF may send the network slice information to the RAN through a registration acceptance message.
  • the AMF may send the network slice information to the RAN through a UE update configuration message.
  • the RAN receives the network slice information sent by the AMF.
  • S640 The RAN broadcasts the supported identification information of the network slice in the corresponding cell.
  • the RAN broadcasts the supported identification information and the first time indication information of the network slice within the time indicated by the first time indication information of the network slice.
  • This first time indication information When the UE receives the identification information of the network slice and the first time indication information, if the PDU session associated with the network slice is ongoing on the UE, the UE may, according to the first time indication information, indicate at the first time Before the time indicated by the information times out, initiate a request to release the PDU session.
  • the RAN broadcasts the supported identification information and the first location indication information of the network slice in the cell indicated by the first location indication information of the network slice. the first location indication information.
  • the UE may move to the UE according to the first location indication information.
  • the UE initiates a request to release the PDU session.
  • the RAN is within the time indicated by the first time indication information of the network slice.
  • the information of the supported network slice is broadcast in the cell indicated by the location indication information.
  • the UE may use the first time indication information according to the and the first location indication information, initiate a request to release the PDU session, such as before the time indicated by the first time indication information times out and/or when the UE moves outside the location area indicated by the first location indication information. A request to release this PDU session.
  • the RAN When the RAN receives information about the network slice that includes the first location indication information, the RAN broadcasts the supported information about the network slice in the cell indicated by the first location indication information of the network slice and does not broadcast it in other cells. It can save signaling overhead and save network resources.
  • the RAN determines the release of the PDU session associated with the network slice established by the UE.
  • the fact that the UE does not meet the requirements for accessing the network slice means that the current time of the UE exceeds the available time of the network slice and/or the current location of the UE exceeds the available location area of the network slice.
  • the RAN After the RAN determines the release of the PDU session, it can trigger the UE to release the PDU session, or it can trigger the SMF to release the PDU session, or both methods can be performed.
  • the RAN to trigger the UE to release the PDU session please refer to the description of steps S660-S670 below.
  • the RAN to trigger SMF to release the PDU session please refer to the description of steps S680 and S690 below.
  • the RAN sends first timing information, where the first timing information is used to instruct the terminal device to initiate a release request for the protocol data unit session associated with the network slice before the time indicated by the first timing information times out.
  • the RAN may send the first timing information to the UE in a broadcast or unicast manner.
  • the RAN may broadcast the first timing information, and each UE that receives the broadcast first timing information may initiate protocol data associated with the network slice before the time indicated by the first timing information expires. Release request for unit session.
  • the RAN may unicast the first timing information to the UE,
  • the UE that receives the timing information may initiate a release request for the protocol data unit session associated with the network slice before the time indicated by the first timing information expires.
  • the RAN can also broadcast messages according to the instructions of AMF and SMF.
  • the indication information may be sent to the RAN.
  • the indication information includes the first timing information, and the indication information is used to instruct the RAN.
  • the first timing message is broadcast, the RAN receives the indication information, and the RAN broadcasts a message, and the broadcast message includes the first timing information.
  • the RAN sends a reason value for denying the UE access to the network slice to the UE.
  • the reason value for denying the UE access to the network slice can be referred to the previous description in Figure 12, and will not be described again this time.
  • the RAN may simultaneously send the first timing information and the cause value to the UE.
  • the RAN sends the first timing information to the UE, and the RAN may only perform one of the steps by sending the cause value to the UE.
  • the way in which the RAN sends the cause value to the UE may refer to the way in which the RAN sends the first timing information to the UE, which will not be described again here.
  • the UE When the UE receives the first timing information and/or the cause value, it initiates a request to release the PDU session associated with the network slice established by the UE, and releases the PDU session.
  • the UE initiates a request to release the PDU session associated with the network slice established by the UE. Release The process of this PDU session can be referred to the description in Figure 12 and will not be described again this time.
  • the RAN determines that the UE does not meet the requirements for accessing the network slice based on the network slice information, the RAN determines to release the PDU session associated with the network slice established by the UE.
  • the fact that the UE does not meet the requirements for accessing the network slice means that the current time of the UE exceeds the available time of the network slice and/or the current location of the UE exceeds the available location area of the network slice.
  • the RAN determines that the UE does not meet the requirements for accessing the network slice, the RAN immediately notifies the AMF that the network slice is unavailable in the tracking area, and the tracking area is a cell covered by the RAN.
  • the RAN determines the second timing information, and when the time of the second timing information times out, the RAN notifies the AMF that the network slice is unavailable in the tracking area, and the tracking area is a cell covered by the RAN.
  • the RAN sends an interface configuration update (NG configuration update) message to the AMF.
  • the interface configuration update message is used to notify the AMF that the current network slice is unavailable in the current TA.
  • the current TA is a cell covered by the RAN.
  • the first timing information may be less than or equal to the second timing information.
  • the first timing information is the time used by the UE to release the PDU session associated with the network slice.
  • the second timing information is the time used by the RAN to release the PDU session associated with the network slice.
  • the first timing information and the third timing information are used by the RAN to release the PDU session associated with the network slice.
  • the second timing information may be a timer, for example, the first timing information is timed to 1 second, and the second timing information is timed to 2 seconds.
  • the UE releases the PDU session associated with the network slice established by the UE within 1 second, and the RAN notifies the AMF that the network slice is unavailable in the tracking area within 2 seconds.
  • the RAN sets the first timing information and the second timing information so that the UE side will not immediately stop the ongoing service, and the first timing information is smaller than the second timing information, leaving more sufficient time for the UE side. , which can improve user experience.
  • the AMF receives the interface configuration update message and triggers a request to release the PDU session associated with the network slice established by the UE.
  • step S680 and step S690 are optional steps.
  • the RAN may actively initiate the release of the PDU session.
  • the RAN In the method 600, the RAN generates first timing information according to the network slice information.
  • the first timing information is used to instruct the UE to release the PDU session before the time expires indicated by the first timing information, or the RAN releases the PDU session before the time expires indicated by the first timing information.
  • the RAN sends an interface configuration update message to the AMF.
  • the interface configuration update message is used to notify the AMF that the network slice is unavailable in the tracking area TA, thereby realizing flexible deployment of network slices and reaching the network The effect of slicing in a specific area at a specific time.
  • timing information can prevent UE services from being cut off instantly, thereby improving user experience.
  • Method 400, method 500 and method 600 can be used in conjunction with method 200.
  • Method 200 describes how the UE accesses the network slice.
  • Method 400, method 500 and method 600 describe how when the information of the network slice is updated, the connected How does a UE entering a network slice release a PDU session whose serving network is the network slice?
  • the SMF is vSMF
  • the AMF is vAMF
  • the PCF is hPCF.
  • the NSMF It can be vNSMF or hNSMF.
  • the SMF is vSMF
  • the AMF is vAMF
  • the PCF is hPCF.
  • the NSMF may be vNSMF or hNSMF.
  • network slicing information can also be configured on the RAN (which can be configured by the operator), and the RAN reports it to the AMF through the N2 interface (for example, when the link is established), and the AMF further reports it to the NSSF or other network elements.
  • This implementation can be applied in the above-mentioned method 200, method 300, method 400, method 500 and method 600.
  • the above-mentioned information about the network slice may also include service information, where the service information is used to indicate a service, and the service network for the service is the network slice.
  • the business information may include one or more of the following information:
  • the network slice can also be expressed as: the services in the slice can only be used in the corresponding location or time window.
  • Figure 18 shows a schematic block diagram of the communication device 700 of the present application.
  • the communication device 700 may be a terminal device, or may be a chip or circuit, such as a chip or circuit that may be provided in the terminal device.
  • the communication device 700 may be an access network device, or may be a chip or circuit, such as a chip or circuit that may be provided in the access network device.
  • the communication device 700 can be a core network device (such as a policy control function network element, a session management function network element, an access and mobility management function network element), or a chip or a circuit, for example, it can be provided in the core Chips or circuits of network equipment.
  • a core network device such as a policy control function network element, a session management function network element, an access and mobility management function network element
  • a chip or a circuit for example, it can be provided in the core Chips or circuits of network equipment.
  • the communication device 700 may include a processing unit 710 (ie, an example of a processor) and a transceiver unit 730.
  • the processing unit 710 may also be called a determining unit.
  • the transceiver unit 730 may include a receiving unit and a sending unit.
  • the transceiver unit 730 may be implemented by a transceiver or a transceiver-related circuit or an interface circuit.
  • the communication device may further include a storage unit 720.
  • the storage unit 720 is used to store instructions.
  • the storage unit can also be used to store data or information.
  • the storage unit 720 may be implemented by a memory.
  • the processing unit 710 is used to execute instructions stored in the storage unit 720, so that the communication device 700 implements the steps performed by the policy control function network element in the above method.
  • the processing unit 710 may be used to call the data of the storage unit 720, so that the communication device 700 implements the steps performed by the policy control function network element in the above method.
  • the processing unit 710 is used to execute instructions stored in the storage unit 720, so that the communication device 700 implements the steps performed by the access and mobility management function network element in the above method.
  • the processing unit 710 can be used to call the data of the storage unit 720, so that the communication device 700 implements the steps performed by the access and mobility management function network element in the above method.
  • the processing unit 710 is used to execute instructions stored in the storage unit 720, so that the communication device 700 implements the steps performed by the session management function network element in the above method.
  • the processing unit 710 may be used to call the data of the storage unit 720, so that the communication device 700 implements the steps performed by the session management function network element in the above method.
  • the processing unit 710 is used to execute instructions stored in the storage unit 720, so that the communication device 700 implements the steps performed by the terminal device in the above method.
  • the processing unit 710 can be used to call the data of the storage unit 720, so that the communication device 700 implements the steps performed by the terminal device in the above method.
  • the processing unit 710 is used to execute instructions stored in the storage unit 720, so that the communication device 700 implements the steps performed by the access network device in the above method.
  • the processing unit 710 may be used to call the data of the storage unit 720, so that the communication device 700 implements the steps performed by the access network device in the above method.
  • the processing unit 710, the storage unit 720, and the transceiver unit 730 can communicate with each other through internal connection paths to transmit control and/or data signals.
  • the storage unit 720 is used to store a computer program, and the processing unit 710 can be used to call and run the computer program from the storage unit 720 to control the transceiver unit 730 to receive signals and/or send signals to complete the above method. Steps for session management function network element, policy control function network element, access and mobility management function network element, terminal equipment or access network equipment.
  • the storage unit 720 may be integrated in the processing unit 710 , or may be provided separately from the processing unit 710 .
  • the transceiver unit 730 includes a receiver and a transmitter.
  • the receiver and transmitter may be the same or different physical entities. When they are the same physical entity, they can be collectively called transceivers.
  • the transceiver unit 730 may be a sending unit or a transmitter when sending information, and the transceiver unit 730 may be a receiving unit or a transmitter when receiving information.
  • Receiver the transceiver unit can be a transceiver, and the transceiver, transmitter or receiver can be a radio frequency circuit.
  • the communication device includes a storage unit, the storage unit is used to store computer instructions, and the processor is communicatively connected to the memory, The processor executes computer instructions stored in the memory, so that the communication device can execute any one of methods 300 to 700.
  • the processor can be a general central processing unit (CPU), a microprocessor, or an application specific integrated circuit (Application Specific Integrated Circuit, ASIC).
  • the transceiver unit 730 includes an input interface and an output interface.
  • the transceiver unit 730 may be an input and/or output interface, a pin or a circuit. wait.
  • the processing unit 710 can execute computer execution instructions stored in the storage unit, so that the communication device can execute method 200, method 500 or method 600.
  • the storage unit is a storage unit within the chip, such as a register, cache, etc.
  • the storage unit may also be a storage unit located outside the chip in the terminal, such as a read-only memory (Read Only Memory). Only Memory (ROM) or other types of static storage devices that can store static information and instructions, Random Access Memory (Random Access Memory, RAM), etc.
  • Read Only Memory Read Only Memory
  • RAM Random Access Memory
  • the function of the transceiver unit 730 may be implemented by a transceiver circuit or a dedicated chip for transceiver.
  • the processing unit 710 may be implemented by a dedicated processing chip, a processing circuit, a processing unit or a general-purpose chip.
  • a general-purpose computer to implement the communication equipment (such as terminal equipment, core network equipment, or access network equipment) provided in the embodiments of the present application. That is, the program codes that implement the functions of the processing unit 710 and the transceiver unit 730 are stored in the storage unit 720 , and the general processing unit implements the functions of the processing unit 710 and the transceiver unit 730 by executing the codes in the storage unit 720 .
  • the communication device 700 may be a policy control function network element, or a chip or circuit provided in the policy control function network element.
  • the transceiver unit 730 is used to obtain network slice information, where the network slice information includes an identifier of the network slice. Information, the information of the network slice also includes first time indication information and/or first location indication information of the network slice, wherein the first time indication information is used to indicate the available time of the network slice, and the first location indication The information is used to indicate the available location area of the network slice.
  • the processing unit 710 is used to generate user routing policy information according to the information of the network slice; the transceiver unit 730 is also used to provide the terminal device with access and mobility management function network elements. Send the user routing policy information.
  • the user routing policy information includes first user routing policy rules, and the first user routing policy rules include identification information of the network slice and identification information of the application program served by the network slice.
  • the first user routing policy rule also includes a first time window and/or a first location range corresponding to the network slice.
  • the first time window is less than or equal to the available time indicated by the first time indication information.
  • the first location The range is smaller than or equal to the available location area indicated by the first location indication information.
  • the transceiver unit 730 is specifically configured to: receive information about the network slice from the network slice management function network element; or, receive information about the network slice from the access and mobility management function network element; Or, receive information for that network slice from the unified data repository.
  • each module or unit in the communication device 700 can be used to perform each action or processing process performed by the policy control function network element in the above method.
  • each module or unit in the communication device 700 can be used to perform each action or processing process performed by the policy control function network element in the above method.
  • the communication device 700 may be an access and mobility management function network element, or a chip or circuit provided in the access and mobility management function network element.
  • the transceiver unit 730 is used to obtain network slice information.
  • the network slice information includes network The identification information of the network slice, the information of the network slice also includes the first time indication information and/or the first location indication information of the network slice, wherein the first time indication information is used to indicate the available time of the network slice, and the third time indication information is used to indicate the available time of the network slice.
  • a location indication information is used to indicate the available location area of the network slice; the processing unit 710 is used to process the information of the network slice.
  • the transceiver unit 730 is specifically configured to send the network slice information to the policy control function network element.
  • the processing unit 710 is specifically configured to: generate local data network information according to the information of the network slice, where the local data network information includes the name of the local data network, and the local data network information also includes a second time indication. information and/or second location indication information, the second time indication information is used to indicate the available time of the local data network, the second location indication information is used to indicate the available cells of the local data network, wherein the second time The available time indicated by the indication information is less than or equal to the available time indicated by the first time indication information, and the available cell indicated by the second location indication information is less than or equal to the available location area indicated by the first location indication information;
  • the transceiver unit is also used to send the local data network information to the terminal device.
  • the transceiver unit 730 is further configured to: send the name of the local data network corresponding to the network slice to the policy control function network element.
  • the transceiver unit 730 is further configured to: send the second time indication information and/or the second location indication information to the policy control function network element.
  • the processing unit 710 is specifically configured to: determine according to the information of the network slice that the terminal device does not meet the requirements for accessing the network slice, and the transceiver unit 730 is specifically configured to: determine based on the information of the network slice If the terminal device does not meet the requirements for accessing the network slice, the first timing information is sent to the terminal device. The first timing information is used to instruct the terminal device to release the terminal before the time indicated by the first timing information expires.
  • the protocol data unit session associated with the network slice or the local data network established by the device, where the terminal device does not meet the requirements for accessing the network slice means that the current time of the terminal device exceeds the available time of the network slice and /Or the current location of the terminal device exceeds the available location area of the network slice.
  • the processing unit 710 is specifically configured to: determine according to the information of the network slice that the terminal device does not meet the requirements for accessing the network slice
  • the transceiver unit 730 is specifically configured to: determine based on the information of the network slice
  • a reason value for refusing the terminal device to access the network slice is sent to the terminal device, where, when the terminal device does not meet the requirements for accessing the network slice, The current time of the terminal device exceeds the available time of the network slice, and the reason value for denying the terminal device access to the network slice is used to indicate that the current time of the terminal device exceeds the available time of the network slice; or, when the terminal device does not meet the The requirement for accessing the network slice is that the current location of the terminal device exceeds the available location area of the network slice, and the reason value for denying the terminal device access to the network slice is used to indicate that the current location of the terminal device exceeds the available location area of the network slice. location area.
  • the processing unit 710 is specifically configured to: determine the second timing information when it is determined according to the information of the network slice that the terminal device does not meet the requirements for accessing the network slice, wherein the terminal device does not Complying with the requirements for accessing the network slice means that the current time of the terminal device exceeds the available time of the network slice and/or the current location of the terminal device exceeds the available location area of the network slice; the transceiver unit 730 is also used to: When the time of the second timing information times out, a request to release the protocol data unit session established by the terminal device and associated with the network slice or the local data network is sent to the session management function network element.
  • the first timing information is less than or equal to the second timing information.
  • the transceiver unit 730 is specifically configured to: receive information about the network slice from the network slice management function network element; or, receive information about the network slice from the unified data management network element; or, receive information from the network slice management function network element. Information about the network slice of the network slice selection function network element.
  • each module or unit in the communication device 700 can be used to perform each action performed by the access and mobility management function network element in the above method or The detailed description of the processing process is omitted here to avoid redundancy.
  • the communication device 700 may be a session management function network element, or a chip or circuit provided in the session management function network element.
  • the transceiver unit 730 is used to obtain network slice information.
  • the network slice information includes network slice identification information.
  • the information of the network slice also includes first time indication information and/or first location indication information of the network slice, where the first time indication information is used to indicate the available time of the network slice, and the first location indication information used to indicate the available location area of the network slice;
  • the processing unit 710 is used to determine, according to the information of the network slice, that the terminal device does not meet the requirements for accessing the network slice, determine the network slice established by the terminal device and related to the network slice Release of the associated protocol data unit session, where the terminal device does not meet the requirements for accessing the network slice means that the current time of the terminal device exceeds the available time of the network slice and/or the current location of the terminal device exceeds the network slice The available location area for slices.
  • the transceiver unit 730 is further configured to: send first timing information to the terminal device, where the first timing information is used to instruct the terminal device to release the terminal before the time indicated by the first timing information expires.
  • the processing unit 710 is also configured to: determine that the terminal device does not meet the requirements for accessing the network slice according to the information of the network slice; the transceiver unit is also configured to: When the network slice information determines that the terminal device does not meet the requirements for accessing the network slice, a reason value for denying the terminal device access to the network slice is sent to the terminal device, where, when the terminal device does not meet the requirements for accessing the network slice, The requirement of network slicing is that the current time of the terminal device exceeds the available time of the network slice, and the reason value for denying the terminal device access to the network slice is used to indicate that the current time of the terminal device exceeds the available time of the network slice; or, When the terminal device does not meet the requirements for accessing the network slice because the current location of the terminal device exceeds the available location area of the network slice, the reason value for denying the terminal device access to the network slice is used to indicate the current location of the terminal device. Exceeds the available location area for this network slice.
  • the processing unit 710 is also configured to: determine second timing information when the information of the network slice determines that the terminal device does not meet the requirements for accessing the network slice, wherein the terminal device does not meet the requirements for accessing the network slice. Complying with the requirements for accessing the network slice means that the current time of the terminal device exceeds the available time of the network slice and/or the current location of the terminal device exceeds the available location area of the network slice; when the time of the second timing information exceeds From time to time, the session management function network element releases the protocol data unit session associated with the network slice established by the terminal device.
  • the first timing information is less than or equal to the second timing information.
  • the transceiver unit 730 is specifically configured to: receive information about the network slice from the network slice management function network element; or, receive information about the network slice from the unified data management network element; or, receive information from the network slice management function network element. Information about the network slice of the network slice selection function network element.
  • each module or unit in the communication device 700 can be used to perform each action or processing process performed by the session management function network element in the above method.
  • each module or unit in the communication device 700 can be used to perform each action or processing process performed by the session management function network element in the above method.
  • the communication device 700 may be an access network device, or a chip or circuit provided in the access network device.
  • the transceiver unit 730 is used to receive network slice information sent by the access and mobility management function network element.
  • the network slice information Including identification information of the network slice, the information of the network slice also includes first time indication information and/or first location indication information of the network slice, wherein the first time indication information is used to indicate the available time of the network slice, The first location indication information is used to indicate the available location area of the network slice; the processing unit 710 is used to configure the access network device according to the network slice.
  • the slice information determines that the terminal device does not meet the requirements for accessing the network slice, it is determined to release the protocol data unit session associated with the network slice established by the terminal device, wherein the terminal device does not meet the requirements for accessing the network.
  • the requirement of a slice means that the current time of the terminal device exceeds the available time of the network slice and/or the current location of the terminal device exceeds the available location area of the network slice.
  • the access network device determines to release the protocol data unit session associated with the network slice established by the terminal device, including: the access network device instructs the terminal device through a broadcast message or a unicast message. Initiate release of the protocol data unit session associated with the network slice before a time indicated by the first timing information expires.
  • the access network device determines to release the protocol data unit session associated with the network slice established by the terminal device, including: the access network device sends a message to the terminal device denying the terminal device access to the network slice.
  • the reason value of the network slice When the terminal device does not meet the requirements for accessing the network slice, the current time of the terminal device exceeds the available time of the network slice. The reason value for denying the terminal device access to the network slice is used.
  • the access network device determines to release the protocol data unit session associated with the network slice established by the terminal device, which further includes: when the access network device times out in the second timing information, the access network device The access network device notifies the access and mobility management function network element that the network slice is unavailable in the tracking area, and the tracking area is a cell covered by the access network device.
  • each module or unit in the communication device 700 can be used to perform each action or processing process performed by the access network device in the above method.
  • each module or unit in the communication device 700 can be used to perform each action or processing process performed by the access network device in the above method.
  • its detailed description is omitted.
  • the communication device 700 may be a terminal device, or a chip or circuit provided in the terminal device.
  • the transceiver unit 730 is used to receive the first timing information sent by the network device, and the first timing information is used to instruct the terminal device in the first step.
  • the processing unit 710 is configured to release the protocol data unit session associated with the network slice within the time indicated by the first timing information. The protocol data unit session is released before the time expires.
  • the transceiver unit 730 receives the first timing information through a broadcast message or a unicast message.
  • the transceiver unit 730 receives the first timing information through a configuration update message of the terminal device.
  • the terminal device receives a reason value sent by the network device for denying the terminal device access to the network slice, wherein when the terminal device does not meet the requirements for accessing the network slice, the terminal device is The current time of the terminal device exceeds the available time of the network slice, and the reason value for denying the terminal device access to the network slice is used to indicate that the current time of the terminal device exceeds the available time of the network slice; or, When the terminal device does not meet the requirements for accessing the network slice because the current location of the terminal device exceeds the available location area of the network slice, the reason value for denying the terminal device access to the network slice is used to indicate The current location of the terminal device exceeds the available location area of the network slice.
  • the terminal device when the network device is an access network device, the terminal device transmits a broadcast message or Unicast messages receive the cause value.
  • the terminal device when the network device is a core network device, the terminal device receives the cause value through a configuration update message of the terminal device.
  • the processing unit 710 is further configured to delete the identification information of the network slice from a locally stored list of allowed network slice selection auxiliary information.
  • each module or unit in the communication device 700 can be used to perform each action or process performed by the terminal device in the above method.
  • the details are omitted. illustrate.
  • the communication device 700 may be a terminal device, or a chip or circuit provided in the terminal device.
  • the transceiver unit 730 is used to receive local data network information sent by the access and mobility management function network element, where the local data network information includes local data network information.
  • the local data network information also includes first time indication information and/or first location indication information. The first time indication information is used to indicate the available time of the local data network.
  • the first location indication information is used To indicate the available location area of the local data network, the available location area indicated by the first location indication information is at cell granularity; the processing unit 710 is configured to determine whether the terminal device can access the local data according to the local data network information. network.
  • the processing unit 710 is specifically configured to: when the current time of the terminal device exceeds the available time indicated by the first time indication information, the terminal device does not access the local data network; or, when When the current location of the terminal device exceeds the available location area indicated by the first location indication information, the terminal device does not access the local data network.
  • each module or unit in the communication device 700 can be used to perform each action or process performed by the terminal device in the above method.
  • the details are omitted. illustrate.
  • the processing unit 710 can be implemented by a processor
  • the storage unit 720 can be implemented by a memory
  • the transceiver unit 730 can be implemented by a transceiver, as shown in Figure 19.
  • Figure 19 is a communication device provided by this application. Schematic diagram of the structure of 800.
  • Communication device 800 may include a processor 810, a memory 820, and a transceiver 830.
  • the processor 810, the memory 820 and the transceiver 830 are respectively used to implement the functions of the processing unit 710, the storage unit 720 and the transceiver unit 730.
  • Figure 20 is a schematic structural diagram of a terminal device 900 provided by this application.
  • the terminal device 900 can perform the actions performed by the terminal device in the above method embodiment.
  • FIG. 20 shows only the main components of the terminal device.
  • the terminal device 900 includes a processor, a memory, a control circuit, an antenna, and an input and output device.
  • the processor is mainly used to process communication protocols and communication data, and to control the entire terminal device, execute software programs, and process data of the software programs. For example, it is used to support the terminal device to execute the above instruction method of the transmission precoding matrix in the embodiment. the action described.
  • the memory is mainly used to store software programs and data, such as the codebook described in the above embodiment.
  • the control circuit is mainly used for conversion of baseband signals and radio frequency signals and processing of radio frequency signals.
  • the control circuit and the antenna together can also be called a transceiver, which is mainly used to send and receive radio frequency signals in the form of electromagnetic waves.
  • enter Output devices such as touch screens, display screens, keyboards, etc., are mainly used to receive data input by users and output data to users.
  • the processor can read the software program in the storage unit, interpret and execute the instructions of the software program, and process the data of the software program.
  • the processor performs baseband processing on the data to be sent, and then outputs the baseband signal to the radio frequency circuit.
  • the radio frequency circuit performs radio frequency processing on the baseband signal and then sends the radio frequency signal out in the form of electromagnetic waves through the antenna.
  • the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor.
  • the processor converts the baseband signal into data and processes the data.
  • FIG. 20 only shows one memory and processor. In an actual terminal device, there may be multiple processors and memories.
  • the memory may also be called a storage medium or a storage device, which is not limited in the embodiments of the present application.
  • the processor may include a baseband processor and a central processing unit.
  • the baseband processor is mainly used to process communication protocols and communication data.
  • the central processing unit is mainly used to control the entire terminal device, execute software programs, and process software programs. data.
  • the processor in Figure 20 integrates the functions of the baseband processor and the central processor.
  • the baseband processor and the central processor can also be independent processors and are interconnected through technologies such as buses.
  • the terminal device may include multiple baseband processors to adapt to different network standards, the terminal device may include multiple central processors to enhance its processing capabilities, and various components of the terminal device may be connected through various buses.
  • the baseband processor can also be expressed as a baseband processing circuit or a baseband processing chip.
  • the central processing unit can also be expressed as a central processing circuit or a central processing chip.
  • the function of processing communication protocols and communication data can be built into the processor, or can be stored in the storage unit in the form of a software program, and the processor executes the software program to implement the baseband processing function.
  • the antenna and the control circuit with the transceiver function can be regarded as the transceiver unit 910 of the terminal device 900
  • the processor with the processing function can be regarded as the processing unit 920 of the terminal device 900
  • the terminal device 900 includes a transceiver unit 910 and a processing unit 920.
  • the transceiver unit may also be called a transceiver, a transceiver, a transceiver device, etc.
  • the devices used to implement the receiving function in the transceiver unit 910 can be regarded as a receiving unit, and the devices used in the transceiver unit 910 used to implement the transmitting function can be regarded as a sending unit, that is, the transceiving unit includes a receiving unit and a sending unit.
  • the receiving unit may also be called a receiver, a receiver, a receiving circuit, etc.
  • the sending unit may be called a transmitter, a transmitter, a transmitting circuit, etc.
  • FIG 21 is a schematic structural diagram of an access network device 1000 provided by this application, which can be used to implement the functions of the access network device in the above method.
  • the access network equipment 1000 includes one or more radio frequency units, such as a remote radio unit (RRU) 1010 and one or more baseband units (BBU) (also called a digital unit, DU)1020.
  • RRU 1010 may be called a transceiver unit, a transceiver, a transceiver circuit, a transceiver, etc., and may include at least one antenna 1011 and a radio frequency unit 1012.
  • the RRU 1010 part is mainly used for transmitting and receiving radio frequency signals and converting radio frequency signals and baseband signals, for example, for sending the signaling messages described in the above embodiment to the terminal equipment.
  • the BBU1120 part is mainly used for baseband processing, base station control, etc.
  • the RRU 1110 and the BBU 1120 may be physically installed together or physically separated, that is, a distributed base station.
  • the BBU1020 is the control center of the base station, which can also be called a processing unit. It is mainly used to complete baseband processing functions, such as channel coding, multiplexing, modulation, spread spectrum, etc.
  • the BBU (processing unit) 1020 can be used to control
  • the access network device executes the operation process of the access network device in the above method embodiment.
  • the BBU 1020 may be composed of one or more single boards. Multiple single boards may jointly support a wireless access network of a single access standard (such as an LTE system or a 5G system), or may support different access networks respectively. standard wireless access network.
  • the BBU 1020 also includes a memory 1021 and a processor 1022.
  • the memory 1021 is used to store necessary instructions and data.
  • the memory 1021 stores the codebook etc. in the above embodiment.
  • the processor 1022 is used to control the base station to perform necessary actions, for example, to control the base station to perform the operation process of the network equipment in the above method embodiment.
  • the memory 1021 and processor 1022 may serve one or more single boards. In other words, the memory and processor can be set independently on each board. It is also possible for multiple boards to share the same memory and processor. In addition, necessary circuits can also be installed on each board.
  • SoC system-on-chip
  • all or part of the functions of part 1020 and part 1010 can be implemented by SoC technology, for example, by a base station function chip Implementation, the base station function chip integrates processor, memory, antenna interface and other devices.
  • the program of the base station related functions is stored in the memory, and the processor executes the program to realize the related functions of the base station.
  • the base station function chip can also read the memory external to the chip to implement related functions of the base station.
  • the processor may be a central processing unit (CPU).
  • the processor may also be other general-purpose processors, digital signal processors (DSP), or dedicated integrated processors.
  • Circuit application specific integrated circuit, ASIC
  • off-the-shelf programmable gate array field programmable gate array, FPGA
  • a general-purpose processor may be a microprocessor or the processor may be any conventional processor, etc.
  • non-volatile memory may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
  • non-volatile memory can be read-only memory (ROM), programmable ROM (PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically removable memory. Erase electrically programmable read-only memory (EPROM, EEPROM) or flash memory.
  • Volatile memory can be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • DRAM dynamic random access memory
  • RAM synchronous dynamic random access memory
  • SDRAM synchronous dynamic random access memory
  • double data rate SDRAM double data rate SDRAM
  • DDR SDRAM double data rate SDRAM
  • enhanced SDRAM enhanced synchronous dynamic random access memory
  • SLDRAM synchronous connection dynamic random access memory access memory
  • direct rambus RAM direct rambus RAM, DR RAM
  • the above embodiments may be implemented in whole or in part by software, hardware, firmware, or any other combination.
  • the above-described embodiments may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions or computer programs. When the computer instructions or computer programs are loaded or executed on the computer, the processes or functions described in the embodiments of the present application are generated in whole or in part.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may To be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center via a wireline (e.g.
  • the computer-readable storage medium may be any available medium that a computer can access, or a data storage device such as a server or a data center that contains one or more sets of available media.
  • the usable media may be magnetic media (eg, floppy disk, hard disk, tape), optical media (eg, DVD), or semiconductor media.
  • the semiconductor medium may be a solid state drive.
  • Embodiments of the present application also provide a computer-readable medium for storing computer program code.
  • the computer program includes instructions for executing the network slicing method of the present application in the above-mentioned methods 200 to 600.
  • the readable medium can be read-only memory (ROM) or random access memory (RAM), which is not limited in this application.
  • the present application also provides a computer program product.
  • the computer program product includes instructions. When the instructions are executed, the core network equipment, terminal equipment, and access network equipment can execute core steps corresponding to the above methods. network equipment, terminal equipment, access network equipment or terminal equipment.
  • Embodiments of the present application also provide a communication system, which includes the above-mentioned communication device, access network equipment, and terminal equipment provided by the present application.
  • the communication system can complete a network slicing communication method provided by the present application.
  • An embodiment of the present application also provides a system chip.
  • the system chip includes: a processing unit and a communication unit.
  • the processing unit may be, for example, a processor.
  • the communication unit may be, for example, an input/output interface, a pin, or a circuit.
  • the processing unit can execute computer instructions to cause the chip in the communication device to execute the network slicing communication method provided by the present application.
  • the computer instructions are stored in a storage unit.
  • the storage unit is a storage unit within the chip, such as a register, cache, etc.
  • the storage unit may also be a storage unit located outside the chip within the terminal, such as ROM or other storage unit that can store static information and instructions.
  • the processor mentioned in any of the above places may be a CPU, a microprocessor, an ASIC, or one or more integrated circuits for executing programs that control the communication method of the network slice.
  • the disclosed systems, devices and methods can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of units is only a logical function division. In actual implementation, there may be other division methods, such as multiple units or groups.
  • the software can be combined or integrated into another system, or some features can be omitted, or not implemented.
  • the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application can be integrated into one processing unit, each unit can exist physically alone, or two or more units can be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in various embodiments of this application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé de communication basé sur un découpage en tranches du réseau, un appareil de communication, un dispositif de réseau d'accès, et un dispositif terminal. Le procédé comprend les étapes suivantes : un élément de réseau à fonction de commande de politique obtient des informations d'une tranche de réseau, les informations de la tranche de réseau comprenant des informations d'identification de la tranche de réseau, et comprenant en outre des premières informations d'indication de temps et/ou des premières informations d'indication de position de la tranche de réseau, les premières informations d'indication de temps étant utilisées pour indiquer un temps disponible pour la tranche de réseau, et les premières informations d'indication de position étant utilisées pour indiquer une zone de position disponible pour la tranche de réseau; l'élément de réseau à fonction de commande de politique génère des informations de politique de sélection d'itinéraire d'utilisateur selon les informations de la tranche de réseau; et envoie les informations de politique de sélection d'itinéraire d'utilisateur à un dispositif terminal au moyen d'un élément de réseau à fonction de gestion d'accès et de mobilité.
PCT/CN2023/080118 2022-05-06 2023-03-07 Procédé de communication basé sur un découpage en tranches du réseau, appareil de communication, dispositif de réseau d'accès, et dispositif terminal WO2023213132A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210488329.1A CN117062179A (zh) 2022-05-06 2022-05-06 一种网络切片的通信方法、通信装置、接入网设备和终端设备
CN202210488329.1 2022-05-06

Publications (1)

Publication Number Publication Date
WO2023213132A1 true WO2023213132A1 (fr) 2023-11-09

Family

ID=88646203

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/080118 WO2023213132A1 (fr) 2022-05-06 2023-03-07 Procédé de communication basé sur un découpage en tranches du réseau, appareil de communication, dispositif de réseau d'accès, et dispositif terminal

Country Status (2)

Country Link
CN (1) CN117062179A (fr)
WO (1) WO2023213132A1 (fr)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109286567A (zh) * 2018-11-23 2019-01-29 腾讯科技(深圳)有限公司 路由选择策略的获取方法、装置及设备
US20190259092A1 (en) * 2018-02-16 2019-08-22 Netsia, Inc. System and method for a ran exchange
CN111885519A (zh) * 2019-05-03 2020-11-03 三星电子株式会社 根据无线通信系统中的时间或服务区域对终端进行会话配置的方法和装置
CN112189361A (zh) * 2019-05-06 2021-01-05 联发科技股份有限公司 增强型ursp规则选择
WO2021069056A1 (fr) * 2019-10-07 2021-04-15 Huawei Technologies Co., Ltd. Première entité de réseau et seconde entité de réseau pour appliquer une politique de tranche de réseau
WO2022008179A2 (fr) * 2020-07-07 2022-01-13 Nokia Technologies Oy Commande d'opérateur de comportement d'équipement utilisateur lors de l'enregistrement et de la fin de l'enregistrement avec des tranches de réseau et l'établissement et la libération de sessions de pdu dans un système de communication

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190259092A1 (en) * 2018-02-16 2019-08-22 Netsia, Inc. System and method for a ran exchange
CN109286567A (zh) * 2018-11-23 2019-01-29 腾讯科技(深圳)有限公司 路由选择策略的获取方法、装置及设备
CN111885519A (zh) * 2019-05-03 2020-11-03 三星电子株式会社 根据无线通信系统中的时间或服务区域对终端进行会话配置的方法和装置
CN112189361A (zh) * 2019-05-06 2021-01-05 联发科技股份有限公司 增强型ursp规则选择
WO2021069056A1 (fr) * 2019-10-07 2021-04-15 Huawei Technologies Co., Ltd. Première entité de réseau et seconde entité de réseau pour appliquer une politique de tranche de réseau
WO2022008179A2 (fr) * 2020-07-07 2022-01-13 Nokia Technologies Oy Commande d'opérateur de comportement d'équipement utilisateur lors de l'enregistrement et de la fin de l'enregistrement avec des tranches de réseau et l'établissement et la libération de sessions de pdu dans un système de communication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI, HISILICON: "Domain descriptors in URSP", 3GPP DRAFT; S2-2000250, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. Incheon, South Korea; 20200113 - 20200117, 7 January 2020 (2020-01-07), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051842338 *

Also Published As

Publication number Publication date
CN117062179A (zh) 2023-11-14

Similar Documents

Publication Publication Date Title
EP2896264B1 (fr) Déclenchement de communication inter-dispositif dans des systèmes de communication sans fil
JP2022525167A (ja) 動的ネットワーク能力構成
WO2019196643A1 (fr) Procédé de communication et appareil de communication
JP7324285B2 (ja) サービス承認の方法、端末機器及びネットワーク機器
US20210007172A1 (en) Capability exposure method, related apparatus, and system
JP2023520274A (ja) 無線通信方法、端末機器及びネットワーク機器
EP4354770A1 (fr) Procédé et appareil de transmission de données
AU2021308253A1 (en) Communication method and communication apparatus
CN113747605B (zh) 通信方法和通信装置
JP2020061732A (ja) ハンドオーバーでのアップリンクベアラーバインディング
WO2023213132A1 (fr) Procédé de communication basé sur un découpage en tranches du réseau, appareil de communication, dispositif de réseau d'accès, et dispositif terminal
WO2022155853A1 (fr) Procédé de communication sans fil, appareil de communication et système de communication
CN117793688A (zh) 针对af会话的外部参数提供的新方法
WO2021088061A1 (fr) Procédé et appareil de communication
CN114642079B (zh) 通信方法及装置
WO2023160199A1 (fr) Procédé et appareil d'accès à un réseau de communication
WO2023197772A1 (fr) Procédé de communication et appareil associé
WO2023142717A1 (fr) Procédé et appareil pour déterminer une politique de sélection d'itinéraire d'équipement utilisateur
WO2023185561A1 (fr) Procédé de communication et appareil de communication
WO2021138784A1 (fr) Procédé, appareil et système d'accès au réseau
WO2022016338A1 (fr) Procédé et appareil de communication
WO2024001897A1 (fr) Procédé et appareil de communication
WO2023185572A1 (fr) Procédé et appareil de communication
WO2024078313A1 (fr) Procédé d'authentification et d'autorisation et appareil de communication
WO2023185621A1 (fr) Procédé de communication et appareil de communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23799121

Country of ref document: EP

Kind code of ref document: A1