WO2023248884A1 - Équipement utilisateur (ue) - Google Patents

Équipement utilisateur (ue) Download PDF

Info

Publication number
WO2023248884A1
WO2023248884A1 PCT/JP2023/022032 JP2023022032W WO2023248884A1 WO 2023248884 A1 WO2023248884 A1 WO 2023248884A1 JP 2023022032 W JP2023022032 W JP 2023022032W WO 2023248884 A1 WO2023248884 A1 WO 2023248884A1
Authority
WO
WIPO (PCT)
Prior art keywords
nssai
rejected
snpn
mapped
plmn
Prior art date
Application number
PCT/JP2023/022032
Other languages
English (en)
Japanese (ja)
Inventor
陽子 久下
Original Assignee
シャープ株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by シャープ株式会社 filed Critical シャープ株式会社
Publication of WO2023248884A1 publication Critical patent/WO2023248884A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/08Load balancing or load distribution
    • H04W28/084Load balancing or load distribution among network function virtualisation [NFV] entities; among edge computing entities, e.g. multi-access edge computing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/18Management of setup rejection or failure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities

Definitions

  • the present invention relates to UE (User Equipment).
  • 3GPP 3rd Generation Partnership Project
  • SAE System Architecture Evolution
  • LTE Long Term Evolution
  • 5G next-generation communication technology and system architecture for the next-generation mobile communication system
  • 5G System 5th Generation
  • Non-Patent Document 1 With 5GS, we identify technical issues in connecting a wide variety of terminals to cellular networks and create specifications for solutions.
  • 5G Core Network 5G Core Network
  • a network slice which are logical networks that provide specific network functions and specific network characteristics for specific service types or specific groups, have been defined.
  • a network slice may be a logical network provided for a terminal with a low-latency function, or a logical network provided for a sensor terminal used in IoT (Internet of Things). good.
  • the network sets the maximum number of UEs that can be registered for each network slice and/or the maximum number of PDU sessions that can be established for each network slice, and performs registration and/or PDU sessions based on these.
  • NSAC technology that controls establishment is being considered.
  • NSAC is also applied during roaming, and during roaming, admission control (based on the maximum number of UEs and/or the maximum number of PDU sessions) is performed for both the S-NSSAI of the roaming destination PLMN and the S-NSSAI of the HPLMN. NSAC) is being considered.
  • the present invention was made in view of the above circumstances, and it is an object of the present invention to provide a method for realizing functions for NS in 5GS.
  • the UE User Equipment of one embodiment of the present invention includes a control unit, a transmitting/receiving unit, and a storage unit, and the transmitting/receiving unit transmits information from the core network to the current PLMN (Public land mobile network) or SNPN (Stand-alone a non-public network), a first mapped S-NSSAI, first identification information, and a rejection reason value;
  • the control unit stores the S-NSSAI of the current PLMN or SNPN and the first mapped S-NSSAI, and stores the first mapped S-NSSAI and the first identification information.
  • the first backoff timer started for the first mapped S-NSSAI expires based on a second mapped S-NSSAI associated with the S-NSSAI of the current PLMN or SNPN and/or the S-NSSAI of the current PLMN or SNPN; If the second backoff timer is not running, the S-NSSAI of the current PLMN or SNPN is deleted from the first rejected NSSAI of the storage unit.
  • a UE (User Equipment) is a UE (User Equipment) comprising a control unit, a transmitting/receiving unit, and a storage unit; receives the current (Public land mobile network) or SNPN (Stand-alone non-public network) S-NSSAI, first mapped S-NSSAI, and rejection reason value from the core network, and the control unit: Based on the rejection reason value, the S-NSSAI of the current PLMN or SNPN is stored as a first rejected NSSAI in the storage unit, and the first mapped S-NSSAI is stored in the first rejected NSSAI in the storage unit.
  • the current Public land mobile network
  • SNPN Tin-alone non-public network
  • registration procedures based on NSAC are appropriately controlled during roaming in 5GS PLMNs and SNPNs.
  • FIG. 1 is a diagram illustrating an outline of a mobile communication system (EPS/5GS).
  • FIG. 2 is a diagram illustrating the detailed configuration of a mobile communication system (EPS/5GS).
  • FIG. 2 is a diagram illustrating the device configuration of a UE.
  • FIG. 2 is a diagram illustrating the configuration of an access network device (gNB) in 5GS.
  • FIG. 2 is a diagram illustrating the configuration of a core network device (AMF/SMF/UPF) in 5GS. It is a figure explaining a registration procedure.
  • FIG. 3 is a diagram illustrating a procedure for changing/updating UE settings.
  • FIG. 1 is a diagram for explaining the outline of a mobile communication system 1 used in each embodiment
  • FIG. 2 is a diagram for explaining the detailed configuration of the mobile communication system 1.
  • the mobile communication system 1 is composed of UE_A10, access network_A80, core network_A90, PDN (Packet Data Network)_A5, access network_B120, core network_B190, and DN (Data Network)_A6. It is stated that
  • symbols may be omitted for these devices and functions, such as UE, access network_A, core network_A, PDN, access network_B, core network_B, DN, etc. .
  • Figure 2 also shows devices and functions such as UE_A10, E-UTRAN80, MME40, SGW35, PGW-U30, PGW-C32, PCRF60, HSS50, 5G AN120, AMF140, UPF130, SMF132, PCF160, UDM150, N3IWF170, NSACF180, etc. , and interfaces that connect these devices and functions to each other are described.
  • devices and functions such as UE_A10, E-UTRAN80, MME40, SGW35, PGW-U30, PGW-C32, PCRF60, HSS50, 5G AN120, AMF140, UPF130, SMF132, PCF160, UDM150, N3IWF170, NSACF180, etc. , and interfaces that connect these devices and functions to each other are described.
  • the EPS Evolved Packet System
  • 4G system is configured to include an access network_A and a core network_A, but may also include a UE and/or a PDN.
  • 5GS which is a 5G system, includes a UE, an access network_B, and a core network_B, but may further include a DN.
  • a UE is a device capable of connecting to network services via a 3GPP access (also referred to as a 3GPP access network, 3GPP AN) and/or a non-3GPP access (also referred to as a non-3GPP access network, non-3GPP AN).
  • the UE may be a terminal device capable of wireless communication such as a mobile phone or a smartphone, and may be a terminal device connectable to both EPS and 5GS.
  • the UE may include a UICC (Universal Integrated Circuit Card) or an eUICC (Embedded UICC). Note that the UE may be expressed as a user device or a terminal device.
  • the access network_A corresponds to E-UTRAN (Evolved Universal Terrestrial Radio Access Network) and/or a wireless LAN access network.
  • E-UTRAN Evolved Universal Terrestrial Radio Access Network
  • eNB evolved Node B
  • eNB45 may be written with the symbol omitted, such as eNB.
  • each eNB is connected to each other by, for example, an X2 interface.
  • one or more access points are arranged in the wireless LAN access network.
  • access network_B corresponds to 5G access network (5G AN).
  • 5G AN consists of NG-RAN (NG Radio Access Network) and/or non-3GPP access network.
  • NG-RAN NG Radio Access Network
  • gNBs NR NodeBs
  • gNB 122 may be written with the symbol omitted, such as eNB.
  • gNB is a node that provides an NR (New Radio) user plane and a control plane to UE, and is a node that connects to 5GCN via an NG interface (including an N2 interface or an N3 interface).
  • gNB is a base station device newly designed for 5GS, and has different functions from the base station device (eNB) used in EPS, which is a 4G system. Furthermore, when there are multiple gNBs, each gNB is connected to each other by, for example, an Xn interface.
  • the non-3GPP access network may be an untrusted non-3GPP access network or a trusted non-3GPP access network.
  • the untrusted non-3GPP access network may be a non-3GPP access network that does not perform security management within the access network, such as a public wireless LAN.
  • the trusted non-3GPP access network may be an access network defined by 3GPP, and may include a TNAP (trusted non-3GPP access point) and a TNGF (trusted non-3GPP gateway function).
  • NG-RAN means a radio access network that connects to 5GCN, and NR or E-UTRA or both may be used.
  • NG-RAN may be E-UTRAN.
  • E-UTRAN and NG-RAN may be referred to as 3GPP access.
  • a wireless LAN access network or non-3GPP AN is sometimes referred to as non-3GPP access.
  • the nodes arranged in the access network_B may also be collectively referred to as NG-RAN nodes.
  • access network_A and/or access network_B and/or devices included in access network_A and/or devices included in access network_B are referred to as access networks or access network devices. It is sometimes called.
  • core network_A corresponds to EPC (Evolved Packet Core).
  • EPC includes, for example, MME (Mobility Management Entity), SGW (Serving Gateway), PGW (Packet Data Network Gateway)-U, PGW-C, PCRF (Policy and Charging Rules Function), HSS (Home Subscriber Server), etc. Placed.
  • MME Mobility Management Entity
  • SGW Serving Gateway
  • PGW Packet Data Network Gateway
  • PGW-C Packet Data Network Gateway
  • PCRF Policy and Charging Rules Function
  • HSS Home Subscriber Server
  • Core Network_B corresponds to 5GCN (5G Core Network).
  • AMF Access and Mobility Management Function
  • UPF User Plane Function
  • SMF Session Management Function
  • PCF Policy Control Function
  • UDM Unified Data Management
  • 5GCN may be expressed as 5GC.
  • core network_A and/or core network_B devices included in core network_A, and/or devices included in core network_B are referred to as core networks, core network devices, or core networks. Sometimes referred to as an internal device.
  • a core network is a mobile communication carrier (Mobile It may be an IP mobile communication network operated by a Mobile Virtual Network Operator (MNO), a core network for a mobile communication carrier that operates and manages a mobile communication system, ), or a core network for virtual mobile communication carriers or virtual mobile communication service providers such as MVNE (Mobile Virtual Network Enabler).
  • MNO Mobile Virtual Network Operator
  • MVNE Mobile Virtual Network Enabler
  • the core network (core network_A and/or core network_B) and the access network (access network_A and/or access network_B) may be different for each mobile communication carrier.
  • the PDN may be a DN (Data Network) that provides communication services to the UE.
  • the DN may be configured as a packet data service network or may be configured for each service.
  • the PDN may include connected communication terminals. Therefore, connecting to the PDN may mean connecting to a communication terminal or server device located in the PDN.
  • transmitting and receiving user data to and from the PDN may mean transmitting and receiving user data to and from a communication terminal and a server device located in the PDN.
  • a PDN may be expressed as a DN, or a DN may be expressed as a PDN.
  • access network_A, core network_A, PDN, access network_B, core network_B, DN, and/or one or more devices included therein are referred to as networks or network devices. It is sometimes called.
  • the network and/or network equipment sends and receives messages and/or performs procedures in the access network_A, core network_A, PDN, access network_B, core network_B, DN. means that at least some of them and/or one or more of the devices included therein send and receive messages and/or perform procedures.
  • the UE can connect to the access network. Furthermore, the UE can connect to the core network via the access network. Furthermore, the UE can connect to the PDN or DN via the access network and core network. That is, the UE can transmit and receive (communicate) user data with the PDN or DN. When transmitting and receiving user data, not only IP (Internet Protocol) communication but also non-IP communication may be used.
  • IP Internet Protocol
  • IP communication refers to data communication using IP, and data is sent and received using IP packets.
  • An IP packet consists of an IP header and a payload part.
  • the payload portion may include data transmitted and received by devices and functions included in EPS and devices and functions included in 5GS.
  • non-IP communication refers to data communication that does not use IP, and data is sent and received using a format different from the IP packet structure.
  • non-IP communication may be data communication realized by sending and receiving application data to which no IP header is attached, or it may be data communication realized by sending and receiving application data to which no IP header is attached, or the UE may attach another header such as a Mac header or an Ethernet (registered trademark) frame header.
  • User data to be transmitted and received may also be transmitted and received.
  • devices not shown in FIG. 2 may be configured in the access network_A, core network_A, access network_B, core network_B, PDN_A, and DN_A.
  • Core Network_A and/or Core Network_B and/or PDN_A and/or DN_A include an AUSF (Authentication Server Function) or an AAA (Authentication, authorization, and accounting) server (AAA-S). Good too. AAA servers may be located outside the core network.
  • AUSF Authentication Server Function
  • AAA Authentication, authorization, and accounting server
  • the AUSF is a core network device equipped with an authentication function for 3GPP access and non-3GPP access. Specifically, it is a network function unit that receives an authentication request for 3GPP access and/or non-3GPP access from the UE and executes an authentication procedure.
  • the AAA server is a device that connects directly or indirectly to the AUSF via another network device and has authentication, authorization, and billing functions.
  • the AAA server may be a network device within the core network.
  • the AAA server may not be included in core network_A and/or core network_B, but may be included in PLMN and/or SNPN. That is, the AAA server may be a core network device or a device outside the core network.
  • the AAA server may be a server device in a PLMN and/or SNPN managed by a 3rd Party.
  • NW it may mean the core network, the access network, or both.
  • each device/function is shown one by one to simplify the diagram, but the mobile communication system 1 may include a plurality of similar devices/functions.
  • the mobile communication system 1 includes multiple UE_A10, E-UTRAN80, MME40, SGW35, PGW-U30, PGW-C32, PCRF60, HSS50, 5G AN120, AMF140, UPF130, SMF132, PCF160, and/or UDM150. Devices and functions such as the above may be configured.
  • each device may be configured as physical hardware, logical (virtual) hardware configured on general-purpose hardware, or configured as software. It's okay to be. Further, at least some (including all) of the functions of each device may be configured as physical hardware, logical hardware, or software.
  • each storage unit (storage unit_A340, storage unit_A440, storage unit_B540, storage unit_A640, storage unit_B740) in each device/function appearing below is, for example, a semiconductor memory, an SSD ( It consists of HDD (Hard Disk Drive), etc.
  • each storage unit stores not only the information originally set from the shipping stage, but also devices and functions other than the own device and functions (for example, UE, and/or access network device, and/or core network device, and/or or PDN and/or DN), various information sent and received can be stored. Further, each storage unit can store identification information, control information, flags, parameters, etc. included in control messages transmitted and received during various communication procedures described below.
  • each storage unit may store this information for each UE.
  • each storage unit can store control messages and user data sent and received between devices and functions included in 5GS and/or EPS. can. At this time, not only what was sent and received via the N26 interface, but also what was sent and received without going through the N26 interface can be stored.
  • the UE is composed of a control unit_A300, an antenna 310, a transmitting/receiving unit_A320, and a storage unit_A340.
  • the control unit_A300, the transmitting/receiving unit_A320, and the storage unit_A340 are connected via a bus.
  • the transmitting/receiving unit_A320 is connected to the antenna 310.
  • the control unit_A300 is a functional unit that controls the operations and functions of the entire UE.
  • the control unit_A300 implements various processes in the UE by reading and executing various programs stored in the storage unit_A340 as necessary.
  • the transmitting/receiving unit_A320 is a functional unit for wirelessly communicating with a base station device (eNB or gNB) in the access network via an antenna. That is, the UE can transmit and receive user data and/or control information between the access network device and/or the core network device and/or the PDN and/or the DN using the transmitter/receiver_A320. can.
  • a base station device eNB or gNB
  • the UE can communicate with the base station apparatus (eNB) in the E-UTRAN via the LTE-Uu interface by using the transmitting/receiving unit_A320.
  • the UE can communicate with a base station device (gNB) within the 5G AN by using the transceiver unit_A320.
  • the UE can transmit and receive NAS (Non-Access-Stratum) messages with the AMF via the N1 interface.
  • NAS Non-Access-Stratum
  • the storage unit_A340 is a functional unit for storing programs, user data, control information, etc. necessary for each operation of the UE.
  • gNB is composed of a control unit_B500, an antenna 510, a network connection unit_B520, a transmitting/receiving unit_B530, and a storage unit_B540.
  • the control unit_B500, network connection unit_B520, transmission/reception unit_B530, and storage unit_B540 are connected via a bus.
  • the transmitting/receiving unit_B530 is connected to the antenna 510.
  • the control unit_B500 is a functional unit that controls the operations and functions of the entire gNB.
  • the control unit_B500 implements various processes in the gNB by reading and executing various programs stored in the storage unit_B540 as necessary.
  • the network connection unit_B520 is a functional unit for gNB to communicate with AMF and/or UPF. That is, the gNB can send and receive user data and/or control information to and from the AMF and/or UPF using the network connection unit_B520.
  • the transmitting/receiving unit_B530 is a functional unit for wirelessly communicating with the UE via the antenna 510. That is, the gNB can transmit and receive user data and/or control information to and from the UE using the transmitting and receiving unit_B530.
  • gNB in 5G AN can communicate with AMF via N2 interface by using network connection part_B520, and UPF via N3 interface. can communicate with. Furthermore, the gNB can communicate with the UE by using the transmitting/receiving unit_B530.
  • the storage unit_B540 is a functional unit for storing programs, user data, control information, etc. necessary for each operation of the gNB.
  • AMF is composed of a control unit_B700, a network connection unit_B720, and a storage unit_B740.
  • the control unit_B700, network connection unit_B720, and storage unit_B740 are connected via a bus.
  • AMF may be a node that handles the control plane.
  • the control unit_B700 is a functional unit that controls the operations and functions of the entire AMF.
  • the control unit_B700 implements various processes in the AMF by reading and executing various programs stored in the storage unit_B740 as necessary.
  • Network connection part_B720 is a functional part for AMF to connect with base station equipment (gNB) in 5G AN, and/or SMF, and/or PCF, and/or UDM, and/or SCEF, and NSACF. be.
  • AMF uses network connection part_B720 to connect to base station equipment (gNB) and/or SMF and/or PCF and/or UDM and/or SCEF and/or NSACF in 5G AN.
  • User data and/or control information can be sent and received between the devices.
  • AMF in 5GCN can communicate with gNB via N2 interface by using network connection_A620, and communicate with UDM via N8 interface. It can communicate with the SMF through the N11 interface, it can communicate with the PCF through the N15 interface, and it can communicate with the NSACF through the N80 interface.
  • the AMF can send and receive NAS messages to and from the UE via the N1 interface.
  • the N1 interface is logical, in reality, communication between the UE and AMF takes place via 5G AN.
  • the AMF supports the N26 interface, it can communicate with the MME via the N26 interface by using the network connection unit_A620.
  • the storage unit_B740 is a functional unit for storing programs, user data, control information, etc. necessary for each operation of the AMF.
  • AMF has a function to exchange control messages with the RAN using the N2 interface, a function to exchange NAS messages with the UE using the N1 interface, a function to perform encryption and integrity protection of NAS messages, and registration management.
  • RM Registration management
  • CM Connection management
  • SEA Security Anchor Functionality
  • SCM Security Context Management
  • N3IWF Non-3GPP Interworking Function
  • the RM state may be synchronized between the UE and the AMF.
  • the RM state includes a non-registered state (RM-DEREGISTERED state) and a registered state (RM-REGISTERED state).
  • RM-DEREGISTERED state the UE is not registered in the network, and the UE context in the AMF does not have valid location information or routing information for the UE, so the AMF cannot reach the UE.
  • the RM-REGISTERED state the UE is registered with the network, so the UE can receive services that require registration with the network.
  • the RM state may be expressed as a 5GMM state.
  • the RM-DEREGISTERED state may be expressed as a 5GMM-DEREGISTERED state
  • the RM-REGISTERED state may be expressed as a 5GMM-REGISTERED state.
  • 5GMM-REGISTERED may be a state where each device has established a 5GMM context or a state where a PDU session context has been established. Note that when each device is 5GMM-REGISTERED, UE_A10 may start transmitting and receiving user data and control messages, or may respond to paging. Furthermore, if each device is 5GMM-REGISTERED, the UE_A10 may execute a registration procedure other than the registration procedure for initial registration and/or a service request procedure.
  • 5GMM-DEREGISTERED may be a state where each device has not established a 5GMM context, a state where the location information of UE_A10 is not known to the network, or a state where the network has reached UE_A10. It may be in a state where it is impossible. Note that when each device is 5GMM-DEREGISTERED, UE_A10 may start a registration procedure, or may establish a 5GMM context by executing the registration procedure.
  • the CM state may be synchronized between the UE and the AMF.
  • the CM states include a disconnected state (CM-IDLE state) and a connected state (CM-CONNECTED state).
  • CM-IDLE state the UE is in the RM-REGISTERED state but does not have a NAS signaling connection established with the AMF via the N1 interface.
  • N2 connection N2 connection
  • N3 connection N3 interface connection
  • the CM-CONNECTED state it has a NAS signaling connection established with AMF via the N1 interface.
  • the CM-CONNECTED state the UE may have an N2 interface connection and/or an N3 interface connection.
  • the CM status in 3GPP access and the CM status in non-3GPP access may be managed separately.
  • the CM state in 3GPP access may include a disconnected state in 3GPP access (CM-IDLE state over 3GPP access) and a connected state in 3GPP access (CM-CONNECTED state over 3GPP access).
  • the CM states in non-3GPP access include the disconnected state (CM-IDLE state over non-3GPP access) and the connected state (CM-CONNECTED state over non-3GPP access) in non-3GPP access. ) is fine.
  • the disconnected state may be expressed as an idle mode
  • the connected state mode may be expressed as a connected mode.
  • the CM state may also be expressed as 5GMM mode.
  • the disconnected state may be expressed as 5GMM-IDLE mode
  • the connected state may be expressed as 5GMM-CONNECTED mode.
  • the disconnected state in 3GPP access may be expressed as 5GMM-IDLE mode over 3GPP access
  • the connected state in 3GPP access may be expressed as 5GMM-IDLE mode over 3GPP access. CONNECTED mode over 3GPP access).
  • the disconnected state in non-3GPP access may be expressed as 5GMM disconnected mode (5GMM-IDLE mode over non-3GPP access) in non-3GPP access
  • the connected state in non-3GPP access is - It may be expressed as 5GMM-CONNECTED mode over non-3GPP access.
  • the 5GMM unconnected mode may be expressed as an idle mode
  • the 5GMM connected mode may be expressed as a connected mode.
  • one or more AMFs may be placed within the core network_B.
  • the AMF may be an NF that manages one or more NSIs (Network Slice Instances).
  • the AMF may be a shared CP function (CCNF; Common CPNF (Control Plane Network Function)) shared among multiple NSIs.
  • CCNF Common CPNF (Control Plane Network Function)
  • N3IWF is a device and/or function placed between non-3GPP access and 5GCN when UE connects to 5GS via non-3GPP access.
  • NSACF Network Slice Admission Control Function
  • NSACF has a function to monitor and control the number of registered UEs for each network slice.
  • NSACF has a function to notify each connected AMF of the network slice status.
  • the state of the network slice may be information indicating, for example, whether the maximum number of UEs that can be registered for each network slice has been reached.
  • the SMF is composed of a control unit_B700, a network connection unit_B720, and a storage unit_B740.
  • the control unit_B700, network connection unit_B720, and storage unit_B740 are connected via a bus.
  • the SMF may be a node that handles the control plane.
  • the control unit_B700 is a functional unit that controls the operations and functions of the entire SMF.
  • the control unit_B700 implements various processes in the SMF by reading and executing various programs stored in the storage unit_B740 as necessary.
  • the network connection unit_B720 is a functional unit for SMF to connect with AMF, and/or UPF, and/or PCF, and/or UDM, and/or NSACF. That is, the SMF sends and receives user data and/or control information to/from the AMF and/or UPF and/or PCF and/or UDM and/or NSACF using the network connection_B720. be able to.
  • the SMF in 5GCN can communicate with AMF through N11 interface by using network connection_A620, and can communicate with UPF through N4 interface. It can communicate with the PCF through the N7 interface, with the UDM through the N10 interface, and with the NSACF through the N81 interface.
  • the storage unit_B740 is a functional unit for storing programs, user data, control information, etc. necessary for each operation of the SMF.
  • SMF has session management functions such as establishing, modifying, and releasing PDU sessions, IP address allocation and management functions for UEs, UPF selection and control functions, and appropriate destination (transmission destination) functions.
  • session management functions such as establishing, modifying, and releasing PDU sessions, IP address allocation and management functions for UEs, UPF selection and control functions, and appropriate destination (transmission destination) functions.
  • function to configure UPF to route traffic to It has the function of providing AN-specific (for each AN) SM information sent to the network, the function of determining the SSC mode (Session and Service Continuity mode) for the session, the roaming function, etc.
  • SSC mode Session and Service Continuity mode
  • NSACF Network Slice Admission Control Function
  • NSACF has the function of monitoring and controlling the number of established PDU sessions for each network slice.
  • NSACF has a function to notify each connected SMF of the status of the network slice.
  • the state of a network slice may be information indicating, for example, whether the maximum number of PDU sessions that can be established for each network slice has been reached.
  • the UPF is composed of a control unit_B700, a network connection unit_B720, and a storage unit_B740.
  • the control unit_B700, network connection unit_B720, and storage unit_B740 are connected via a bus.
  • the UPF may be a node that handles the control plane.
  • the control unit_B700 is a functional unit that controls the operations and functions of the entire UPF.
  • the control unit_B700 implements various processes in the UPF by reading and executing various programs stored in the storage unit_B740 as necessary.
  • the network connection unit_B720 is a functional unit for UPF to connect to the base station device (gNB) and/or SMF and/or DN in the 5G AN.
  • the UPF uses the network connection part_B720 to transmit and receive user data and/or control information between the base station equipment (gNB) and/or SMF and/or DN in the 5G AN. Can be done.
  • the UPF in 5GCN can communicate with gNB via N3 interface by using network connection part_A620, and can communicate with SMF via N4 interface. Through the N6 interface, it can communicate with the DN, and through the N9 interface, it can communicate with other UPFs.
  • the storage unit_B740 is a functional unit for storing programs, user data, control information, etc. necessary for each operation of the UPF.
  • the UPF functions as an anchor point for intra-RAT mobility or inter-RAT mobility, as an external PDU session point for interconnecting to the DN (i.e., as a gateway between the DN and core network packet routing and forwarding functions, UL CL (Uplink Classifier) function that supports routing of multiple traffic flows to one DN, and multi-homed PDU sessions. It has branching point function, QoS (Quality of Service) processing function for user plane, uplink traffic verification function, downlink packet buffering, downlink data notification trigger function, etc.
  • QoS Quality of Service
  • the UPF may be a gateway for IP communication and/or non-IP communication. Further, the UPF may have a function of transferring IP communication, or may have a function of converting between non-IP communication and IP communication. Furthermore, the plurality of gateways may be a gateway that connects core network_B and a single DN. Note that the UPF may have connectivity with other NFs, and may be connected to each device via other NFs.
  • the user plane refers to user data that is transmitted and received between the UE and the network.
  • the user plane may be sent and received using a PDN connection or a PDU session.
  • the user plane may be transmitted and received using the LTE-Uu interface and/or the S1-U interface and/or the S5 interface and/or the S8 interface and/or the SGi interface.
  • the user plane may be transmitted and received via the interface between the UE and the NG RAN, and/or the N3 interface, and/or the N9 interface, and/or the N6 interface.
  • the user plane may be expressed as U-Plane.
  • control plane is a control message that is sent and received to control communication of the UE.
  • the control plane may be transmitted and received using a NAS (Non-Access-Stratum) signaling connection between the UE and the MME.
  • NAS Non-Access-Stratum
  • the control plane may be transmitted and received using the LTE-Uu interface and the S1-MME interface.
  • the control plane may be transmitted and received using the interface between the UE and the NG RAN, and the N2 interface.
  • the control plane may be expressed as a control plane or as a C-Plane.
  • the U-Plane (User Plane; UP) may be a communication path for transmitting and receiving user data, and may be composed of multiple bearers.
  • the C-Plane (Control Plane; CP) may be a communication path for transmitting and receiving control messages, and may be composed of a plurality of bearers.
  • the network refers to at least part of the access network_B, core network_B, and DN. Further, one or more devices included in at least a portion of the access network_B, core network_B, and DN may be referred to as a network or a network device.
  • the fact that the network sends, receives, and/or processes messages may mean that devices within the network (network devices and/or control devices) send, receive, and/or process messages.
  • a device within a network may send, receive, and/or process messages, which may mean that the network sends, receives, and/or processes messages.
  • SM Session Management
  • NAS Non-Access-Stratum
  • PDU session establishment request messages PDU session establishment accept messages
  • PDU session establishment reject messages PDU session modification requests.
  • PDU session modification command message PDU session modification complete message
  • PDU session modification command reject message PDU session modification reject message
  • PDU session modification command message PDU session modification complete message
  • PDU session modification command reject message PDU session modification command reject message
  • PDU session release request message PDU session release reject message
  • PDU session release command message PDU session release complete message
  • PDU session release complete message A message etc. may also be included.
  • the procedures for SM or SM procedures include PDU session establishment procedure, PDU session modification procedure, and PDU session release procedure (UE-requested PDU session release procedure). You may be Note that each procedure may be initiated from the UE or may be initiated from the NW (network).
  • MM (Mobility management) message may be a NAS message used for procedures for MM, and may be a control message sent and received between UE_A10 and AMF_A240.
  • MM messages include Registration request messages, Registration accept messages, Registration reject messages, De-registration request messages, and De-registration accept messages. ) message, configuration update command message, configuration update complete message, service request message, service accept message, service reject message, notification ) messages, Notification response messages, etc. may be included.
  • procedures for MM or MM procedures include registration procedure, de-registration procedure, generic UE configuration update procedure, authentication/approval procedure, and service request procedure. It may include a Service request procedure, a Paging procedure, and a Notification procedure.
  • the 5GS (5G System) service may be a connection service provided using the core network_B190.
  • the 5GS service may be a service different from the EPS service, or may be a service similar to the EPS service.
  • non-5GS service may be a service other than the 5GS service, and may include an EPS service and/or a non-EPS service.
  • the PDN (Packet Data Network) type indicates the type of PDN connection, and includes IPv4, IPv6, IPv4v6, and non-IP. If IPv4 is specified, it indicates that data is sent and received using IPv4. If IPv6 is specified, it indicates that data is sent and received using IPv6. If IPv4v6 is specified, it indicates that data is sent and received using IPv4 or IPv6. If non-IP is specified, it indicates that communication is not using IP, but using a communication method other than IP.
  • a PDU (Protocol Data Unit/Packet Data Unit) session can be defined as an association between a UE and a DN that provides PDU connectivity services, but is not established between a UE and an external gateway. connectivity.
  • the UE can send and receive user data to and from the DN using the PDU session.
  • this external gateway may be UPF, SCEF, etc.
  • the UE can use the PDU session to send and receive user data to and from devices such as application servers located in the DN.
  • each device may manage a PDU session by associating one or more pieces of identification information with it.
  • this identification information may include one or more of DNN, QoS rules, PDU session type, application identification information, NSI identification information, access network identification information, and SSC mode, or may include other information. It may also be included.
  • each piece of identification information associated with the PDU sessions may have the same content or may have different content.
  • DNN Data Network Name
  • DNN may be identification information that identifies the core network and/or the external network such as DN.
  • the DNN can also be used as information for selecting a gateway such as PGW_A30/UPF_A235 to connect the core network_B190.
  • the DNN may correspond to an APN (Access Point Name).
  • the PDU (Protocol Data Unit/Packet Data Unit) session type indicates the type of PDU session, and includes IPv4, IPv6, Ethernet, and Unstructured. If IPv4 is specified, it indicates that data will be sent and received using IPv4. If IPv6 is specified, it indicates that data will be sent and received using IPv6. If Ethernet is specified, it indicates that Ethernet frames will be sent and received. Furthermore, Ethernet may indicate that communication using IP is not performed. If Unstructured is specified, it indicates that data will be sent and received to the application server, etc. in the DN using Point-to-Point (P2P) tunneling technology. As the P2P tunneling technology, for example, UDP/IP encapsulation technology may be used. Note that the PDU session type may include IP in addition to the above. IP can be specified if the UE can use both IPv4 and IPv6.
  • PLMN Public land mobile network
  • PLMN is a communication network that provides mobile wireless communication services.
  • PLMN is a network managed by an operator, which is a (mobile) telecommunications carrier, and the operator can be identified by the PLMN ID.
  • PLMN may also mean PLMN ID.
  • a PLMN that matches the MCC (Mobile Country Code) and MNC (Mobile Network Code) of the UE's IMSI (International Mobile Subscriber Identity) may be the Home PLMN (HPLMN).
  • PLMN may refer to core network.
  • the UE may maintain an Equivalent HPLMN list for identifying one or more EHPLMNs (Equivalent HPLMNs) in the USIM.
  • EHPLMNs Equivalent HPLMNs
  • a PLMN different from HPLMN and/or EHPLMN may be VPLMN (Visited PLMN).
  • the PLMN that the UE has successfully registered may be an RPLMN (Registered PLMN).
  • RPLMN Registered PLMN
  • Each device receives and/or maintains and/or stores an Equivalent PLMN list for identifying one or more EPLMNs (Equivalent PLMNs) that can be used equivalently as RPLMNs in UE PLMN selection. You may.
  • the current PLMN is the PLMN requested by the UE, and/or the PLMN selected by the UE, and/or the RPLMN, and/or the PLMN permitted by the network, and/or the core network equipment that sends and receives messages. It may be the PLMN to which it belongs.
  • the requesting PLMN means the message destination network when the UE sends the message. Specifically, it may be the PLMN selected by the UE when the UE transmits the message.
  • the requested PLMN is the PLMN requested by the UE, and may be the current PLMN. Furthermore, when the UE is in a registered state, the requested PLMN may be a registered PLMN.
  • NPN Non-public network
  • SNPN Seand-alone non-public network
  • PNI-NPN Public network integrated non-public network
  • SNPN and PNI-NPN may be deployed on 5GS. In this paper, when NPN is indicated, it may mean SNPN or PNI-NPN or both.
  • SNPN Stand-alone non-public network
  • PLMN ID PLMN ID
  • NID Network identifier
  • the PLMN ID that identifies the SNPN does not need to be unique.
  • one or more PLMN IDs reserved for use in private networks may be used for the NPN.
  • SNPN Single-alone Non-Public Network
  • PLMN ID Packet Number
  • NID Network identifier
  • SNPN may refer to core network.
  • the UE permitted to connect to the SNPN may be an SNPN enabled UE.
  • the UE may hold an Equivalent SNPN list for identifying one or more ESNPNs (Equivalent SNPNs) in the USIM.
  • ESNPN different from HSNPN and/or ESNPN may be VPLMN (Visited PLMN).
  • the SNPN that the UE has successfully registered may be an RSNPN (Registered SNPN).
  • RSNPN Registered SNPN
  • Each device receives from the RSNPN and/or maintains an Equivalent SNPN list for identifying one or more ESNPNs (Equivalent PLMNs) that can be used equivalently to the RSNPN in the UE's PLMN selection or SNPN selection, and /or may be memorized.
  • Current SNPN means the SNPN requested by the UE, and/or the SNPN selected by the UE, and/or the RSNPN, and/or the SNPN allowed by the network, and/or the core network equipment that sends and receives messages. It may be the SNPN to which it belongs.
  • the requested SNPN means the destination network of the message when the UE sends the message. Specifically, it may be the SNPN selected by the UE when the UE sends the message.
  • the requested SNPN is the SNPN requested by the UE, and may be the current SNPN. Furthermore, when the UE is in a registered state, the requested SNPN may be a registered SNPN.
  • PNI-NPN Public network integrated non-public network
  • Onboarding services in SNPN allow the MS (UE) to access the SNPN for onboarding using default UE credentials.
  • the registration procedure for onboarding services in SNPN may be Initial registration for onboarding services in SNPN. Furthermore, or the registration procedure for the SNPN onboarding service may be a registration procedure for registration renewal on the move when the UE is registering for the SNPN onboarding service.
  • the registration procedure for SNPN onboarding services may be referred to as SNPN onboarding registration.
  • the registration procedure for the SNPN onboarding service requires that MM-based slice admission control be performed by the AMF or by the NF in the core network for the S-NSSAI for the SNPN onboarding service. good.
  • a network slice is a logical network that provides specific network capabilities and network characteristics.
  • the UE and/or network may support network slices (NW slices; NS) in 5GS.
  • NW slices; NS network slices
  • a network slice may also be simply called a slice.
  • a network slice instance is composed of an instance (entity) of a network function (NF) and a set of necessary resources, and forms a deployed network slice.
  • NF is a processing function in a network, and is adopted or defined by 3GPP.
  • NSI is an entity of NS configured at least one in core network_B.
  • the NSI may be configured by a virtual NF (Network Function) generated using an NST (Network Slice Template).
  • NST is a logical representation of one or more NFs associated with resource requests for providing required communication services and capabilities.
  • the NSI may be an aggregation within the core network_B190 configured by a plurality of NFs.
  • the NSI may be a logical network configured to separate user data distributed by services or the like.
  • One or more NFs may be configured in the NS.
  • the NF configured in an NS may or may not be a device shared with other NSs.
  • the UE and/or devices in the network may be configured based on one or more registration information such as NSSAI and/or S-NSSAI and/or UE usage type and/or one or more NSI IDs, and/or APN. can be assigned to NS.
  • the UE usage type is a parameter value included in the UE registration information and used to identify the NSI.
  • the UE usage type may be stored in the HSS.
  • AMF may select SMF and UPF based on UE usage type.
  • S-NSSAI Single Network Slice Selection Assistance Information
  • S-NSSAI Single Network Slice Selection Assistance Information
  • S-NSSAI may be configured only with SST (Slice/Service type), or may be configured with both SST and SD (Slice Differentiator).
  • SST is information indicating the expected behavior of the NS in terms of functions and services.
  • the SD may be information for interpolating the SST when selecting one NSI from a plurality of NSIs indicated by the SST.
  • the S-NSSAI may be information specific to each PLMN or SNPN, or may be standard information shared between PLMNs or SNPNs.
  • S-NSSAI may be transmitted and received between each device using the S-NSSAI IE of 5GS, in which case the S-NSSAI is the S-NSSAI (SST and/or SD) associated with the current PLMN or SNPN. , and/or S-NSSAI (SST and/or SD) of the HPLMN (if any, e.g. when the UE is roaming or when the current PLMN or SNPN is VPLMN or SNPN).
  • the network may store one or more S-NSSAIs in the registration information of the UE as default S-NSSAIs. Note that when the S-NSSAI is the default S-NSSAI and the UE does not send a valid S-NSSAI to the network in the registration request message, the network may provide the NS related to the UE.
  • the S-NSSAI transmitted and received between the UE and the NW may be expressed as an S-NSSAI IE (Information element).
  • the S-NSSAI IE transmitted and received between the UE and the NW is an S-NSSAI consisting of the SST and/or SD of the registered PLMN or SNPN, and/or the S-NSSAI of the HPLMN or HSNPN to which the S-NSSAI is mapped.
  • - SST and/or SD indicating NSSAI may be configured.
  • One or more S-NSSAIs stored by the UE and/or NW may be composed of SST and/or SD, or the S-NSSAI composed of SST and/or SD, and/or the S-NSSAI An SST and/or SD indicating the S-NSSAI of the mapped HPLMN may be configured.
  • NSSAI Network Slice Selection Assistance Information
  • S-NSSAI Network Slice Selection Assistance Information
  • Each S-NSSAI included in the NSSAI is information that assists the access network or core network in selecting an NSI.
  • the UE may store the NSSAI granted by the network for each PLMN or SNPN. Additionally, NSSAI may be information used to select an AMF.
  • the UE may apply each NSSAI (allowed NSSAI, and/or configured NSSAI, and/or rejected NSSAI, and/or pending NSSAI) to the PLMN and EPLMN, or the SNPN and ESNPN.
  • mapped S-NSSAI is the S-NSSAI of the HPLMN mapped to the S-NSSAI of the registered PLMN in a roaming scenario.
  • the UE may store one or more mapped S-NSSAIs mapped to the configured NSSAIs and the S-NSSAIs included in the allowed NSSAIs of each access type. Furthermore, the UE may store one or more mapped S-NSSAIs of the S-NSSAIs included in the rejected NSSAIs and/or the pending NSSAIs.
  • the mapped S-NSSAI may be the S-NSSAI of the HSNPN mapped to the S-NSSAI of the registered SNPN.
  • the Network Slice-Specific Authentication and Authorization (NSSAA) function is a function for realizing authentication and authorization specific to network slices.
  • NSSAA Network Slice-Specific Authentication and Authorization
  • UE authentication and authorization can be performed outside the core network, such as by a 3rd party.
  • a PLMN or SNPN and a network device equipped with the NSSAA function can execute the NSSAA procedure for a certain S-NSSAI based on the registration information of the UE.
  • the UE with NSSAA functionality can manage, store, and transmit and receive the pending NSSAI and the third rejected NSSAI.
  • NSSAA may be referred to as network slice-specific authentication and authorization procedures or authentication and authorization procedures.
  • An S-NSSAI that requires NSSAA is an S-NSSAI that requires NSSAA and is managed by a core network and/or a core network device. Furthermore, when roaming, an S-NSSAI that requires NSSAA is an S-NSSAI that is managed by the core network and/or core network device, and that is mapped to an S-NSSAI of an HPLMN or HSNPN that requires NSSAA. -Can be NSSAI.
  • the core network and/or the core network device may store the S-NSSAI that requires NSSAA by associating and storing information indicating whether or not S-NSSAI is required.
  • the core network and/or the core network device may further include an S-NSSAI that requires NSSAA and information indicating whether the NSSAA is complete or in a state where the NSSAA is complete and allowed or successful. The information may be stored in association with the other information.
  • the core network and/or the core network device may manage S-NSSAI that requires NSSAA as information that is not related to the access network.
  • configured NSSAI is an NSSAI that is supplied and stored in the UE.
  • the UE may store the configured NSSAI for each PLMN or SNPN.
  • the UE may store the configured NSSAI in association with the PLMN or SNPN.
  • configured NSSAI associated with PLMN may be expressed as configured NSSAI for PLMN, configured NSSAI of PLMN, configured NSSAI for PLMN, or configured NSSAI associated with PLMN.
  • configured NSSAI associated with SNPN may be expressed as configured NSSAI for SNPN, configured NSSAI of SNPN, configured NSSAI for SNPN, or configured NSSAI associated with SNPN.
  • the UE may store a configured NSSAI that is not associated with a PLMN and is valid for all PLMNs, and may set such a configured NSSAI as a "default configured NSSAI.”
  • the UE may store configured NSSAIs that are not associated with SNPNs and are valid for all SNPNs, and may designate such configured NSSAIs as "default configured NSSAIs.”
  • the UE may store a configured NSSAI that is not associated with a PLMN or SNPN and is valid for all PLMNs and SPNNs, and may designate such configured NSSAI as a "default configured NSSAI.”
  • a configured NSSAI may be associated with multiple PLMNs or SNPNs, these multiple PLMNs may be EPLMNs, and multiple SNPNs may be ESNPNs.
  • the configured NSSAI may be information configured by the network (or PLMN or SNPN).
  • S-NSSAI included in configured NSSAI may be expressed as configured S-NSSAI.
  • the configured S-NSSAI may be transmitted and received using the S-NSSAI IE, in which case the configured S-NSSAI is the S-NSSAI (SST and/or SD) and the mapped S-NSSAI (SST of the mapped HPLMN or SNPN). and/or SD of the mapped HPLMN or SNPN) (if any, e.g. when the UE is roaming or when the associated PLMN or SNPN is a VPLMN or VSNPN).
  • the S-NSSAI (SST and/or SD) of PLMN or SNPN and the S-NSSAI (SST and/or SD) of HPLMN or SNPN may be treated independently.
  • configured S-NSSAI of PLMN or SNPN is expressed as "configured S-NSSAI for PLMN or SNPN" or "configured S-NSSAI of PLMN or SNPN” or “configured S-NSSAI for PLMN or SNPN" It's okay to be.
  • the one or more S-NSSAIs of the HPLMN or HSNPN to which the configured S-NSSAI is mapped are "one or more mapped S-NSSAIs to the configured NSSAIs of the PLMN or SNPN" or "one or more mapped S-NSSAIs of the configured NSSAIs of the PLMN or SNPN" It may also be expressed as "mapped S-NSSAI”.
  • the UE may remember the "configured NSSAI of the current PLMN or SNPN" in which the S-NSSAI of the current PLMN or SNPN is configured, and further stores the "configured NSSAI of the current PLMN or SNPN" when roaming.
  • the above mapped S-NSSAI may also be stored.
  • the one or more mapped S-NSSAIs for the configured NSSAI may be 3GPP mapped S-NSSAI(s) for the configured NSSAI.
  • the configured NSSAI may be updated by the NW at any timing, and the updated configured NSSAI may be transmitted from the NW to the UE based on the update.
  • the requested NSSAI is the NSSAI provided by the UE to the network during the registration procedure.
  • the S-NSSAI included in the requested NSSAI transmitted by the UE may be the S-NSSAI included in the allowed NSSAI and/or configured NSSAI stored in the UE.
  • the requested NSSAI may be information indicating the network slice requested by the UE.
  • S-NSSAI included in requested NSSAI may be expressed as requested S-NSSAI.
  • the requested NSSAI is sent and received in an RRC (Radio Resource Control) message that includes a NAS message or a NAS (Non-Access-Stratum) message sent from the UE to the network, such as a registration request message or a PDU session establishment request message. be done.
  • the requested NSSAI may include the S-NSSAI of the VPLMN and the S-NSSAI of the mapped HPLMN.
  • the S-NSSAI included in the requested NSSAI may be composed of the S-NSSAI and the mapped S-NSSAI.
  • the requested NSSAI may be information including one or more S-NSSAIs associated with the network slice requested by the UE.
  • the network slice that the UE requests here may be a network slice that the UE wants to use, or a network slice that the UE requests permission to use from the network.
  • the S-NSSAI included in the requested NSSAI may be the S-NSSAI included in the configured NSSAI associated with the current PLMN, or the S-NSSAI included in the allowed NSSAI associated with the current PLMN. There may be.
  • the requested NSSAI includes one or more S-NSSAIs included in the configured NSSAI associated with the current PLMN/SNPN, or one or more S-NSSAIs included in the allowed NSSAI associated with the current PLMN. -NSSAI or a combination of the above two.
  • the allowed NSSAI associated with the current PLMN may be the allowed NSSAI associated with the current PLMN and the current access type.
  • the requested NSSAI may be the requested NSSAI of 5GS.
  • the S-NSSAI included in the requested NSSAI may be an S-NSSAI that is stored by the UE and is not included in the rejected NSSAI associated with the current PLMN or SNPN, and/or the S-NSSAI that is stored by the UE, It may be an S-NSSAI that is not included in the pending NSSAI associated with the current PLMN or SNPN, and an S-NSSAI that is not included in the fourth rejected NSSAI that the UE remembers and associated with the current PLMN or SNPN.
  • the S-NSSAI included in the requested NSSAI is an S-NSSAI for which the backoff timer associated with that S-NSSAI and/or the mapped S-NSSAI of that S-NSSAI is not running in the UE. It's fine.
  • allowed NSSAI is information indicating one or more network slices in which the UE is permitted.
  • the allowed NSSAI is information that identifies a network slice to which the network has allowed connection to the UE.
  • the allowed NSSAI may be an allowed NSSAI stored in the UE and/or the NW, or may be an allowed NSSAI sent from the NW to the UE. In that case, allowed NSSAI may mean 3GPP's allowed NSSAI IE.
  • the allowed NSSAI IE sent from the NW to the UE may include a list of S-NSSAIs of the current PLMN or SNPN that are valid for the current PLMN or SNPN during non-roaming.
  • the allowed NSSAI IE sent from the NW to the UE contains a list of S-NSSAIs of the current PLMN or SNPN that are valid for the current PLMN or SNPN, and also maps the S-NSSAI of the current PLMN or SNPN.
  • the list of S-NSSAIs of the current PLMN or SNPN that are valid for the current PLMN or SNPN included in the allowed NSSAI IE and the list of S-NSSAIs of the current PLMN or SNPN that are valid for the current PLMN or SNPN.
  • a list of mapped S-NSSAIs that are S-NSSAIs may be referred to as a list of mapped S-NSSAIs that are Allowed NSSAIs.
  • the list of mapped S-NSSAIs in Allowed NSSAI may be 3GPP mapped S-NSSAI(s) for the allowed NSSAI for a PLMN.
  • Allowed NSSAI may mean 3GPP's allowed NSSAI for a PLMN or an SNPN.
  • the UE and/or NW may store and manage the allowed NSSAI for each access (3GPP access or non-3GPP access) as UE information.
  • the UE and/or NW may further manage the allowed NSSAI in association with the registration area.
  • the UE and/or NW may store and manage the allowed NSSAI in association with the PLMN or SNPN as UE information.
  • allowed NSSAI may be associated with multiple PLMNs, these multiple PLMNs may be EPLMNs, and multiple SNPNs may be ESNPNs.
  • the allowed NSSAI associated with PLMN or SNPN and access type may be expressed as "allowed NSSAI for PLMN or SNPN and access type" or "allowed NSSAI for PLMN or SNPN access type”.
  • S-NSSAI included in allowed NSSAI may be expressed as allowed S-NSSAI.
  • allowed S-NSSAI may be sent and received using S-NSSAI IE, in which case allowed S-NSSAI (SST and/or SD) is S-NSSAI and mapped S-NSSAI (SST and/or SD of mapped HPLMN or SNPN and/or SD of the mapped HPLMN or SNPN) (if any, e.g. when the UE is roaming or when the associated PLMN or SNPN is a VPLMN or VSNPN).
  • S-NSSAI SST and/or SD
  • S-NSSAI SST of mapped HPLMN or SNPN and/or SD of mapped HPLMN or SNPN
  • Allowed S-NSSAI for PLMN or SNPN is expressed as "allowed S-NSSAI for PLMN or SNPN" or "allowed S-NSSAI for PLMN or SNPN” or "allowed S-NSSAI for PLMN or SNPN" It's okay to be.
  • the one or more S-NSSAIs in the HPLMN or HSNPN to which the allowed S-NSSAI is mapped are "one or more mapped S-NSSAIs to the allowed NSSAIs in the PLMN or SNPN" or "one or more mapped S-NSSAIs to the allowed NSSAIs in the PLMN or SNPN" It may also be expressed as "mapped S-NSSAI”.
  • rejected NSSAI is information indicating one or more network slices that the UE is not permitted to use or request.
  • the rejected NSSAI is information that identifies a network slice to which the network does not allow the UE to connect.
  • the rejected NSSAI transmitted from the NW to the UE may be included in the rejected NSSAI IE or the Extended rejected NSSAI IE.
  • Rejected NSSAI Rejected NSSAI transmitted and received using IE may be information that includes one or more combinations of S-NSSAI (SST and/or SD) and rejection reason value (rejected S-NSSAI).
  • Extended rejected NSSAI The rejected NSSAI sent and received using IE is S-NSSAI (SST and/or SD) and mapped S-NSSAI (SST and/or SD of mapped HPLMN or SNPN) when roaming. ) (if any, e.g. when the UE is roaming, or when the associated PLMN or SNPN is VPLMN or VSNPN) and a rejection reason value (Rejected S-NSSAI). Good too.
  • the Extended rejected NSSAI IE may include one or more Rejected S-NSSAs and/or NSSAI sets (Partial extended rejected NSSAI list in 5GS), and the Rejected S-NSSAI set may include the type of this set. may also include information indicating.
  • the information indicating the type of set may be, for example, information indicating that the set contains one or more rejected S-NSSAI (SST and/or SD) with associated backoff timer values. , this set may include information indicating that the associated backoff timer value is not included but one or more rejected S-NSSAI (SST and/or SD) is included.
  • the information indicating the type of set is information indicating that this set contains one or more rejected S-NSSAIs with associated backoff timer values, then the set of rejected S-NSSAIs does not have a backoff timer value. May contain values.
  • the S-NSSAI included in the rejected NSSAI may be associated with the PLMN ID or SNPN ID.
  • the PLMN or SNPN indicated by the PLMN ID or SNPN ID with which the S-NSSAI included in the rejected NSSAI is associated may be the current PLMN or the current SNPN.
  • the PLMN ID or SNPN ID associated with the S-NSSAI included in the rejected NSSAI may be information indicating HPLMN or HSNPN, regardless of the current PLMN or SNPN.
  • the rejection reason value is information indicating the reason why the network rejects the corresponding S-NSSAI or the combination of the corresponding S-NSSAI and mapped S-NSSAI (if any).
  • the UE and/or the network shall assign each S-NSSAI and/or mapped S-NSSAI (if any) a rejection reason to which each S-NSSA or the corresponding combination of S-NSSAI and mapped S-NSSAI is associated. Based on the value, it may be stored and managed as the appropriate rejected NSSAI and/or mapped S-NSSAI of the rejected NSSAI.
  • the rejected NSSAI may be included in a NAS message sent from the network to the UE, such as a registration acceptance message, a configuration update command, a registration rejection message, or an RRC message that includes the NAS message.
  • S-NSSAI included in rejected NSSAI may be expressed as rejected S-NSSAI.
  • the rejected NSSAI may be transmitted using the Rejected NSSAI IE or the Extended rejected NSSAI IE when the UE is roaming.
  • the Extended rejected NSSAI IE includes the S-NSSAI (SST and/or SD) of the current PLMN or SNPN and the mapped S-NSSAI (SST and/or SD of the mapped HPLMN or SNPN).
  • One or more rejected S-NSSAI (IE) consisting of a rejection reason value may be included, and the UE requests the NW for the received S-NSSAI of the current PLMN or SNPN along with the received mapped S-NSSAI. It can be understood as being rejected.
  • the Rejected NSSAI IE may include a rejected S-NSSAI IE based on the S-NSSAI of the current PLMN or SNPN and a rejection reason value, and the UE receives the S-NSSAI of the current PLMN or SNPN, or It may be understood that the request to the NW for the S-NSSAI associated with the S-NSSAI of HPLMN or HSNPN has been rejected.
  • the rejected NSSAIs are the first to fourth rejected NSSAIs, one or more mapped S-NSSAIs for the first rejected NSSAI, one or more mapped S-NSSAIs for the second rejected NSSAI, and the fourth rejected NSSAIs. It may be one or more mapped S-NSSAIs, or a combination thereof. S-NSSAI included in rejected NSSAI may be expressed as rejected S-NSSAI.
  • the rejected S-NSSAI may be transmitted and received between devices using the S-NSSAI IE, and the S-NSSAI IE indicating the rejected NSSAI may be configured to include the S-NSSAI and the mapped S-NSSAI.
  • the UE and/or NW may store and manage the rejected NSSAI in association with the PLMN or SNPN as UE information.
  • the rejected NSSAI may also be associated with one or more other PLMNs or SNPNs, where the one or more other PLMNs may be EPLMNs and the one or more other SNPNs may be ESNPNs.
  • the rejected NSSAI associated with PLMN or SNPN may be expressed as rejected NSSAI for PLMN or SNPN, rejected NSSAI for PLMN or SNPN, or rejected NSSAI for PLMN or SNPN.
  • the UE and/or NW may further store the second rejected NSSAI and/or the second rejected S-NSSAI in association with the registration area.
  • the UE and/or NW may store the second rejected NSSAI and/or the second rejected S-NSSAI in association with the access type and/or registration area.
  • the first rejected NSSAI is a set of one or more S-NSSAIs that are not available in the current PLMN or the current SNPN.
  • the first rejected NSSAI may be a 5GS rejected NSSAI for the current PLMN or SNPN, a rejected S-NSSAI for the current PLMN or SNPN, or a rejected NSSAI for the current PLMN or SNPN.
  • the included S-NSSAI(s) for rejected S-NSSAI for the current PLMN or SNPN may be mapped S-NSSAI(s) for rejected S-NSSAI for the current PLMN or SNPN. It may be S-NSSAI included in the current PLMN or SNPN.
  • the list (set) of mapped S-NSSAIs for the first rejected NSSAI may be one or more mapped S-NSSAIs for the first rejected NSSAI, and the 5GS mapped S-NSSAI(s) for the rejected NSSAI for The current PLMN or SNPN may be used.
  • the first rejected NSSAI may be a rejected NSSAI stored in the UE or the NW, or may be a rejected NSSAI transmitted from the NW to the UE.
  • the S-NSSAI included in the requested NSSAI sent by the UE to the NW is not possible in the current PLMN or the current SNPN.
  • the first rejected NSSAI may be information that includes one or more combinations of S-NSSAI and rejection reason value.
  • the reason for rejection value at this time may be "S-NSSAI not available in the current PLMN or SNPN", and the S-NSSAI associated with the reason for rejection value may be "S-NSSAI not available in the current PLMN or SNPN". It may be information indicating that NSSAI is not possible in the current PLMN or SNPN.
  • the S-NSSAI included in the first rejected NSSAI may be expressed as the first rejected S-NSSAI.
  • the first rejected NSSAI is a rejected NSSAI transmitted from the NW to the UE
  • the first rejected NSSAI may be transmitted and received while being included in a rejected NSSAI IE or an Extended rejected NSSAI IE.
  • the rejected NSSAI IE or Extended rejected NSSAI IE may include at least one combination of the S-NSSAI of the current PLMN or SNPN and the rejection reason value. If the UE is roaming, the above combination may further include mapped S-NSSAI, which is the S-NSSAI of HPLMN.
  • the first rejected NSSAI sent from the NW to the UE includes at least one combination of the S-NSSAI of the current PLMN or SNPN, the mapped S-NSSAI, and the rejection reason value. It's fine.
  • the first rejected NSSAI may be applied to the entire registered PLMN or registered SNPN.
  • the UE and/or NW may treat the first rejected NSSAI and the S-NSSAI included in the first rejected NSSAI as information independent of the access type.
  • the first rejected NSSAI may be information valid for 3GPP access and non-3GPP access.
  • the UE may delete the first rejected NSSAI from its memory.
  • the UE may delete the first rejected NSSAI from its memory.
  • the UE may delete the first rejected NSSAI if the UE transitions to the non-registered state for the current PLMN via an access, or successfully registers to a new PLMN via an access, or registers to a new PLMN via an access. If the UE fails and transitions to the non-registered state, and the UE is not registered via the other access (non-registered state), the UE deletes the first rejected NSSAI.
  • the UE if the UE transitions to a non-registered state for the current PLMN via one access, and the UE is registered for the current PLMN via the other access (registered state). , the UE shall not remove the first rejected NSSAI.
  • the S-NSSAI included in the first rejected NSSAI or the first rejected NSSAI may be the S-NSSAI of the current PLMN.
  • the S-NSSAI included in the first rejected NSSAI or the first rejected NSSAI may be stored and/or managed and/or transmitted and received in association with only the current PLMN ID or SNPN ID.
  • the S-NSSAI included in the first rejected NSSAI may be the S-NSSAI of the HPLMN or may be the S-NSSAI of the current PLMN.
  • the second rejected NSSAI is a collection of one or more S-NSSAIs that are unavailable within the current registration area.
  • the second rejected NSSAI may be the 5GS rejected NSSAI for the current registration area, mapped S-NSSAI(s) for rejected NSSAI for the current registration area, or mapped S-NSSAI(s ) for rejected NSSAI for the current registration area.
  • the list (set) of mapped S-NSSAIs for the second rejected NSSAI may be one or more mapped S-NSSAIs for the second rejected NSSAI, and the 5GS mapped S-NSSAI(s) for the rejected NSSAI for It may be the current registration area.
  • the second rejected NSSAI may be a rejected NSSAI stored in the UE or the NW, or may be a rejected NSSAI transmitted from the NW to the UE.
  • the second rejected NSSAI may be information that includes one or more combinations of an S-NSSAI and a reason value.
  • the rejection reason value at this time may be "S-NSSAI not available in the current registration area", and the S-NSSAI associated with the reason value may be "S-NSSAI not available in the current registration area". It may be information indicating that the registration is not possible within the current registration area.
  • the S-NSSAI included in the second rejected NSSAI may be expressed as the second rejected S-NSSAI.
  • the UE includes the S-NSSAI included in the requested NSSAI that is rejected because it is not possible in the current registration area. Include one or more. In that case, the second rejected NSSAI may be transmitted and received while being included in the rejected NSSAI IE or the Extended rejected NSSAI IE.
  • the rejected NSSAI IE or Extended rejected NSSAI IE may include at least one combination of the S-NSSAI of the current PLMN or SNPN and the rejection reason value. If the UE is roaming, the above combination may further include mapped S-NSSAI, which is the S-NSSAI of HPLMN.
  • the second rejected NSSAI sent from the NW to the UE includes at least one combination of the S-NSSAI of the current PLMN or SNPN, the mapped S-NSSAI, and the rejection reason value. It's fine.
  • the second rejected NSSAI may be valid within the current registration area and may be applied to the current registration area.
  • the UE and/or NW may treat the second rejected NSSAI and the S-NSSAI included in the second rejected NSSAI as information for each access type.
  • the second rejected NSSAI may be information valid for each of 3GPP access and non-3GPP access. That is, once the UE transitions to the unregistered state for a certain access, it may delete the second rejected NSSAI associated with that access from its memory.
  • the S-NSSAI included in the second rejected NSSAI or the second rejected NSSAI may be the S-NSSAI of the current PLMN.
  • the S-NSSAI included in the second rejected NSSAI or the second rejected NSSAI may be stored and/or managed and/or transmitted and received in association with only the current PLMN ID or SNPN ID.
  • the S-NSSAI included in the second rejected NSSAI may be the S-NSSAI of the HPLMN, or may be the S-NSSAI of the current PLMN.
  • the third rejected NSSAI is an S-NSSAI that requires NSSAA, and is a set of one or more S-NSSAIs for which NSSAA for that S-NSSAI has been failed or canceled.
  • the third rejected NSSAI may be an NSSAI stored in the UE and/or the NW, or may be an NSSAI transmitted and received between the NW and the UE.
  • the third rejected NSSAI may be information that includes one or more combinations of S-NSSAI and rejection reason value.
  • the reason for refusal value at this time may be "S-NSSAI not available due to the failed or revoked NSSAA" and is associated with the reason for refusal value.
  • the information may be information indicating that NSSAA for the S-NSSAI has failed or been cancelled.
  • the S-NSSAI included in the third rejected NSSAI may be expressed as the third rejected S-NSSAI.
  • the third rejected NSSAI is the NSSAI transmitted from the NW to the UE, the third rejected NSSAI may be transmitted and received using the rejected NSSAI IE or the Extended rejected NSSAI IE.
  • the third rejected NSSAI may apply to registered PLMNs or registered SNPNs, may apply to registered PLMNs and/or EPLMNs, or may apply to registered SNPNs and/or ESNPNs, or all may be applied to PLMN or SNPN.
  • the third rejected NSSAI applies to all PLMNs, which may mean that the third rejected NSSAI is not associated with a PLMN, or that the third rejected NSSAI is associated with an HPLMN or HSNPN. It can mean
  • the UE and/or NW may treat the third rejected NSSAI and the third rejected S-NSSAI as information independent of the access type.
  • the third rejected NSSAI may be information valid for 3GPP access and non-3GPP access.
  • the third rejected NSSAI may be a different NSSAI than the rejected NSSAI.
  • the third rejected NSSAI may be the first rejected NSSAI.
  • the third rejected NSSAI may be a 5GS rejected NSSAI for the failed or revoked NSSAA, a rejected S-NSSAI for the failed or revoked NSSAA, or a rejected NSSAI for the failed or revoked NSSAA. It may be included S-NSSAI.
  • the third rejected NSSAI is a rejected NSSAI in which the UE identifies slices that are rejected due to NSSAA failure or cancellation from the core network. Specifically, while the UE stores the third rejected NSSAI, the UE does not initiate a registration request procedure for the S-NSSAI included in the third rejected NSSAI.
  • the third rejected NSSAI may be identification information that includes one or more S-NSSAIs received from the core network in association with a rejection reason value indicating failure of the NSSAA.
  • the third rejected NSSAI is information that does not depend on the access type. Specifically, if the UE memorizes the third rejected NSSAI, the UE attempts to send a registration request message containing the S-NSSAI included in the third rejected NSSAI to both the 3GPP access and the non-3GPP access. You don't have to. Alternatively, the UE can transmit a registration request message including the S-NSSAI included in the third rejected NSSAI based on the UE policy.
  • the UE may delete the third rejected NSSAI based on the UE policy and transition to a state where it can send a registration request message including the S-NSSAI included in the third rejected NSSAI.
  • the UE may remove the S-NSSAI from the third rejected NSSAI. good.
  • the S-NSSAI included in the third rejected NSSAI may be the S-NSSAI of HPLMN.
  • the third rejected NSSAI received by the UE from VPLMN or VSNPN may include the S-NSSAI of HPLMN or HSNPN.
  • the UE and/or each device may store the "third rejected NSSAI" in which the HPLMN or HSNPN S-NSSAI is configured. In other words, even during roaming, the "third rejected NSSAI" may be stored without being associated with the mapped S-NSSAI.
  • the fourth rejected NSSAI is information that includes one or more S-NSSAIs that have reached the maximum number of UEs for each network slice.
  • the fourth rejected NSSAI may be an NSSAI stored in the UE and/or the NW, or may be an NSSAI transmitted from the NW to the UE.
  • the fourth rejected NSSAI may be the 5GS rejected NSSAI for the maximum number of UEs reached, the rejected S-NSSAI for the maximum number of UEs reached, or the rejected NSSAI for the maximum number of UEs It may be S-NSSAI included in reached, mapped S-NSSAI(s) for the rejected NSSAI for the maximum number of UEs reached, or mapped S-NSSAI(s) for the rejected NSSAI It may be S-NSSAI included in for the maximum number of UEs reached.
  • the list (set) of mapped S-NSSAIs for the fourth rejected NSSAI may be one or more mapped S-NSSAIs for the fourth rejected NSSAI, and the 5GS mapped S-NSSAI(s) for the rejected NSSAI for It may be the maximum number of UEs reached.
  • the fourth rejected NSSAI includes the S-NSSAI (SST and/or SD) and the mapped S-NSSAI (SST and/or SD) (if any). , a rejection reason value, and a backoff timer value.
  • the rejection reason value at this time may be "S-NSSAI not available due to maximum number of UEs reached for each network slice", and is associated with the rejection reason value. It may be information indicating that the S-NSSAI can be notified as Allowed NSSAI or that the maximum number of UEs that can be permitted has been reached.
  • the reason for rejection value may be the reason for rejection value included in rejected NSSAI.
  • the value of the backoff timer is determined by the UE's current PLMN or SNPN S - It may be information indicating a period during which sending of MM messages is prohibited using NSSAI.
  • the fourth rejected NSSAI may be applied to registered PLMNs and/or EPLMNs, may be applied to registered SNPNs and/or ESNPNs, and may be applied to registered SNPNs and/or ESNPNs to which TAIs included in the TA list (TAI list or registration area) belong. It may be applied to one or more PLMNs or SNPNs.
  • the UE and/or NW may treat the fourth rejected NSSAI and the S-NSSAI included in the fourth rejected NSSAI as information for each access type.
  • the fourth rejected NSSAI is the NSSAI transmitted from the NW to the UE, the fourth rejected NSSAI may be transmitted and received using the rejected NSSAI IE or the Extended rejected NSSAI IE.
  • the rejected NSSAI IE and Extended rejected NSSAI IE may include a list of rejected S-NSSAIs. .
  • the list of rejected S-NSSAIs included in the rejected NSSAI IE may be one or more 5GS Rejected S-NSSAIs.
  • the Rejected S-NSSAI may include the S-NSSAI (SST and/or SD) of the current PLMN or SNPN and the corresponding rejection reason value.
  • the list of rejected S-NSSAIs included in the Extended rejected NSSAI IE may be the Partial extended rejected NSSAI list of 5GS.
  • the list of rejected S-NSSAIs includes a first type list that does not include a backoff timer value and a backoff that is applied to all S-NSSAIs included in the list of rejected S-NSSAIs. There is a second type of list containing timer values.
  • the Extended rejected NSSAI IE may be configured with one or more first type lists and/or one or more second type lists.
  • the first type list may include information indicating that this list is the first type, and one or more Rejected S-NSSAI of one or more 5GS.
  • the Rejected S-NSSAI may include the S-NSSAI (SST and/or SD) of the current PLMN or SNPN and the corresponding rejection reason value.
  • a mapped S-NSSAI (SST and/or SD) may be configured in the Rejected S-NSSAI.
  • Information indicating that this list is of the first type may mean that this list contains one or more S-NSSAIs, but not with the corresponding backoff timer value. In other words, this may mean that this list does not include backoff timer values corresponding to one or more S-NSSAIs included in this list.
  • the second type list may include information indicating that this list is the second type, a backoff timer value, and one or more 5GS Rejected S-NSSAI IEs.
  • the Rejected S-NSSAI IE may include the S-NSSAI (SST and/or SD) of the current PLMN or SNPN and the corresponding rejection reason value.
  • a mapped S-NSSAI (SST and/or SD) may be configured in the Rejected S-NSSAI IE.
  • the information indicating that this list is of the second type is that this list contains one or more S-NSSAIs and their corresponding backoff timer values, and that the backoff timer values are It may be information that means that it is applied to all S-NSSAIs.
  • the value of the backoff timer included in the second type list may be a value applied to all S-NSSAIs included in the same second type list.
  • the pending NSSAI may be a 5GS pending NSSAI.
  • the pending NSSAI may be an NSSAI stored in the UE and/or the NW, or may be an NSSAI transmitted and received between the NW and the UE.
  • the pending NSSAI may be sent and received using a pending NSSAI IE configured with one or more S-NSSAI IEs.
  • SST and/or SD and mapped S-NSSAI (SST of the mapped HPLMN or HSNPN and/or SD of the mapped HPLMN or HSNPN) (if any, e.g. when the UE roams or the associated PLMN or (if SNPN is VPLMN or VSNPN) may be included.
  • pending NSSAI may be applied to the entire registered PLMN or registered SNPN, applied to the registered PLMN and one or more EPLMNs of the registered PLMN, or applied to the registered SNPN and one or more ESNPNs of the registered SNPN. may be done.
  • the UE and/or NW may treat the S-NSSAI included in the pending NSSAI as information independent of the access type.
  • the pending NSSAI may be information common to 3GPP access and non-3GPP access.
  • the pending NSSAI is an NSSAI consisting of one or more S-NSSAIs that identifies slices for which the UE has pending procedures. Specifically, while storing the pending NSSAI, the UE does not initiate a registration request procedure for the S-NSSAI included in the pending NSSAI or the mapped S-NSSAI of the pending NSSAI.
  • the UE does not use the S-NSSAI included in the pending NSSAI during the registration procedure until the NSSAA for the S-NSSAI included in the stored pending NSSAI is completed.
  • pending NSSAI is information independent of access type. Specifically, if the UE stores the pending NSSAI, the UE does not attempt to send a registration request message including the S-NSSAI included in the pending NSSAI to both the 3GPP access and the non-3GPP access.
  • the S-NSSAI included in the pending NSSAI stored by the UE may be the S-NSSAI of HPLMN or HSNPN.
  • the pending NSSAI IE received by the UE from the VPLMN or VSNPN may include the S-NSSAI of the HPLMN or SNPN.
  • Such a pending NSSAI may be referred to as a first pending NSSAI.
  • the UE remembering the first pending NSSAI means it does not remember the mapped S-NSSAI to the first pending NSSAI, and the S-NSSAI configured to the first pending NSSAI that the UE remembers is roaming. It is S-NSSAI of HPLMN or HSNPN regardless of the time of non-roaming.
  • the pending NSSAI IE containing the pending NSSAI contains the mapped S-NSSAI of the current S-NSSAI. may be included, or only mapped S-NSSAI may be included.
  • the S-NSSAI included in the pending NSSAI stored by the UE may be the S-NSSAI of the current PLMN (VPLMN) or SNPN (VSNPN).
  • the pending NSSAI that the UE receives from the VPLMN or VSNPN may include the S-NSSAI of the VPLMN or VSNPN.
  • Such pending NSSAI may be referred to as a second pending NSSAI.
  • the S-NSSAI configured in the second pending NSSAI may be the S-NSSAI of the current PLMN or SNPN, regardless of whether roaming or non-roaming.
  • pending NSSAI when we refer to pending NSSAI, it may mean the first pending NSSAI, the second pending NSSAI, both pending NSSAIs, or any other pending NSSAI. May also mean pending NSSAI.
  • a tracking area is one or more ranges managed by the core network that can be represented by the location information of UE_A10.
  • the tracking area may be composed of multiple cells. Further, the tracking area may be a range where control messages such as paging are broadcast, or a range where UE_A10 can move without performing a handover procedure. Furthermore, the tracking area may be a routing area, a location area, or anything similar thereto.
  • the tracking area may be a TA (Tracking Area).
  • a tracking area may be identified by a TAI (Tracking Area Identity) consisting of a TAC (Tracking Area Code) and a PLMN.
  • a registration area is a collection of one or more TAs assigned to a UE by the AMF. Note that while the UE_A10 is moving within one or more TAs included in the registration area, it may be possible to move without transmitting or receiving a signal for updating the tracking area. In other words, the registration area may be a group of information indicating an area to which the UE_A10 can move without executing a tracking area update procedure.
  • a registration area may be identified by a TAI list made up of one or more TAIs.
  • the TAIs included in the TAI list may belong to one PLMN or SNPN, or may belong to multiple PLMNs or SNPNs. If multiple TAIs included in the TAI list belong to different PLMNs or SNPNs, those PLMNs or SNPNs may be EPLMNs or ESNPNs.
  • the UE ID is information for identifying the UE.
  • the UE ID is SUCI (SUbscription Concealed Identifier), SUPI (Subscription Permanent Identifier), GUTI (Globally Unique Temporary Identifier), IMEI (International Mobile Subscriber Identity), or IMEISV (IMEI Software Version).
  • SUCI SUbscription Concealed Identifier
  • SUPI Subscribe Permanent Identifier
  • GUTI Globally Unique Temporary Identifier
  • IMEI International Mobile Subscriber Identity
  • IMEISV IMEI Software Version
  • the UE ID may be other information configured within the application or network.
  • the UE ID may be information for identifying a user.
  • Management of the maximum number of UEs connected to a slice means managing and/or controlling the maximum number of UEs that can be registered to a network slice or S-NSSAI at the same time, or establishing a PDU session using a network slice or S-NSSAI at the same time. It is to manage and/or control the maximum number of UEs.
  • the maximum number of UEs connected to a slice may be managed by 5GS NSAC (network slice admission control). NSAC may also be expressed as slice admission control.
  • Management and/or control of the maximum number of UEs that can be registered in a network slice or S-NSSAI at the same time may be expressed as MM-based slice admission control.
  • Management and/or control of the maximum number of UEs that can establish PDU sessions using network slices or S-NSSAI at the same time may be expressed as session management based slice admission control.
  • slice admission control may also mean NSAC (Network Slice Admission Control).
  • the UE registered in a network slice or S-NSSAI may mean that the S-NSSAI indicating the network slice is included and stored in the allowed NSSAI.
  • Devices in the network that support the function of managing the maximum number of UEs connected to a slice, or the function of managing and/or controlling the maximum number of UEs that can be registered to a network slice or S-NSSAI at the same time, must be connected to a slice for each S-NSSAI. It is possible to memorize whether or not management of the maximum number of UEs is required, and it is also possible to confirm during the registration procedure whether the number of registered UEs has reached a constant, which is the maximum number.
  • each device that supports the function of managing the maximum number of UEs connected to a slice, or the function of managing and/or controlling the maximum number of UEs that can be simultaneously registered to a network slice or S-NSSAI is required to store a fourth rejected NSSAI. It's good to be able to do it.
  • the maximum number of UEs connected to a slice may be expressed as the maximum number of UEs connected to each slice, the maximum number of UEs that can be registered in a network slice or S-NSSAI, the maximum number of UEs, or a constant. .
  • the SNPNs may be classified into Home SNPNs (also referred to as HSNPNs) and Visited SNPNs (also referred to as VSNPNs). Note that if the UE does not roam between SNPNs, the SNPN may be treated as the same as the Home SNPN.
  • the Home SNPN may be an SNPN that the UE can register as a home. Further, the Home SNPN may be an SNPN that the UE selects first in SNPN selection. Further, the Home SNPN may be an SNPN in which at least part of the information included in the SNPN identity (also referred to as SNPN ID) matches at least part of the information included in the IMSI of the UE. In addition, the Home SNPN is an SNPN where the MCC and MNC included in the PLMN Identity (also referred to as PLMN ID) included in the SNPN identity (also referred to as SNPN ID) match the MCC and MNC included in the IMSI of the UE. There may be.
  • the Visited SNPN may be an SNPN that the UE can register as a non-home SNPN. Furthermore, the Visited SNPN may be an SNPN that the UE does not register as a home. In addition, the visited SNPN may be an SNPN that the UE does not select first in SNPN selection. Furthermore, the Visited SNPN may be an SNPN in which at least part of the information included in the SNPN identity (also referred to as SNPN ID) does not match at least part of the information included in the IMSI of the UE.
  • SNPN identity also referred to as SNPN ID
  • a Visited SNPN is an SNPN in which the MCC and MNC included in the PLMN Identity (also referred to as PLMN ID) included in the SNPN identity (also referred to as SNPN ID) do not match the MCC and MNC included in the UE's IMSI. There may be.
  • equivalent HSNPN also referred to as equivalent Home SNPN, EHSNPN
  • EHSNPN equivalent Home SNPN
  • HSNPN home SNPN
  • the equivalent HSNPN may be one or more SNPNs included in the equivalent HSNPN list, or may be one or more SNPNs not included in the equivalent VSNPN list.
  • equivalent VSNPN (also referred to as equivalent Visited SNPN, EVSNPN) is mutually equivalent to the current SNPN (herein Visited SNPN (also referred to as VSNPN)) in SNPN selection, cell selection, and/or cell reselection. It may be an SNPN that is considered as a SNPN. Further, the equivalent VSNPN may be one or more SNPNs included in the equivalent VSNPN list, or one or more SNPNs not included in the equivalent HSNPN list.
  • equivalent SNPN may be a concept that includes equivalent HSNPN and/or equivalent VSNPN. That is, ESNPN may refer to equivalent HSNPN and/or equivalent VSNPN.
  • the equivalent HSNPN list (also referred to as EHSNPN list) will be explained.
  • the SNPN code (also referred to as SNPN identity, SNPN ID) that is present in the EHSNPN list is required when selecting an SNPN. or for SNPN selection, may be replaced with the HSNPN code obtained from IMSI.
  • the EHSNPN list may also be stored in the USIM.
  • the EHSNPN list may also include HSNPN codes obtained from IMSI. Additionally, if the HSNPN code obtained from IMSI is not present in the EHSNPN list, the HSNPN code may be treated as a Visited SNPN during or for SNPN selection.
  • VSNPN list also referred to as EVSNPN list
  • the SNPN code also referred to as SNPN identity, SNPN ID
  • the EVSNPN list may also be stored in the USIM.
  • the EVSNPN list may also include the HVNPN code obtained from IMSI. Additionally, if the VSNPN code obtained from IMSI is not present in the EVSNPN list, the VSNPN code may be treated as the Home SNPN during or for SNPN selection.
  • the equivalent SNPN list (also referred to as ESNPN list) may be a concept that includes an EHSNPN list and/or an EVSNPN list. That is, the ESNPN list may refer to the EHSNPN list and/or the EVSNPN list.
  • the UE may also store the equivalent SNPN list sent from the network. For example, when the UE receives an MM message (for example, a registration request message or a configuration update command) transmitted from the AMF, the UE may store the equivalent SNPN list included in the MM message.
  • an MM message for example, a registration request message or a configuration update command
  • the UE may treat the equivalent SNPN as being equivalent to the current SNPN (Home SNPN or Visited SNPN).
  • the UE may preferentially select an equivalent SNPN (equivalent Home SNPN) that is treated as equivalent to the Home SNPN.
  • the UE may preferentially select an equivalent SNPN (equivalent Home SNPN), which is treated as equivalent to the Home SNPN. good.
  • the UE may update or delete the equivalent SNPN list each time the registration procedure is completed.
  • the UE may maintain the equivalent SNPN list when powering down. This may be so that it can then be used for SNPN selection when powering up.
  • the UE may delete the equivalent SNPN list when the USIM is removed from the UE or when the UE registered with emergency services enters 5GMM-DEREGISTERED.
  • the AMF may include the equivalent SNPN list in the registration acceptance message during the registration procedure.
  • the equivalent SNPN list may include one or more SNPN codes (also referred to as SNPN IDs), including a combination of a PLMN code (also referred to as PLMN IDs) and an NID. If the registration acceptance message includes an equivalent SNPN list, the UE may update its stored equivalent SNPN list to the received list. Furthermore, if the registration acceptance message does not include the equivalent SNPN list, the UE may delete the stored equivalent SNPN list.
  • the UE shall be registered on the permanently prohibited SNPNs list or the temporarily prohibited SNPNs list.
  • SNPN codes also referred to as SNPN IDs
  • SNPN IDs may be deleted from the equivalent SNPN list.
  • the UE in the registration procedure initiated by the UE, the UE shall be deemed to be an illegal UE, an illegal ME, or 5GS services not allowed, or whose tracking area is Roaming not allowed in this tracking area; or No suitable cells in tracking area; or N1 mode not allowed, or non-3GPP access to 5GCN is not allowed (or non-3GPP access to 5GCN is not allowed, etc.) (Non-3GPP access to 5GCN not allowed) or Temporarily not authorized for this SNPN, or Permanently not authorized for this SNPN (Permanently not authorized for this SNPN), if a registration refusal message with no integrity protection is received that includes a 5GMM cause value indicating that T3517 may be stopped and, if timer T3247 is not running, timer T3247 may be started to delete the equivalent SNPN list.
  • the UE may identify illegal UEs, illegal MEs, 5GS services not allowed, or tracking areas. Roaming not allowed in this tracking area or No suitable cells in tracking area , or N1 mode not allowed, or non-3GPP access to 5GCN is not allowed (or non-3GPP access to 5GCN is not allowed, etc.) Non-3GPP access to 5GCN not allowed, or Temporarily not authorized for this SNPN, or permanently authorized for this SNPN.
  • illegal UEs, illegal MEs, 5GS services not allowed, or tracking areas are not allowed. (Tracking area not allowed), Roaming not allowed in this tracking area, No suitable cells in tracking area, or N1 N1 mode not allowed, or non-3GPP access to 5GCN is not allowed (or non-3GPP access to 5GCN is not allowed, etc.)
  • the UE may include information indicating whether the UE supports the equivalent SNPN or the equivalent SNPN list in the registration request message and transmit it.
  • the AMF may include information indicating whether the network supports the equivalent SNPN or the equivalent SNPN list in the registration acceptance message or the registration rejection message and transmit it. Specifically, the AMF sends a registration acceptance message or registration refusal message to the UE based on information indicating whether the UE supports the equivalent SNPN or the equivalent SNPN list included in the registration request message received from the UE. It may be determined whether to include information indicating whether the network supports equivalent SNPNs or an equivalent SNPN list, and an equivalent SNPN list in the message.
  • the registration request message includes information indicating that the UE supports the equivalent SNPN or the equivalent SNPN list, and the AMF supports the equivalent SNPN list, and the AMF requests the registration. If the AMF allows the UE, the AMF may send a registration acceptance message to the UE, including information indicating that the network supports equivalent SNPNs or an equivalent SNPN list, and including the equivalent SNPN list.
  • the AMF may send a registration acceptance message to the UE that includes information indicating that the network does not support the equivalent SNPN or the equivalent SNPN list, and does not include the equivalent SNPN list.
  • the registration request message includes information indicating that the UE supports the equivalent SNPN or the equivalent SNPN list, and the AMF supports the equivalent SNPN list, and the AMF requests the registration. If not, the AMF may send a registration refusal message to the UE, including information indicating that the network supports equivalent SNPNs or an equivalent SNPN list, and including the equivalent SNPN list.
  • the registration request message includes information indicating that the UE supports equivalent SNPNs or the equivalent SNPN list, and AMF does not support the equivalent SNPN list, and AMF does not support the registration request. If not, the AMF may send a registration refusal message to the UE, including information indicating that the network does not support the equivalent SNPN or the equivalent SNPN list, and not including the equivalent SNPN list.
  • the UE also determines whether the network supports the equivalent SNPN or the equivalent SNPN list based on the information indicating whether the network supports the equivalent SNPN or the equivalent SNPN list, which is included in the registration acceptance message or registration rejection message received from the AMF. You can decide whether to support it or not.
  • the UE may recognize the equivalent SNPN for the current SNPN based on the equivalent SNPN list included in the registration acceptance message or registration rejection message received from the AMF.
  • identification information transmitted, received, and stored and managed by each device will be described.
  • the first identification information may be information indicating whether the UE can receive rejected NSSAI IEs and/or Extended rejected NSSAI IEs that include only mapped S-NSSAIs.
  • the first identification information may be information indicating whether the UE can receive the tenth identification information. In other words, if the UE receives a Rejected S-NSSAI IE indicating a fourth rejected NSSAI, the first identification information is mapped with the S-NSSAI of the current PLMN or SNPN included in the Rejected S-NSSAI IE. - It may be information indicating that a function is provided to recognize when the maximum number of UEs has been reached for which S-NSSAI among the NSSAIs.
  • the first identification information may be information indicating that the UE has the ability to receive a Rejected S-NSSAI IE that does not include the S-NSSAI of the current PLMN or SNPN and includes a mapped S-NSSAI when roaming. . and/or the first identification information is information indicating that the UE has the ability to receive a rejected NSSAI IE that includes a mapped S-NSSAI instead of the S-NSSAI of the current PLMN or SNPN when roaming; It's good.
  • the first identification information is information indicating that the UE can associate the S-NSSAI and/or the mapped S-NSSAI of the current PLMN or SNPN with the backoff timer based on reception of the tenth identification information. It's good.
  • the first identification information may be information indicating whether or not the first function is supported.
  • the first function is a function in which the UE receives a rejected NSSAI IE and/or an Extended rejected NSSAI IE that includes only mapped S-NSSAI, and/or a function in which the UE receives a tenth identification information, and/or a function in which the UE receives a If a Rejected S-NSSAI IE indicating a rejected NSSAI of 4 is received, the maximum UE for which of the S-NSSAI and mapped S-NSSAI of the current PLMN or SNPN included in the Rejected S-NSSAI IE is received.
  • the tenth identification information is information indicating the S-NSSAI that has reached the maximum number of UEs.
  • the tenth identification information may be transmitted and received together with one or more Rejected S-NSSAIIEs indicating the fourth rejected NSSAI.
  • the 10th identification information is for which of the S-NSSAI and mapped S-NSSAI of the current PLMN or SNPN included in the Rejected S-NSSAI IE transmitted and received, the maximum number of UEs is reached.
  • the information may indicate whether the maximum number of UEs has been reached for both S-NSSAIs.
  • the 10th identification information is "The maximum number of UEs that can be registered for the S-NSSAI of the current PLMN or SNPN has been reached" or "The maximum number of UEs that can be registered for the mapped S-NSSAI has been reached.” ” or “the maximum number of UEs that can be registered for both the S-NSSAI and the mapped S-NSSAI of the current PLMN or SNPN has been reached.”
  • the 10th identification information is the rejection reason that was sent and received to which S-NSSAI of the current PLMN or SNPN included in the Rejected S-NSSAI IE and the mapped S-NSSAI. It may be information indicating whether a value or a backoff timer is associated.
  • the tenth identification information may be "that the backoff timer and/or rejection reason value is mapped to the S-NSSAI of the current PLMN or SNPN” or “that the backoff timer and/or rejection reason value is mapped to the S-NSSAI of the current PLMN or SNPN".
  • -NSSAI or “the backoff timer and/or rejection reason value are mapped to both the S-NSSAI and the mapped S-NSSAI of the current PLMN or SNPN.” good.
  • the tenth identification information may be information included in the Extended rejected NSSAI IE, or may be transmitted and received together with the Extended rejected NSSAI IE.
  • the tenth identification information is that the timer value and/or rejection reason value of the backoff timer included in the Extended rejected NSSAI IE is associated with the S-NSSAI of the current PLMN or SNPN included in the Extended rejected NSSAI IE, or It may be information indicating that it is associated with the mapped S-NSSAI included in the Extended rejected NSSAI IE, or with both.
  • the tenth identification information may be a rejection reason value included in the Extended rejected NSSAI IE.
  • the tenth identification information may be information indicating that the S-NSSAI included in the Rejected S-NSSAI IE that was transmitted and received together is configured as a mapped S-NSSAI.
  • the tenth identification information may be information indicating the length of rejected S-NSSAI (Length of Rejected S-NSSAI contents), or may be information indicating “mapped HPLMN SST and mapped HPLMN SD”.
  • procedures used in each embodiment include a registration procedure and a network-initiated de-registration procedure. is included. Each procedure will be explained below.
  • the registration procedure is a procedure for the UE to take the lead in registering with the access network_B and/or the core network_B and/or the DN. As long as the UE is not registered with the network, it can execute this procedure at any timing, such as when turning on the power, for example. In other words, the UE can start this procedure at any timing if it is in a non-registered state (5GMM-DEREGISTERED state). Furthermore, each device (particularly the UE and AMF) can transition to the registered state (5GMM-REGISTED state) based on the completion of the registration procedure. Note that each registration state may be managed by each device for each access. Specifically, each device may independently manage the registration state for 3GPP access (registered state or unregistered state) and the registration state for non-3GPP access.
  • the registration procedure may be used to update the location registration information of the UE in the network, and/or to periodically notify the UE status from the UE to the network, and/or to update certain parameters regarding the UE in the network. This procedure may be used.
  • the UE may start the registration procedure when it performs mobility across TAs (tracking areas). In other words, the UE may start the registration procedure when it moves to a TA different from the TA indicated in the TA list (TAI list or registration area) it holds. Furthermore, the UE may initiate this procedure when a running backoff timer or other timer expires. Additionally, the UE may initiate a registration procedure when the context of each device needs to be updated due to disconnection or invalidation of a PDU session. Additionally, the UE may initiate a registration procedure if there is a change in the capability information and/or preferences regarding the UE's PDU session establishment. Furthermore, the UE may periodically initiate a registration procedure.
  • the UE shall be notified based on the completion of the Generic UE configuration update procedure, or on the completion of the registration procedure, or on the completion of the PDU session establishment procedure, or on the completion of the PDU session management procedure.
  • the registration procedure may be initiated based on or based on information received from the network in each procedure or based on expiration or termination of a backoff timer. Note that the UE is not limited to these, and can execute the registration procedure at any timing.
  • the above-mentioned procedure for a UE to transition from a state where it is not registered to the network to a state where it is registered is referred to as an initial registration procedure or a registration procedure for initial registration.
  • the registration procedure performed while the UE is registered in the network can be replaced by a registration procedure for mobility and periodic registration update or a registration procedure for mobility and periodic registration update. Good as mobility and periodic registration procedure).
  • the registration procedure for mobility and periodic registration updates is the registration procedure for mobility registration update and the registration procedure for periodic registration update. (registration update) and may be an independent procedure.
  • the new AMF 141 in FIG. 6 indicates the AMF in which the UE_A10 is registered through this procedure, and the old AMF 142 indicates the AMF in which the UE was registered in the procedure prior to this procedure. If no AMF change occurs during this procedure, the interface between old AMF142 and new AMF141 and the procedure between old AMF142 and new AMF141 will not occur, and new AMF141 may be the same device as old AMF142. In this embodiment, when AMF is written, it may mean new AMF141, old AMF142, or both. Note that new AMF141 and old AMF142 may be AMF140.
  • the UE_A 10 starts the registration procedure by transmitting a registration request message to the new AMF 141 (S600) (S602) (S604). Specifically, the UE transmits an RRC message including a registration request message to the 5G AN 120 (or gNB) (S600).
  • the registration request message is a NAS message sent and received on the N1 interface.
  • the RRC message may be a control message transmitted and received between the UE and the 5G AN 120 (or gNB).
  • NAS messages are processed at the NAS layer, and RRC messages are processed at the RRC layer. Note that the NAS layer is a layer higher than the RRC layer.
  • the UE_A10 can include at least the first identification information in the registration request message and/or the RRC message and transmit it. Furthermore, UE_A10 may send the registration request message and/or RRC message including identification information indicating the type of this procedure.
  • the identification information indicating the type of this procedure may be 5GS registration type IE, and this procedure is for initial registration (initial registration), or for updating registration information due to movement (mobility registration updating), or Information indicating that the registration procedure is for periodic registration updating, emergency registration, or SNPN onboarding registration. It's good.
  • UE_A10 may send a registration request message including 5GS registration type IE indicating initial registration. If this procedure is a registration procedure for updating registration information due to movement, UE_A10 may send a registration request message including 5GS registration type IE indicating mobility registration updating. If this procedure is a registration procedure for periodic registration information update, UE_A10 may send a registration request message including 5GS registration type IE indicating periodic registration updating. If this procedure is an emergency registration, the UE_A10 may send a registration request message including 5GS registration type IE indicating emergency registration. If this procedure is a registration procedure for SNPN onboarding service, UE_A10 may send a registration request message including 5GS registration type IE indicating SNPN onboarding registration.
  • the UE_A10 may include UE capability information in the registration request message in order to notify the network of the functions supported by the UE_A10.
  • the capability information of the UE may be the 5G MM capability IE of 5GS.
  • the first identification information may be information included in the 5G MM capability IE of the 5GS.
  • information indicating that the first function is supported may be set in the first identification information and transmitted.
  • the UE_A10 may send these identification information and/or IE in a different control message, for example, a control message of a layer lower than the RRC layer (e.g., MAC layer, RLC layer, PDCP layer). good.
  • the UE_A10 may indicate that the UE_A10 supports each function, may indicate a UE request, or may indicate both of these. .
  • two or more of these pieces of identification information may be configured as one or more pieces of identification information.
  • the information indicating support for each function and the information indicating a request to use each function may be transmitted and received as the same identification information, or may be transmitted and received as different identification information.
  • UE_A10 If UE_A10 is equipped with a function for managing the maximum number of UEs connected to a slice, or if it requests at least one S-NSSAI that requires management for managing the maximum number of UEs connected to a slice, UE_A10 Capability information indicating that a function for managing the number of UEs is supported may be transmitted. The UE_A10 may notify the network that it has the ability to store the fourth rejected NSSAI by transmitting capability information.
  • the UE_A10 is equipped with NSSAA functionality, or the S-NSSAI that identifies the slice that requires NSSAA and/or the S-NSSAI that identifies the slice that requires NSSAA is mapped S-NSSAI, at least one If a registration request message is requested, capability information indicating that the NSSAA function is supported may be included in the registration request message and sent. By transmitting capability information indicating that it supports the NSSAA function, UE_A10 requests the network to treat this UE as a UE equipped with the NSSAA function, and to perform authentication and authorization procedures using the NSSAA function in procedures related to the UE. You may.
  • the requested NSSAI IE includes the requested NSSAI consisting of the S-NSSAI (SST and/or SD) of the requesting PLMN or SNPN, and the “requested NSSAI” consisting of the S-NSSAI (SST and/or SD) of the HPLMN or HSNPN. may include one or more "mapped S-NSSAI".
  • the UE when the UE is not roaming, the UE may include the requested NSSAI in the registration request message, and when the UE is roaming, the UE may include the requested NSSAI and one or more mapped S-NSSAIs for the requested NSSAI in the registration request message. You may send it by including it in
  • the UE may include the requested NSSAI in the registration request message.
  • the UE stores "allowed NSSAI associated with a PLMN different from the PLMN requested by the UE or an SNPN different from the SNPN requested by the UE, and an access type requested by the UE", the allowed NSSAI or if the TAI included in the registration area to which the S-NSSAI included in the allowed NSSAI is associated belongs to the PLMN or SNPN requested by the UE, the UE includes the requested NSSAI in the registration request message and sends the request to the requested PLMN or SNPN. You can also send it.
  • the UE_A10 may determine the information included in the requested NSSAI based on one or more NSSAIs stored by the UE.
  • the one or more NSSAIs stored by the UE are, for example, the allowed NSSAI associated with the requesting PLMN or SNPN and the requesting access type, and/or one or more mapped S-NSSAIs for the allowed NSSAI, and/or the requesting PLMN. or configured NSSAI associated with the SNPN, and/or one or more mapped S-NSSAI for that configured, and/or default configured NSSAI, and/or rejected NSSAI associated with the requesting PLMN or SNPN, and/or its rejected There may be one or more mapped S-NSSAI to NSSAI. Additionally/or, the one or more NSSAIs stored by the UE may be the pending NSSAI associated with the requesting PLMN or SNPN, or one or more mapped S-NSSAIs for the pending NSSAI.
  • the one or more NSSAIs stored by the UE may be an allowed NSSAI associated with a PLMN or SNPN other than the PLMN or SNPN requested by the UE and an access type requested by the UE, and/or the allowed NSSAI one or more mapped S-NSSAIs to and/or a PLMN or SNPN other than the requesting PLMN or SNPN and a second rejected NSSAI associated with the current registration area, and/or to that second rejected NSSAI; It may be one or more mapped S-NSSAIs.
  • the UE_A10 may also store mapped S-NSSAIs included in each NSSAI stored by the UE.
  • the set of mapped S-NSSAIs may be expressed as one or more mapped S-NSSAIs for each NSSAI, or may be expressed as a list of mapped S-NSSAIs for each NSSAI.
  • the UE may select one or more S-NSSAIs from the stored allowed NSSAIs and/or configured NSSAIs, include them in the requested NSSAI IE, and transmit them.
  • the UE_A10 stores the allowed NSSAI associated with the requested PLMN or SNPN and the requested access type, the UE_A10 stores the allowed NSSAI, or a portion thereof, in the requested NSSAI IE, In other words, one or more S-NSSAI included in the allowed NSSAI may be included in the transmission.
  • the UE_A10 may store the configured NSSAI, or a portion thereof, in the requested NSSAI, i.e. one or more S -NSSAI, may be included in the transmission.
  • UE_A10 stores a list of mapped S-NSSAIs of allowed NSSAIs associated with the requested PLMN or SNPN and/or access type
  • UE_A10 includes mapped S-NSSAIs of S-NSSAIs in the requested NSSAI IE.
  • NSSAI SST and/or SD
  • the UE_A10 stores a list of mapped S-NSSAIs in the configured NSSAI associated with the requested PLMN or SNPN
  • the UE_A10 includes in the requested NSSAI IE the mapped S-NSSAI(SST and / or SD) may select a mapped S-NSSAI included in the list of mapped S-NSSAIs in the configured NSSAI, include the selected mapped S-NSSAI in the requested NSSAI IE, and send it.
  • UE_A10 when roaming, sends one or more S-NSSAI IEs consisting of the S-NSSAI of the current PLMN or SNPN and the mapped S-NSSAI of HPLMN or HSNPN to the requested NSSAI IE in the registration request message. You may send it by including it.
  • the UE_A10 stores "an allowed NSSAI associated with a PLMN other than the requesting PLMN or an SNPN other than the requesting SNPN and the requesting access type," the UE_A10 further stores the allowed NSSAI or the allowed NSSAI. If the TAI included in the associated registration area (TAI list) is associated with the requesting PLMN or requesting SNPN, the UE_A10 sends the requested NSSAI, the allowed NSSAI, or the allowed NSSAI The requested NSSAI may be included in the requested NSSAI IE and sent.
  • UE_A10 specifies in the requested NSSAI that the UE stores "S-NSSAI included in the allowed NSSAI associated with a PLMN other than the requesting PLMN or an SNPN other than the requesting SNPN and a registration area" or "S-NSSAI included in the allowed NSSAI associated with the registration area" "S-NSSAI associated with a registration area included in the allowed NSSAI associated with a PLMN other than the PLMN or an SNPN other than the requesting SNPN" may be included.
  • the requested NSSAI may include one or more of the above S-NSSAIs. However, the UE_A10 may control so that one or more S-NSSAIs included in the requested NSSAI do not overlap.
  • the first to fourth rejected NSSAIs may mean the first to fourth rejected NSSAIs associated with the requesting PLMN or EPLMN, or the requesting SNPN or ESNPN.
  • the UE_A10 may transmit the S-NSSAI included in the rejected NSSAI without including it in the requested NSSAI IE.
  • the UE_A10 if the UE_A10 memorizes "the first rejected NSSAI associated with the requesting PLMN or SNPN", the UE_A10 transmits the S-NSSAI included in the first rejected NSSAI without including it in the requested NSSAI. You may. In other words, the UE_A10 performs control so that one or more S-NSSAIs included in the requested NSSAI are no longer included in the "first rejected NSSAI associated with the requested PLMN or SNPN" stored by the UE. It's fine.
  • UE_A10 also stores the list of mapped S-NSSAIs for "the first rejected NSSAI associated with the requesting PLMN or SNPN", the configured NSSAIs are not included in the list of mapped S-NSSAIs of the first rejected NSSAI. If one or more mapped S-NSSAIs included in the list of mapped S-NSSAIs are stored, the S-NSSAI of the current PLMN or SNPN to which the mapped S-NSSAIs are mapped shall be included in the requested NSSAIs.
  • the UE_A10 may be controlled so that the
  • UE_A10 stores one or more mapped S-NSSAIs for the first rejected NSSAI during roaming, it also stores one or more mapped S-NSSAIs for the first rejected NSSAI stored by UE_A10, but one or more mapped S-NSSAIs for the configured NSSAIs. If UE_A10 remembers one or more mapped S-NSSAIs included in the above mapped S-NSSAIs, the UE stores the S-NSSAIs included in the first rejected NSSAI to which the mapped S-NSSAIs are associated. - It may be sent along with NSSAI in the registration request message.
  • the UE_A10 stores at least one "second rejected NSSAI associated with the requesting PLMN or EPLMN or SNPN or ESNPN and the current registration area"
  • the UE_A10 stores in those second rejected NSSAI
  • the included S-NSSAI may be sent without being included in the requested NSSAI.
  • UE_A10 associates one or more S-NSSAIs included in the requested NSSAI with each "requesting PLMN or EPLMN, or requesting SNPN or ESNPN, and current registration area" stored by UE_A10. Control may be performed to eliminate the S-NSSAI included in "Second rejected NSSAI".
  • the information indicating the current registration area stored by UE_A10 includes a TAI that belongs to one or more PLMNs different from the requesting PLMN or one or more SNPNs different from the requesting SNPN, the different one or more PLMNs or SNPN is EPLMN of the requesting PLMN or ESNPN of the requesting SNPN, and UE_A10 indicates that one or more S-NSSAI included in the requested may control the S-NSSAI to no longer be included in the second rejected NSSAI associated with one PLMN or SNPN and the current registration area.
  • UE_A10 will inform the requested NSSAI of each "different one". or a second rejected NSSAI associated with one PLMN or SNPN of the plurality of PLMNs or SNPNs and the current registration area.
  • the UE_A10 also stores the list of mapped S-NSSAIs for "the second rejected NSSAI associated with the requesting PLMN or EPLMN, or SNPN or ESNPN, and the current registration area", the second rejected NSSAI If one or more mapped S-NSSAIs are stored that are not included in the list of mapped S-NSSAIs in the configured NSSAI but are included in the list of mapped S-NSSAIs in the configured NSSAI, the current PLMN to which the mapped S-NSSAIs are mapped. Alternatively, the UE_A10 may control the S-NSSAI of the SNPN so that it can be included in the requested NSSAI.
  • UE_A10 stores one or more mapped S-NSSAIs for the second rejected NSSAI during roaming, it also stores one or more mapped S-NSSAIs for the second rejected NSSAIs stored by UE_A10, but one or more mapped S-NSSAIs for the configured NSSAIs. If UE_A10 remembers one or more mapped S-NSSAIs included in the above mapped S-NSSAIs, the S-NSSAIs included in the second rejected NSSAI to which that mapped S-NSSAI is associated are - May be sent along with NSSAI in the registration request message.
  • the UE_A10 may transmit the S-NSSAI included in the third rejected NSSAI without including it in the requested NSSAI IE. Good too. In other words, the UE_A10 controls the one or more S-NSSAIs included in the requested NSSAI IE to no longer be the S-NSSAI included in the "third rejected NSSAI associated with the requested PLMN or SNPN" stored by the UE_A10. You can go.
  • the UE_A10 stores at least one "third rejected NSSAI associated with the EPLMN of the requesting PLMN or the ESNPN of the requesting SNPN".
  • the UE_A10 stores the requested S-NSSAI included in the third rejected NSSAI. It may be sent without being included in the NSSAI IE.
  • UE_A10 determines that one or more S-NSSAIs included in the requested NSSAI IE are included in each "third rejected NSSAI associated with the EPLMN of the requesting PLMN or the ESNPN of the requesting SNPN" stored by _UE_A10. Control that is no longer S-NSSAI may be performed.
  • the S-NSSAI of the current PLMN or SNPN included in the registration request message is the same as that of the first rejected NSSAI.
  • the UE_A10 may be controlled so that it is not included in the second rejected NSSAI.
  • UE_A10 may be controlled as such.
  • the mapped S-NSSAI of the first rejected NSSAI that the UE_A10 remembers UE_A10 remembers a mapped S-NSSAI that is not included in the list of mapped S-NSSAIs in the second rejected NSSAI that UE_A10 remembers, but is included in the list of mapped S-NSSAIs in the configured NSSAI.
  • the S-NSSAI of the current PLMN or SNPN included in the registration request message may be controlled by the UE_A10 so that it may be included in the first rejected NSSAI or the second rejected NSSAI stored by the UE_A10.
  • the S-NSSAI of the current PLMN or SNPN to include in the registration request message regardless of whether the UE_A10 remembers the mapped S-NSSAI of the first rejected NSSAI or the mapped S-NSSAI of the second rejected NSSAI. may be controlled by UE_A10 as not included in the third rejected NSSAI.
  • the S-NSSAI of the current PLMN or SNPN included in the registration request message is neither the first rejected NSSAI stored by UE_A10 nor the second rejected NSSAI stored by UE_A10, nor the third rejected NSSAI stored by UE_A10.
  • UE_A10 may be controlled so that it is not included in rejected NSSAI.
  • the mapped S-NSSAI of the first rejected NSSAI that the UE_A10 stores UE_A10 remembers the mapped S-NSSAIs that are not included in the list of S-NSSAIs or the list of mapped S-NSSAIs of the second rejected NSSAI that UE_A10 remembers, but are included in the list of mapped S-NSSAIs of Configured NSSAIs. If so, the mapped S-NSSAI of the current PLMN or SNPN may be controlled by the UE_A10 so that it can be included in the registration request message.
  • the S-NSSAI of the current PLMN or SNPN to which the mapped S-NSSAI is mapped may mean the S-NSSAI of the current PLMN or SNPN mapped to the mapped S-NSSAI.
  • Controlling the ability to include the S-NSSAI of the current PLMN or SNPN mapped to the mapped S-NSSAI in the registration request message means to store and/or manage the S-NSSAI that is available.
  • the mapped S-NSSAI of the first rejected NSSAI stored by UE_A10 is also UE_A10 remembers the mapped S-NSSAIs that are not included in the list of S-NSSAIs or the list of mapped S-NSSAIs of the second rejected NSSAI that UE_A10 remembers, but are included in the list of mapped S-NSSAIs of Configured NSSAIs.
  • the UE_A10 may be controlled by the UE_A10 to include the S-NSSAI of the current PLMN or SNPN mapped to the mapped S-NSSAI together with the mapped S-NSSAI in the Registration Request message if the UE_A10 has the mapped S-NSSAI.
  • the mapped S-NSSAI included in the registration request message is is a mapped S-NSSAI that is not included in the list of mapped S-NSSAIs in the first rejected NSSAI that is remembered nor in the list of mapped S-NSSAIs in the second rejected NSSAI that UE_A10 remembers, so that it is controlled by UE_A10 It's okay to be.
  • the S-NSSAI included in the configured NSSAI associated with the mapped S-NSSAI shall be included in the requested NSSAI together with the mapped S-NSSAI in the registration request message. be able to.
  • the S-NSSAI included in the third rejected NSSAI is controlled not to be included in the requested NSSAI, and when the UE is roaming, the S-NSSAI included in the third rejected NSSAI is controlled so that it is not included in the requested NSSAI.
  • the S-NSSAI associated with the NSSAI as a mapped S-NSSAI does not need to be included in the requested NSSAI.
  • the S-NSSAI of the current PLMN or SNPN included in the requested NSSAI is included in the configured NSSAI for the current PLMN or SNPN, and is not included in the third rejected NSSAI. .
  • the S-NSSAI of the current PLMN or SNPN included in the requested NSSAI is included in the configured NSSAI for the current PLMN or SNPN, and the S-NSSAI included in the third rejected NSSAI is NSSAI is not associated.
  • the UE may include one or more S-NSSAIs in the requested NSSAI that are included in the configured NSSAI for the current PLMN or SNPN and are not included in the third rejected NSSAI. It's fine.
  • the UE sends an S-NSSAI to the requested NSSAI that is included in the configured NSSAI for the current PLMN or SNPN, and the S-NSSAI included in the third rejected NSSAI is not associated. May be included.
  • the UE when the UE roams, if there is one or more S-NSSAIs included in one or more mapped S-NSSAIs stored for configured NSSAIs that are not included in the third rejected NSSAI, the UE will The S-NSSAI included in the configured NSSAI for the current PLMN or SNPN associated as the S-NSSAI can be sent in the registration request message along with its mapped S-NSSAI. Specifically, in that case, the UE configures the requested NSSAI IE using its mapped S-NSSAI and the NSSAI IE that contains the S-NSSAI that the mapped S-NSSAI is associated with. You may do so.
  • the UE_A10 will Alternatively, the S-NSSAI related to that S-NSSAI may be sent without being included in the requested NSSAI.
  • the S-NSSAI to which the backoff timer is associated is the S-NSSAI associated with the requesting PLMN or SNPN, or the S-NSSAI included in the NSSAI associated with the requesting PLMN or SNPN.
  • the UE_A10 may transmit its S-NSSAI without including it in the requested NSSAI while the backoff timer is counting or until the backoff timer expires or is stopped.
  • the backoff timer associated with an S-NSSAI included in the fourth rejected NSSAI is valid and/or while the backoff timer is running, that S-NSSAI is valid; and /or may mean that the fourth rejected NSSAI is valid.
  • the fourth rejected NSSAI is valid. It may also mean that NSSAI mapped S-NSSAI is valid.
  • the valid fourth rejected NSSAI and/or the list of mapped S-NSSAIs of the fourth rejected NSSAI are managed by the UE_A10 whether or not the backoff timer is running, then the valid fourth rejected NSSAI and/or Alternatively, the valid mapped S-NSSAI list of the fourth rejected NSSAI may be the fourth rejected NSSAI stored by the UE_A10 and/or the list of mapped S-NSSAIs of the fourth rejected NSSAI stored by the UE_A10.
  • the UE_A10 does not include the S-NSSAI of the requested PLMN or SNPN to which that S-NSSAI is mapped in the requested NSSAI. You may send it to
  • the UE may transmit the S-NSSAI included in the fourth rejected NSSAI without including it in the requested NSSAI. good.
  • the UE controls one or more S-NSSAIs included in the requested NSSAI to no longer be the S-NSSAI included in the "fourth rejected NSSAI associated with the requested PLMN or SNPN" stored by the UE. It's fine.
  • the requested PLMN or SNPN may have the same meaning as the registered PLMN or SNPN.
  • the UE may set the S-NSSAI included in the fourth rejected NSSAI to the requested NSSAI. You may send without including it. In other words, the UE controls one or more S-NSSAIs included in the requested NSSAI to cease to be the S-NSSAI included in each "fourth rejected NSSAI associated with the EPLMN of the requesting PLMN or the ESNPN of the SNPN". You can go.
  • UE_A10 determines that one or more S-NSSAIs included in the requested NSSAI are mapped S-NSSAI(s) of rejected NSSAI stored by UE_A10, and/or mapped S-NSSAI(s) of pending NSSAI, And/or control may be performed so that the S-NSSAI of HPLMN or HSNPN included in the fourth rejected NSSAI is not included as the mapped S-NSSAI.
  • UE_A10 controls not to include in the requested NSSAI the S-NSSAI of the current PLMN or SNPN to which the S-NSSAI included in the rejected NSSAI and/or pending NSSAI and/or the fourth rejected NSSAI is mapped. You can.
  • the S-NSSAI included in the requested NSSAI generated by UE_A10 is the mapped S-NSSAI of that S-NSSAI, which is the rejected NSSAI stored by UE_A10, and/or the pending NSSAI, and/or the fourth rejected NSSAI.
  • the rejected NSSAI may be at least one of the first to fourth rejected NSSAIs, and includes the S-NSSAI of HPLMN or HSNPN.
  • UE_A10 when UE_A10 roams, if UE_A10 remembers the mapped S-NSSAI of the fourth valid rejected NSSAI, it is also not included in the list of mapped S-NSSAIs of the first rejected NSSAI that UE_A10 remembers, but the Configured If UE_A10 remembers the mapped S-NSSAI included in the mapped S-NSSAI list of NSSAI, the current PLMN or SNPN S-NSSAI included in the registration request message may be included in the fourth rejected NSSAI. OK, UE_A10 may control as such.
  • the UE_A10 may control so that the S-NSSAI of the current PLMN or SNPN included in the registration request message is not included in the fourth rejected NSSAI.
  • UE_A10 when UE_A10 is roaming, if UE_A10 stores the mapped S-NSSAI list of the fourth rejected NSSAI, even though it is not included in the mapped S-NSSAI list of the fourth rejected NSSAI stored by UE_A10, If UE_A10 remembers a mapped S-NSSAI included in the list of mapped S-NSSAIs in the Configured NSSAI, the S-NSSAI of the current PLMN or SNPN to which the mapped S-NSSAI is mapped is included in the registration request message. It may be controlled so that it can be done.
  • the S-NSSAI of the current PLMN or SNPN to which the mapped S-NSSAI is mapped may mean the S-NSSAI of the current PLMN or SNPN mapped to the mapped S-NSSAI.
  • Controlling the ability to include the S-NSSAI of the current PLMN or SNPN mapped to the mapped S-NSSAI in the registration request message means to store and/or manage the S-NSSAI that is available.
  • the list of mapped S-NSSAIs of the fourth rejected NSSAI stored by UE_A10 does not include the list of mapped S-NSSAIs. If UE_A10 remembers a mapped S-NSSAI included in the list of mapped S-NSSAIs in the Configured NSSAI, the S-NSSAI of the current PLMN or SNPN to which that mapped S-NSSAI is mapped is stored together with the mapped S-NSSAI. It may be controlled so that it can be included in the registration request message.
  • the UE may transmit the S-NSSAI included in the pending NSSAI without including it in the requested NSSAI IE.
  • the UE may control one or more S-NSSAIs included in the requested NSSAI IE to no longer be the S-NSSAIs included in the "pending NSSAIs associated with the requested PLMN or SNPN" stored by the UE. .
  • the UE shall not include the S-NSSAI included in the pending NSSAI in the requested NSSAI IE. You can also send it. In other words, the UE has control over which one or more S-NSSAIs included in the requested NSSAI IE cease to be S-NSSAIs included in each "pending NSSAI associated with the EPLMN of the requesting PLMN or the ESNPN of the requesting SNPN". You can go.
  • the UE_A10 also stores the list of mapped S-NSSAIs of "pending NSSAI associated with the ESNPN of the requesting PLMN or EPLMN or the requesting SNPN" (hereinafter referred to as "pending NSSAI"), the list of mapped S-NSSAIs of the pending NSSAI If one or more mapped S-NSSAIs that are not included and are included in the list of mapped S-NSSAIs in the configured NSSAI are stored, the S-NSSAI of the current PLMN or SNPN to which the mapped S-NSSAI is mapped is UE_A10 may control so that it can be included in the requested NSSAI.
  • the S-NSSAI of the current PLMN or SNPN or the S-NSSAI of the HPLMN or HSNPN may be controlled by the UE_A10 so that the S-NSSAI is not included in the pending NSSAIs stored by the UE_A10.
  • the mapped S-NSSAI for the configured NSSAI is not included in the mapped S-NSSAI for the pending NSSAI stored by UE_A10. If UE_A10 remembers one or more mapped S-NSSAIs included in the list, the UE requests to register the pending NSSAIs to which the mapped S-NSSAIs are associated and the S-NSSAIs included in the configured NSSAIs along with the mapped S-NSSAIs. You can include it in a message and send it.
  • the behavior when the UE is roaming or not roaming when the UE does not store the mapped S-NSSAI for the pending NSSAI will be described.
  • the S-NSSAI included in the pending NSSAI stored by the UE must be the S-NSSAI of HPLMN or HSNPN, regardless of whether roaming or non-roaming. It can mean
  • the S-NSSAI included in the pending NSSAI is controlled not to be included in the requested NSSAI, and when the UE is roaming, the S-NSSAI included in the pending NSSAI is controlled so that it is not included in the mapped S-NSSAI.
  • S-NSSAI associated as NSSAI does not need to be included in requested NSSAI.
  • requested NSSAI may be included in requested NSSAI IE.
  • the S-NSSAI of the current PLMN or SNPN included in the requested NSSAI is included in the configured NSSAI for the current PLMN or SNPN, and is not included in the pending NSSAI.
  • the S-NSSAI of the current PLMN or SNPN included in the requested NSSAI is included in the configured NSSAI for the current PLMN or SNPN, and the S-NSSAI included in the pending NSSAI is associated. I can't.
  • the UE may include in the requested NSSAI one or more S-NSSAIs that are included in the configured NSSAI for the current PLMN or SNPN and are not included in the pending NSSAI.
  • the UE may include in the requested NSSAI any S-NSSAI that is included in the configured NSSAI for the current PLMN or SNPN and to which no S-NSSAI included in the pending NSSAI is associated. .
  • the UE when the UE roams, if there is one or more S-NSSAIs included in one or more mapped S-NSSAIs stored for configured NSSAIs that are not included in the pending NSSAIs, the UE The S-NSSAI included in the configured NSSAI for the current PLMN or SNPN associated as SNPN can be sent in the registration request message along with its mapped S-NSSAI. Specifically, in that case, the UE configures the requested NSSAI IE using its mapped S-NSSAI and the NSSAI IE that contains the S-NSSAI that the mapped S-NSSAI is associated with. You may do so.
  • the following describes the S-NSSAI and/or mapped S-NSSAI to be included in the requested NSSAI IE when UE_A10 stores S-NSSAI in at least one of the first to fourth rejected NSSAI and pending NSSAI.
  • the control method and/or the requested NSSAI IE generation method will be explained in general.
  • the first to fourth rejected NSSAIs and pending NSSAIs herein may mean the first to fourth rejected NSSAIs and pending NSSAIs associated with the requesting PLMN or EPLMN or the requesting SNPN or ESNPN.
  • the mapped S-NSSAI for the first rejected NSSAI includes the current PLMN or SNPN in the registration request message.
  • the UE_A10 may control the S-NSSAI so that it is not included in the first rejected NSSAI, the second rejected NSSAI, or the pending NSSAI.
  • UE_A10 stores the mapped S-NSSAI of the first rejected NSSAI and/or the mapped S-NSSAI of the second rejected NSSAI and/or the mapped S-NSSAI of the pending NSSAI, the It is not included in the list of mapped S-NSSAIs in the first rejected NSSAI, nor in the list of mapped S-NSSAIs in the second rejected NSSAI that UE_A10 remembers, nor in the list of mapped S-NSSAIs in the pending NSSAI that UE_A10 remembers.
  • the S-NSSAI of the current PLMN or SNPN to be included in the registration request message is the first rejected NSSAI or the second S-NSSAI.
  • the UE_A10 may control the UE_A10 to include two rejected NSSAIs or pending NSSAIs.
  • the current PLMN or SNPN S-NSSAI included in the registration request message is not included in the first rejected NSSAI, the second rejected NSSAI, the third rejected NSSAI, or the pending NSSAI. No, UE_A10 may be controlled as such.
  • UE_A10 when UE_A10 roams, if UE_A10 stores a list of mapped S-NSSAIs for the first rejected NSSAI, mapped S-NSSAIs for the second rejected NSSAI, or mapped S-NSSAIs for the pending NSSAI, the UE_A10 also stores It is included in the list of mapped S-NSSAIs of the first rejected NSSAI, the list of mapped S-NSSAIs of the second rejected NSSAI stored by UE_A10, and the list of mapped S-NSSAIs of pending NSSAIs stored by UE_A10.
  • the UE_A10 remembers a mapped S-NSSAI that is included in the list of mapped S-NSSAIs in the Configured NSSAI, the S-NSSAI of the current PLMN or SNPN to which that mapped S-NSSAI is mapped is registered. It may be controlled so that it can be included in a message.
  • the S-NSSAI of the current PLMN or SNPN with which the mapped S-NSSAI is associated may mean the S-NSSAI of the current PLMN or SNPN mapped to the mapped S-NSSAI.
  • Controlling the ability to include the S-NSSAI of the current PLMN or SNPN mapped to the mapped S-NSSAI in the registration request message means to store and/or manage the S-NSSAI that is available.
  • UE_A10 when UE_A10 is roaming, if UE_A10 stores a list of mapped S-NSSAIs for the first rejected NSSAI, mapped S-NSSAIs for the second rejected NSSAI, or mapped S-NSSAIs for the pending NSSAI, the UE_A10 also stores It is included in the list of mapped S-NSSAIs of the first rejected NSSAI, the list of mapped S-NSSAIs of the second rejected NSSAI stored by UE_A10, and the list of mapped S-NSSAIs of pending NSSAIs stored by UE_A10.
  • the UE_A10 remembers a mapped S-NSSAI included in the list of mapped S-NSSAIs in the Configured NSSAI, the S-NSSAI of the current PLMN or SNPN mapped to that mapped S-NSSAI is stored as that mapped S-NSSAI. - May be controlled by the UE_A10 so that it can be included in the Registration Request message along with the NSSAI.
  • the UE_A10 stores the mapped S-NSSAI of the first rejected NSSAI and/or the mapped S-NSSAI of the second rejected NSSAI and/or the pending NSSAI when the UE_A10 roams, the mapped S-NSSAI to be included in the registration request message.
  • -NSSAI is included in the list of mapped S-NSSAIs of the first rejected NSSAI stored by UE_A10, the list of mapped S-NSSAIs of the second rejected NSSAI stored by UE_A10, and the pending NSSAIs stored by UE_A10. There is no mapped S-NSSAI, so it may be controlled by UE_A10.
  • the S-NSSAI and/or mapped S-NSSAI included in the requested NSSAI IE are the mapped S-NSSAI(s) and/or It may be controlled so that it is not included in mapped S-NSSAI(s) for pending NSSAI.
  • the UE_A10 may include other identification information in the registration request message and/or the RRC message containing the registration request message, for example, the UE ID and/or PLMN ID and/or NID and/or AMF identification information.
  • the AMF identification information may be information that identifies an AMF or a set of AMFs, such as 5G S-TMSI (5G S-Temporary Mobile Subscription Identifier) or GUAMI (Globally Unique AMF Identifier). It's fine.
  • the UE_A10 includes and transmits an SM message (for example, a PDU session establishment request message) in a registration request message, or by transmitting an SM message (for example, a PDU session establishment request message) together with a registration request message.
  • the PDU session establishment procedure may be initiated during the registration procedure.
  • the UE_A10 determines whether or not to send these identification information to the network based on the UE's capability information, and/or the UE policy, and/or the UE's status, and/or the user's registration information, and/or the UE's It may be selected and determined based on the context to be held.
  • the 5G AN 120 When the 5G AN 120 (or gNB) receives the RRC message including the registration request message, it selects an AMF to which to transfer the registration request message (S602). Note that the 5G AN 120 (or gNB) can select an AMF based on one or more pieces of identification information included in the registration request message and/or the RRC message including the registration request message.
  • the 5G AN120 may select AMF based on the requested NSSAI.
  • the 5G AN may select an AMF that is included in or has connectivity to the network slice identified by the S-NSSAI included in the requested NSSAI.
  • the AMF selection method is not limited to this, and the 5G AN (or gNB) may select the AMF based on conditions other than this.
  • the 5G AN (or gNB) extracts the registration request message from the received RRC message and transfers the registration request message to the selected new AMF (S604).
  • the 5G AN (or gNB) may transfer the identification information included in the RRC message but not included in the registration request message to the selected AMF (new AMF141) together with the registration request message (S604). .
  • the new AMF 141 When the new AMF 141 receives the registration request message, it can perform the first condition determination.
  • the first condition determination is for determining whether the network (or new AMF 141) accepts the UE request. If the first condition determination is true, the new AMF141 executes the procedures from S606 to S612. On the other hand, if the first condition determination is false, the new AMF 141 may execute the procedure of S610 without executing the procedures of S606 to S608.
  • the new AMF 141 may perform the first condition determination after requesting the UE context from the old AMF 142 and receiving the UE context from the old AMF 142 (S606, S608). In that case, the new AMF 141 may execute S610 and/or S612 if the first condition determination is true. On the other hand, the new AMF 141 may execute S610 if the first condition determination is false.
  • control message sent and received in S610 may be a registration accept message, and if the first condition determination is false, The control message sent and received at S610 may be a registration reject message.
  • the first condition determination is based on reception of a registration request message, and/or each identification information included in the registration request message, subscriber information, and/or network capability information, and/or operator policy, and/or each identification information included in the registration request message. It may be executed based on the state of the network, the user's registration information, the context held by the AMF, and/or the like.
  • the first condition determination may be true; if the network does not permit the UE's request, the first condition determination may be false. Furthermore, if the network to which the UE is registered and/or the equipment within the network supports the function requested by the UE, the first condition determination is true, and the function requested by the UE is not supported. In this case, the first condition determination may be false. Furthermore, if the identification information to be transmitted and received is permitted, the first condition determination may be true, and if the identification information to be transmitted and received is not permitted, the first condition determination may be false.
  • the AMF further determines that the result of the NSSAA procedure of the corresponding S-NSSAI for the UE is successful. If it is remembered that there is, the first condition determination may be true. Alternatively, if there is no S-NSSAI to be allowed to the UE and there is no plan to allocate an allowed NSSAI to the UE in the future, the first condition determination may be false.
  • the first condition determination may be true if it is expected that an allowed NSSAI will be assigned to the UE in the future.
  • the AMF will inform the NSACF of the S-NSSAI and the current access type. and start the NSACF procedure to check whether the maximum number of UEs for each S-NSSAI has been reached.
  • the AMF may execute the above NSACF procedure for both the S-NSSAI of the current PLMN or SNPN and the mapped S-NSSAI.
  • the AMF can receive and recognize the results for each S-NSSAI (whether or not the maximum number of registered UEs has been reached) from the NSACF.
  • the NSACF procedure may be executed during this procedure (registration procedure), or it may be executed independently of this procedure and after this procedure.
  • the first condition determination may be true or false.
  • the new AMF141 executes the procedures of S606 and S608, and the AMF included in the message received by the new AMF141 from the UE_A10 If the AMF indicated in the identification information is new AMF141, the procedures in S606 and S608 are not executed. In other words, if an AMF change occurs as a result of this procedure, the procedures in S606 and S608 are executed, and if no AMF change occurs, the procedures in S606 and S608 are skipped.
  • the UE context transfer procedure (S606, S608) will be explained.
  • the new AMF 141 sends a UE context request message to the old AMF 142 (S606).
  • the old AMF 142 transmits the UE context to the new AMF 141 based on the received UE context request message.
  • the new AMF 141 generates a UE context based on the received UE context.
  • the UE context sent from the new AMF 141 to the old AMF 142 may include the UE ID and allowed NSSAI.
  • the UE context may include a configured NSSAI and/or a rejected NSSAI, an NSSAI and/or a pending NSSAI, and/or a fourth rejected NSSAI.
  • the allowed NSSAI, and/or configured NSSAI, and/or rejected NSSAI, and/or pending NSSAI, and/or the fourth rejected NSSAI, and the S-NSSAI included in each NSSAI, included in the UE context are sent to the UE.
  • Information regarding whether or not the notification has been completed may be linked.
  • the UE context includes information on S-NSSAI that requires NSSAA procedures, and/or information indicating that the NSSAA procedure has been completed for the UE, information indicating that authentication was successful, and/or information indicating that authentication has failed. may be included.
  • the UE context includes S-NSSAI information that requires management of the maximum number of UEs connected to a slice, and/or information indicating that the maximum number of UEs has been reached, and/or information indicating that the maximum number of UEs connected to a slice has been reached. It may also include information indicating whether or not.
  • the information regarding the characteristics of these S-NSSAIs may be managed as a single piece of information, and specifically, the network can determine, for each S-NSSAI, whether NSSAA is required or not, and whether NSSAA was successful or not. , information indicating whether the maximum number of UEs connected to a slice needs to be managed and whether the maximum number of UEs connected to a slice has been reached may be stored in association with each other.
  • the new AMF 141 may transmit a control message to the UE based on the first condition determination and/or based on receiving the UE context from the old AMF 142 (S610).
  • the control message may be a registration acceptance message or a registration rejection message.
  • the new AMF 141 may include pending NSSAI in the control message and transmit it.
  • the new AMF141 may include configured NSSAI, and/or allowed NSSAI, and/or rejected NSSAI, and/or pending NSSAI in the control message and send it to the UE_A10. .
  • the message sent by the new AMF 141 to the UE may be based on information received from the UE.
  • the S-NSSAI included in the rejected NSSAI that the new AMF 141 transmits to the UE may be the S-NSSAI included in the requested NSSAI received from the UE.
  • new AMF141 does not have an S-NSSAI (allowed NSSAI) to allow the UE at the time of sending the control message, but if there is a plan to execute the NSSAA procedure after or in parallel with this procedure, or if the UE If the NSSAA procedure is being executed between networks, or if the pending NSSAI IE is included in the control message and sent, an empty value may be included in the allowed NSSAI and sent.
  • S-NSSAI allowed NSSAI
  • new AMF141 does not allow S-NSSAI (allowed NSSAI) to the UE when sending a control message, but when including Allowed NSSAI in the control message, it also notifies the UE of the fourth rejected NSSAI before this procedure. If so, you may include an empty value in allowed NSSAI and send it.
  • the new AMF 141 may include Allowed NSSAI in the control message using the Allowed NSSAI IE.
  • the Allowed NSSAI IE may include one or more S-NSSAIs of the current PLMN or SNPN.
  • the Allowed NSSAI IE may include one or more mapped S-NSSAIs.
  • the S-NSSAI of the PLMN or SNPN included in the Allowed NSSAI IE may be referred to as the current Allowed S-NSSAI of the PLMN or SNPN.
  • one or more Allowed S-NSSAIs may be referred to as Allowed NSSAIs of the current PLMN or SNPN.
  • the mapped S-NSSAI included in the Allowed NSSAI IE may be referred to as the mapped S-NSSAI of the Allowed NSSAI of PLMN or SNPN. and one or more mapped S-NSSAI(s) for the Allowed NSSAI of the current PLMN or SNPN (mapped S-NSSAI(s) for the Allowed NSSAI) It can be called.
  • the new AMF 141 may include the rejected NSSAI in the control message using the rejected NSSAI IE or the Extended rejected NSSAI IE.
  • the new AMF 141 may include the rejected NSSAI IE or the Extended rejected NSSAI IE in the control message.
  • the rejected NSSAI IE or Extended rejected NSSAI IE may include one or more S-NSSAIs of the current PLMN or SNPN.
  • the new AMF 141 may include the value of the backoff timer in the control message when including the rejected NSSAI in the control message using the Extended rejected NSSAI IE.
  • the new AMF 141 may include the backoff timer value in the Extended rejected NSSAI IE and further include the Extended rejected NSSAI IE in the control message and transmit it.
  • the Extended rejected NSSAI IE may include one or more mapped S-NSSAIs.
  • the S-NSSAI of the current PLMN or SNPN included in the Extended rejected NSSAI IE shall be referred to as the rejected S-NSSAI of the current PLMN or SNPN, and one or more rejected S-NSSAI shall be referred to as the rejected NSSAI of the current PLMN or SNPN. It's good.
  • the new AMF 141 may include the pending NSSAI in the control message using the pending NSSAI IE.
  • the pending NSSAI IE may include one or more S-NSSAIs of the current PLMN or SNPN. Additionally/or when roaming, the pending NSSAI IE may include one or more mapped S-NSSAIs.
  • the new AMF 141 may include the tenth identification information in a control message and transmit it to the UE.
  • the new AMF 141 may determine whether to include the tenth identification information in the control message and transmit it, and the information to be transmitted, based on the reception of the first identification information.
  • the new AMF141 when the new AMF141 receives the first identification information, and/or when the first identification information is set with information indicating that the UE is equipped with a function to receive the tenth identification information. , and/or when recognizing that the maximum number of registered UEs has been reached for the mapped S-NSSAI through the NSACF procedure, the new AMF 141 may include the tenth identification information in the control message and transmit it.
  • UE_A10 receives a control message and/or one or more pieces of information included in the control message from the network.
  • the UE_A10 may recognize the received information based on receiving the control message and/or one or more pieces of information included in the control message.
  • the UE may store and/or update the information regarding the NSSAI and start and/or stop a timer; Details of the method are explained in Section 3.3, NSSAI Update and/or Storage Procedures.
  • NSSAI update and/or storage procedure in Chapter 3.3 may be executed during or after the completion of this procedure. If the NSSAI update and/or storage procedure in Section 3.3 is performed after the completion of this procedure, it may be performed based on the completion of this procedure.
  • the UE may perform the NSSAI update and/or storage procedure of Section 3.3.
  • the UE may start running a timer using the received timer value.
  • the timer value included in the Extended rejected NSSAI IE may be a backoff timer value, in which case the timer executed by the UE may be a backoff timer.
  • the UE executes the backoff timer in association with the S-NSSAI and/or mapped S-NSSAI indicated in the Extended rejected NSSAI IE, or the combination of the S-NSSAI and mapped S-NSSAI indicated in the Extended rejected NSSAI IE. You may do so.
  • the AMF shall include the identification information and/or notification information in the control message in accordance with each received identification information and/or subscriber information, and/or network capability information, and/or operator policy, and The selection and determination may be made based on the state of the network, the user's registration information, and/or the context held by the AMF.
  • the AMF may include and transmit an SM message (for example, a PDU session establishment accept message) in the registration accept message, or send an SM message (for example, a PDU session establishment accept message) together with the registration accept message. acceptance message) can be sent.
  • this transmission method may be performed when an SM message (for example, a PDU session establishment request message) is included in the registration request message. Further, this transmission method may be executed when an SM message (for example, a PDU session establishment request message) is transmitted together with a registration request message. By performing such a transmission method, the AMF can indicate in the registration procedure that the procedure for the SM has been accepted.
  • the AMF may also collect each received identification information, and/or subscriber information, and/or network capability information, and/or operator policy, and/or network status, and/or user registration information, and/or Based on the context etc. held by the AMF, sending a registration accept message may indicate that the UE's request has been accepted, or sending a registration reject message may indicate that the UE's request has been rejected. may also be shown.
  • the UE receives the control message via the 5G AN (gNB) (S608). If the control message is a registration acceptance message, by receiving the registration acceptance message, the UE recognizes that the UE's request in the registration request message has been accepted and the contents of various identification information included in the registration acceptance message. can do. Alternatively, if the control message is a registration refusal message, the UE, by receiving the registration refusal message, can confirm that the UE's request based on the registration request message has been rejected, and the contents of various identification information included in the registration refusal message. can be recognized. Furthermore, if the UE does not receive the control message even after a predetermined period has elapsed after transmitting the registration request message, the UE may recognize that the UE's request has been rejected.
  • the control message is a registration acceptance message
  • the UE by receiving the registration acceptance message, the UE recognizes that the UE's request in the registration request message has been accepted and the contents of various identification information included in the registration acceptance message. can do.
  • the UE can transmit a registration completion message to the AMF via the 5G AN (gNB) as a response message to the registration acceptance message (S610).
  • the UE may include the SM message such as the PDU session establishment completion message in the registration completion message, or send it by including the SM message. , may indicate that the procedure for SM has been completed.
  • the registration completion message is a NAS message sent and received on the N1 interface, but is included in an RRC message and sent and received between the UE and 5G AN (gNB).
  • AMF receives the registration completion message via 5G AN (gNB) (S612). Furthermore, each device completes this procedure based on sending and receiving a registration acceptance message and/or a registration completion message.
  • gNB 5G AN
  • each device may complete the registration procedure based on sending and receiving registration rejection messages.
  • each device may transition to or maintain a state in which the UE is registered in the network (RM_REGISTERED state or 5GMM-REGISTERED state) based on the transmission and reception of the registration acceptance message and/or registration completion message. , based on the transmission and reception of registration refusal messages, the UE transitions to the state (RM_DEREGISTERED state, or 5GMM-DEREGISTERED state) on which the UE received the registration refusal message for the current PLMN or SNPN, or You may maintain it. Furthermore, the transition of each device to each state may be performed based on the transmission and reception of a registration completion message or the completion of a registration procedure.
  • each device may perform processing based on the information transmitted and received in the registration procedure, based on the completion of the registration procedure. For example, if information indicating that some of the UE's requests have been rejected is sent or received, the reason why the UE's requests were rejected may be recognized. Furthermore, each device may perform this procedure again based on the reason why the UE request was rejected, or may perform the registration procedure with respect to core network_A or another cell.
  • the UE may store the identification information received with the registration acceptance message and/or the registration rejection message and may recognize the network's decision based on the completion of the registration procedure.
  • the UE may delete one or more stored NSSAIs based on the completion of the registration procedure. Specifically, if UE_A10 transitions to the unregistered state on both accesses (3GPP access and non-3GPP access) for the current PLMN or SNPN based on the completion of this procedure, UE_A10 The first rejected NSSAI and/or the third rejected NSSAI and/or the fourth rejected NSSAI may be deleted.
  • UE_A10 transitions to a non-registered state on certain accesses (3GPP access and non-3GPP access) to the current PLMN or SNPN, or if UE_A10 transitions to a non-registered state in a new registration area. If the registration procedure is successful, or if the UE_A10 transitions from the unregistered state to the registered state on an access as a result of performing the registration procedure in a new registration area, the UE_A10 registers the current PLMN or SNPN and the current registered The second rejected NSSAI associated with the area and/or its access type may be deleted.
  • each device may start the registration procedure again based on the expiration or stop of the backoff timer.
  • each device may start the registration procedure again based on updating the stored NSSAI.
  • each device may initiate an SM procedure by transmitting and receiving SM messages based on the transition to or maintenance of the state in which the UE is registered with the network (RM_REGISTERED state or 5GMM-REGISTERED state).
  • each device may appropriately complete the registration procedure and update its stored information and/or status.
  • the UE configuration update procedure (Generic UE configuration update procedure) will be explained using FIG. 7.
  • the UE configuration update procedure will also be referred to as this procedure.
  • This procedure is a procedure for the core network to update the configuration information of the UE.
  • This procedure may be a procedure for mobility management that is executed on the initiative of the network for the UE registered in the network.
  • devices in the core network may initiate this procedure based on network configuration updates and/or operator policy updates.
  • the trigger for this procedure may be the detection of UE mobility, the detection of a change in the state of the UE and/or the access network, and/or the core network, or the detection of a change in the state of the network slice. It may be. Additionally, the trigger for this procedure may be the receipt of a request from the DN and/or the DN's application server, a change in network settings, or a change in operator policy. . Additionally, the trigger for this procedure may be the expiration of a running timer.
  • the trigger for this procedure may be executed based on the completion of an NSACF procedure that was not executed during the registration procedure.
  • this procedure may be performed at any timing after the above-mentioned registration procedure and/or PDU session establishment procedure is completed. Furthermore, this procedure may be executed at any timing as long as each device has established a 5GMM context and/or is in 5GMM connection mode.
  • each device sends and receives messages containing identification information for changing the configuration information of the UE and/or identification information for stopping or changing the functions that the UE is performing. Good too. Further, based on the completion of this procedure, each device may update its configuration information to the settings instructed by the network, or may start a behavior instructed by the network.
  • the UE may update its configuration information based on the control information transmitted and received through this procedure. Further, the UE may stop the function it is currently executing or may start a new function as the UE configuration information is updated.
  • the device in the core network takes the lead in this procedure, and furthermore, by sending the control message and control information of this procedure to the UE, the device in the core network uses these control information to generate configuration information of the UE that can be identified. , the UE may be updated. Furthermore, by updating the configuration information of the UE, the device in the core network may stop the function that the UE is executing, or may cause the UE to start a new function.
  • the AMF 140 starts the UE configuration update procedure by transmitting a configuration update command message to the UE_A 10 via the 5G AN 120 (or gNB) (S800).
  • the new AMF141 will update the configuration information of the UE, include the pending NSSAI in the configuration update command message, and if the UE supports the function of storing one or more mapped S-NSSAI of the pending NSSAI. , the tenth identification information may be included in the configuration update command message and transmitted.
  • UE_A10 receives the configuration update command message and/or the tenth identification information from the network. More specifically, the UE receives a configuration update command message and/or tenth identification information from the new AMF 141.
  • UE_A10 may recognize the received information based on reception of the tenth identification information.
  • the AMF 140 may include one or more of the NSSAIs related to the UE_A 10 (hereinafter referred to as configured NSSAI, allowed NSSAI, rejected NSSAI, and pending NSSAI) in the configuration update command message.
  • the AMF may indicate new UE configuration information or request update of UE configuration information by transmitting one or more of the NSSAIs.
  • the information indicating support for each function and the information indicating a request to use each function may be transmitted and received as the same identification information, or may be transmitted and received as different identification information.
  • the AMF 140 may include and transmit a TAI list indicating the new registration area in the configuration update command message.
  • the new AMF 141 may include the tenth identification information in a configuration update command message and transmit it to the UE.
  • the new AMF 141 may determine whether to include the tenth identification information in the configuration update command message and transmit it, and the information to be transmitted, based on the reception of the first identification information.
  • the AMF receives the first identification information and/or the first identification information is information indicating that the UE supports the function of receiving the tenth identification information.
  • the new AMF 141 may include and transmit the tenth identification information in the configuration update command message.
  • the UE_A10 receives one or more pieces of information included in the control message and/or the configuration update command message from the network.
  • two or more of these pieces of identification information may be configured as one or more pieces of identification information.
  • the information indicating support for each function and the information indicating a request to use each function may be transmitted and received as the same identification information, or may be transmitted and received as different identification information.
  • the AMF 140 determines whether to include each NSSAI and TAI list in the configuration update command message based on each received identification information and/or subscriber information and/or network capability information and/or operator policy and/or The selection and determination may be made based on the network state, the user's registration information, and/or the context held by the AMF 140.
  • the AMF 140 also receives each received identification information and/or subscriber information and/or network capability information and/or operator policy and/or network status and/or user registration information and/or A request to update the configuration information of the UE_A 10 may be indicated by transmitting a configuration update command message based on the context held by the AMF 140.
  • UE_A10 receives a configuration update command message from AMF140 via 5G AN120 (or gNB) (S800).
  • UE_A10 may update the configuration information of the UE based on the configuration update command message and/or the identification information included in the configuration update command message.
  • UE_A10 receives a TAI list indicating the registration area, it will enable the received TAI list indicating the registration area, and if UE_A10 has already memorized a valid TAI list indicating the registration area, it will register the registration area. Old TAI lists indicating areas may be deleted or disabled.
  • the valid TAI list indicating the registration area may be expressed as the registration area.
  • the valid TAI list indicating the registration area is It may be in a state where it is not stored.
  • the UE_A10 may appropriately store each received NSSAI. Furthermore, based on the received NSSAI, the stored information regarding the NSSAI of UE_A10 may be updated. Furthermore, the information regarding NSSAI stored by UE_A10 may be deleted and/or updated based on the state of UE_A10. The specific behavior of the NSSAI storage update method by UE_A10 and the update conditions are explained in Section 3.3, NSSAI update and/or storage procedure.
  • NSSAI update and/or storage procedure in Chapter 3.3 may be executed during or after the completion of this procedure, or may be executed after the completion of this procedure based on the completion of this procedure.
  • the behavior of each device based on the sending and receiving of the configuration update command message and/or the identification information included in the configuration update command message is the control message, and/or the behavior of each device based on the transmission and reception of identification information included in the control message.
  • the UE Based on the identification information included in the configuration update command message, the UE sends a configuration update complete message to the AMF140 via the 5G AN (gNB) as a response message to the configuration update command message. Good (S802).
  • the AMF 140 receives the configuration update completion message via the 5G AN (gNB) (S802). Furthermore, each device completes this procedure based on sending and receiving the settings update command message and/or the settings update completion message.
  • each device may perform processing based on the information transmitted and received in this procedure, based on the completion of this procedure. For example, when updating information on configuration information is transmitted and received, each device may update the configuration information. Furthermore, when the UE_A10 transmits/receives information indicating that execution of the registration procedure is necessary, the UE_A10 may start the registration procedure based on the completion of this procedure.
  • the UE_A10 may store the identification information received along with the configuration information command message or may recognize the network decision based on the completion of this procedure. Further, the UE may execute each procedure based on the stored information based on the completion of this procedure.
  • devices in the core network can instruct the UE to update the configuration information that the UE has already applied, and can update the configuration information that the UE is currently applying. It is possible to instruct the suspension or change of functions.
  • each device may appropriately complete the UE configuration update procedure and update the stored information and/or status.
  • NSSAI update and/or storage procedures a procedure for updating and/or storing each NSSAI stored by the UE_A10 will be described.
  • the NSSAI update procedure by the UE may be executed during each of the other procedures described in Chapter 3, or may be executed based on the completion of each procedure. It may also be executed during other procedures or upon completion of other procedures. Other procedures may be, for example, a deregistration procedure or a UE configuration update procedure.
  • the UE_A10 When the UE_A10 receives the configured NSSAI, it may store the received configured NSSAI as the "configured NSSAI associated with the current PLMN or SNPN.” That is, the UE_A10 may replace the "configured NSSAI associated with the current PLMN or SNPN stored in the UE_A10" with the "received configured NSSAI".
  • the UE_A10 may delete the mapped S-NSSAI of the S-NSSAI included in the "configured NSSAI associated with the current PLMN or SNPN stored by the UE_A10". Furthermore, if the "received configured NSSAI" includes one or more mapped S-NSSAIs, the UE_A10 may store the one or more mapped S-NSSAIs.
  • the UE_A10 may delete the "rejected NSSAI stored by the UE_A10 and associated with the current PLMN or SNPN".
  • the UE_A10 receives a configured NSSAI, it sends "the first rejected NSSAI that the UE_A10 remembers and is associated with the current PLMN or SNPN" and "the first rejected NSSAI that the UE_A10 remembers and is associated with the current PLMN or SNPN". At least one of "second rejected NSSAI” and "third rejected NSSAI stored by UE_A10 and associated with the current PLMN" may be deleted.
  • the UE_A10 may include "the fourth rejected NSSAI stored by the UE_A10" and/or "the fourth rejected NSSAI stored by the UE_A10 and associated with the current PLMN or SNPN"; /or one or more "fourth rejected NSSAI stored by UE_A10 and associated with EPLMN of the current PLMN or ESNPN of the current SNPN" may be deleted.
  • the UE_A10 may include "pending NSSAI stored by UE_A10", and/or "pending NSSAI stored by UE_A10 and associated with the current PLMN or SNPN", and/or one or more "pending NSSAI stored by UE_A10 and associated with EPLMN of current PLMN or ESNPN of current SNPN” and/or "one or more for pending NSSAI stored by UE_A10 and associated with current PLMN or SNPN” "mapped S-NSSAI” and/or "one or more mapped S-NSSAIs of a second pending NSSAI stored by UE_A10 and associated with the EPLMN of the current PLMN or the ESNPN of the current SNPN" may be deleted.
  • the UE_A10 when the UE_A10 receives the allowed NSSAI, it may store the received allowed NSSAI as "the allowed NSSAI associated with the current PLMN or SNPN and the current access type.” That is, the UE_A10 may replace the "allowed NSSAI associated with the current PLMN or SNPN and the current access type" stored in the UE_A10 with the "received allowed NSSAI".
  • UE_A10 receives TAI list and allowed NSSAI from new AMF141, and furthermore, if at least one TAI included in TAI list belongs to EPLMN or ESNPN, "the EPLMN or ESNPN to which the TAI included in TAI list belongs and the current The UE_A10 may replace the "allowed NSSAI" associated with the access type with the received allowed NSSAI.
  • the UE_A10 may store the allowed NSSAI in association with the registration area, or may store the S-NSSAI included in the allowed NSSAI in association with the registration area.
  • UE_A10 When UE_A10 receives an allowed NSSAI, it may delete the mapped S-NSSAI of the S-NSSAI included in the "allowed NSSAI deleted based on reception" or the "old allowed NSSAI updated based on reception". Furthermore, if the "received allowed NSSAI IE" includes a mapped S-NSSAI, the UE_A10 may store the one or more mapped S-NSSAIs.
  • the UE_A10 may delete the S-NSSAI that is "rejected NSSAI stored by the UE_A10 and associated with the current PLMN or SNPN.”
  • UE_A10 When UE_A10 receives Allowed NSSAI, it may delete the S-NSSAI included in the received Allowed NSSAI from the first rejected NSSAI and/or second rejected NSSAI stored by UE_A10 under the following conditions: .
  • the conditions for deleting the S-NSSAI from the first rejected NSSAI and/or second rejected NSSAI stored by the UE_A10 may be when the UE_A10 is not roaming, or when the S-NSSAI is mapped to the S-NSSAI.
  • mapped S-NSSAI of one rejected NSSAI and/or a second rejected NSSAI may not be stored in UE_A10 as a set of mapped S-NSSAIs of the first rejected NSSAI and/or second rejected NSSAI, or the mapped S-NSSAI of that S-NSSAI may not be stored in the UE_A10 as a set of mapped S-NSSAIs of the first rejected NSSAI and/or second rejected. At least one mapped S-NSSAI of one rejected NSSAI and/or a second rejected NSSAI was stored in the UE_A10, and all those mapped S-NSSAIs were included in the Allowed NSSAI received by the UE.
  • the mapped S-NSSAI of that S-NSSAI may not be included in the Allowed NSSAI received by UE_A10, or the S-NSSAI may be associated with multiple mapped S-NSSAIs. This may be the case even if it is not.
  • the UE_A10 When the UE_A10 receives the Allowed NSSAI, it does not need to delete the S-NSSAI included in the received Allowed NSSAI from the first rejected NSSAI and/or the second rejected NSSAI stored by the UE_A10.
  • the conditions for not deleting the S-NSSAI from the first rejected NSSAI and/or the second rejected NSSAI that UE_A10 remembers are when UE_A10 is roaming and/or when UE_A10 has mapped S-NSSAI for that S-NSSAI.
  • first rejected NSSAI and/or the second rejected NSSAI is stored in a list (set) of mapped S-NSSAIs and/or associated with multiple mapped S-NSSAIs, and/or all of them mapped S-NSSAI is not included in the new Allowed NSSAI and/or pending NSSAI.
  • condition for deleting the S-NSSAI included in the received Allowed NSSAI from the fourth rejected NSSAI and/or pending NSSAI stored by UE_A10 is that the UE_A10 stores the S-NSSAI included in the received Allowed NSSAI.
  • the conditions for removal from the first rejected NSSAI and/or the second rejected NSSAI may be the same.
  • UE_A10 is allowed to include a list of mapped S-NSSAIs for a new Allowed NSSAI when roaming, if it remembers the mapped S-NSSAIs for the first rejected NSSAI and/or the mapped S-NSSAIs for the second rejected NSSAI.
  • UE_A10 stores one or more mapped S-NSSAIs that are not included in the mapped S-NSSAI list of the new Allowed NSSAI and/or the list of mapped S-NSSAIs of the first rejected NSSAI.
  • UE_A10 remembers the S-NSSAIs included in the new Allowed NSSAI from the first rejected NSSAI and/or the second rejected NSSAI, unless the second rejected NSSAI is included in the list of mapped S-NSSAIs. Delete NSSAI.
  • the UE_A10 remembers the mapped S-NSSAI of the first rejected NSSAI and/or the mapped S-NSSAI of the second rejected NSSAI when roaming, the list of mapped S-NSSAIs of the new Allowed NSSAI If an Allowed NSSAI IE is received that is not included in the list of mapped S-NSSAIs in the new Allowed NSSAI, UE_A10 remembers the list of mapped S-NSSAIs in the first rejected NSSAI and/or mapped in the second rejected NSSAI.
  • UE_A10 stores the S-NSSAIs included in the new Allowed NSSAIs from the first rejected NSSAI and/or second rejected NSSAI. -Remove NSSAI.
  • the list of mapped S-NSSAIs of the new Allowed NSSAI If an Allowed NSSAI IE that includes is received, the S-NSSAI to be deleted is included in the received Allowed NSSAI, and The S-NSSAI included in the list of mapped S-NSSAIs of the Allowed NSSAI mapped to that S-NSSAI is added to the S-NSSAI included in the list of mapped S-NSSAIs of the first rejected NSSAI mapped to that S-NSSAI. All of the S-NSSAIs included in the mapped S-NSSAI list of the NSSAI and/or the second rejected NSSAI are included.
  • UE_A10 When UE_A10 is not roaming or when UE_A10 is roaming and the mapped S-NSSAI of the first rejected NSSAI does not remember the mapped S-NSSAI of the second rejected NSSAI, UE_A10 is allowed to include a new Allowed NSSAI.
  • the UE_A10 When receiving the NSSAI IE, the UE_A10 deletes the S-NSSAI included in the new Allowed NSSAI from the stored first rejected NSSAI and/or second rejected NSSAI.
  • UE_A10 When UE_A10 receives an Allowed NSSAI during roaming, it behaves so as not to remove the S-NSSAI of the current PLMN or SNPN included in the new Allowed NSSAI from the first rejected NSSAI and/or the second rejected NSSAI. You may do so.
  • UE_A10 When UE_A10 receives an Allowed NSSAI during roaming, it behaves to remove the S-NSSAI of the current PLMN or SNPN included in the new Allowed NSSAI from the first rejected NSSAI and/or the second rejected NSSAI. You may do so.
  • the UE_A10 When the UE_A10 stores first information consisting of an S-NSSAI and a mapped S-NSSAI in each NSSAI during roaming, the UE_A10 stores the first rejected NSSAI and/or the second rejected NSSAI. and the combination of S-NSSAI and mapped S-NSSAI included in the received Allowed NSSAI IE from the set of mapped S-NSSAIs of the first rejected NSSAI and/or the set of mapped S-NSSAIs of the second rejected NSSAI. You may delete it.
  • the UE_A10 when the UE_A10 receives an allowed NSSAI, the UE_A10 sends "the first rejected NSSAI that the UE_A10 remembers and is associated with the current PLMN or SNPN" and "the first rejected NSSAI that the UE_A10 remembers and is associated with the current PLMN or SNPN". associated with the current PLMN or SNPN and the current registration area;
  • the S-NSSAI included in the received allowed NSSAI and/or the mapped S-NSSAI of the received allowed NSSAI may be deleted from at least one of the third rejected NSSAI associated with the PLMN or SNPN.
  • the S-NSSAI included in the allowed NSSAI received from all NSSAIs and/or the mapped S-NSSAI of the received allowed NSSAI may be deleted.
  • the UE_A10 may delete the S-NSSAI included in the received allowed NSSAI from the second pending NSSAI associated with the second pending NSSAI. Furthermore, when the UE_A10 receives the allowed NSSAI, it may delete the mapped S-NSSAI included in the received allowed NSSAI IE from the "first pending NSSAI stored by the UE_A10 (during roaming)". Furthermore, when the UE_A10 receives the allowed NSSAI, it may delete the S-NSSAI included in the received allowed NSSAI from "pending NSSAIs stored by the UE_A10 and associated with EPLMN or ESNPN”.
  • the UE will You may also stop the timer.
  • the allowed NSSAI may be associated with a PLMN ID or SNPN ID indicating the current PLMN or current SNPN, ie RPLMN or RSNPN.
  • the UE_A10 may delete the S-NSSAI included in the received allowed NSSAI from "the fourth rejected NSSAI that the UE_A10 remembers and is associated with the current PLMN or SNPN".
  • the UE_A 10 may store the S-NSSAI included in the received rejected NSSAI as an appropriate rejected NSSAI based on the rejection reason value associated with that S-NSSAI. That is, the UE_A10 may add "S-NSSAI included in the received rejected NSSAI" to the rejected NSSAI stored in the UE_A10.
  • the UE_A10 may be added to the first rejected NSSAI associated with the PLMN or SNPN.
  • the UE_A10 receives the rejection reason value "S-NSSAI not possible in the current registration area" and the rejected S-NSSAI associated with the rejection reason value, the UE_A10 receives the "received rejected S-NSSAI". , may be added to the "second rejected NSSAI associated with the current PLMN or SNPN and the current registration area.”
  • the UE_A10 receives the rejection reason value "S-NSSAI not possible due to NSSAA failure or cancellation" and the rejected S-NSSAI associated with the rejection reason value, the UE_A10 will ' may be added to the 'Third rejected NSSAI'. At this time, the "third rejected NSSAI" may be associated with the current PLMN or SNPN.
  • the current registration area is indicated by the received TAI list.
  • the UE_A10 does not receive the TAI list together with the rejected NSSAI, the current registration area is indicated by the TAI list that the UE_A10 previously received and stored.
  • UE_A10 may be added to and/or stored in the third rejected NSSAI. Note that when the UE stores the third rejected NSSAI associated with the current PLMN or SNPN, it adds and/or stores the received S-NSSAI to the third rejected NSSAI associated with the current PLMN or SNPN. You can.
  • the UE_A10 may delete the S-NSSAI included in the received rejected NSSAI from the "allowed NSSAIs stored by the UE_A10 and associated with the current PLMN or SNPN".
  • UE_A10 receives a rejected NSSAI that includes the S-NSSAI of HPLMN or HSNPN, the mapped S of the S-NSSAI included in "allowed NSSAI stored by UE_A10 and associated with the current PLMN or SNPN" - If the NSSAI is included in the rejected NSSAI received by the UE_A10, the UE_A10 may remove the S-NSSAI from the "allowed NSSAIs stored by the UE_A10 and associated with the current PLMN or SNPN".
  • the UE_A10 receives a rejected NSSAI, it will receive the "first pending NSSAI (when not roaming) that the UE_A10 remembers and is associated with the current PLMN or SNPN" and/or "the first pending NSSAI that the UE_A10 remembers and is associated with the current PLMN or SNPN” and/or "the first pending NSSAI that the UE_A10 remembers and is associated with the current PLMN or SNPN” or the second pending NSSAI associated with the SNPN, the S-NSSAI included in the received rejected NSSAI may be deleted.
  • the UE_A10 When the UE_A10 receives the rejected NSSAI, it may further delete the mapped S-NSSAI or S-NSSAI included in the received allowed NSSAI IE from the "first pending NSSAI stored by the UE_A10". Furthermore, when the UE_A10 receives a rejected NSSAI, it may delete the S-NSSAI included in the received allowed NSSAI from "pending NSSAIs stored by the UE_A10 and associated with EPLMN or ESNPN".
  • the UE_A10 may delete the S-NSSAI included in the received allowed NSSAI from "the fourth rejected NSSAI that the UE_A10 remembers and is associated with the current PLMN or SNPN".
  • the UE_A10 When the UE_A10 receives one or more S-NSSAIs included in the rejected NSSAI, it may store the S-NSSAI based on the rejection reason value associated with each S-NSSAI. Specifically, the UE_A10 may include and store the S-NSSAI included in the received rejected NSSAI in each rejected NSSAI and/or the mapped S-NSSAI set of each rejected NSSAI that the UE_A10 stores.
  • the rejected S-NSSAI#1 included in the rejected NSSAI IE or Extended rejected NSSAI IE is UE_A10 may include and store S-NSSAI #1 in the first rejected NSSAI stored by the UE. .
  • the rejected S-NSSAI#1 included in the rejected NSSAI IE or Extended rejected NSSAI IE is UE_A10 may include and store S-NSSAI#1 in the second rejected NSSAI stored by the UE.
  • the rejected S-NSSAI#1 included in the rejected NSSAI IE or Extended rejected NSSAI IE is UE_A10 may include S-NSSAI #1 in the third rejected NSSAI stored by the UE and store it.
  • the rejected S-NSSAI#1 included in the Extended rejected NSSAI IE includes S-NSSAI#1, mapped S-NSSAI#1, and "current PLMN or SNPN".
  • UE_A10 stores S-NSSAI#1 as the first rejected NSSAI stored in the UE, and stores mapped S-NSSAI1#1. may be included and stored in the set of mapped S-NSSAIs of the first rejected NSSAI.
  • the UE_A10 may include and store the combination of S-NSSAI#1 and mapped S-NSSAI1#1 in the first rejected NSSAI stored by the UE.
  • the rejected S-NSSAI#1 included in the rejected NSSAI IE or Extended rejected NSSAI IE is UE_A10 may include and store S-NSSAI#1 in the second rejected NSSAI stored by the UE.
  • the UE_A10 may include and store the combination of S-NSSAI#1 and mapped S-NSSAI1#1 in the first rejected NSSAI stored by the UE.
  • UE_A10 when UE_A10 receives a rejected NSSAI IE or Extended rejected NSSAI IE, the rejected S-NSSAI#1 included in the rejected NSSAI IE or Extended rejected NSSAI IE is If the rejection reason value indicating "S-NSSAI not possible due to cancellation" is included, UE_A10 may include and store S-NSSAI #1 in the third rejected NSSAI stored by the UE. Alternatively, under the same conditions, the UE_A10 may include and store the combination of S-NSSAI#1 and mapped S-NSSAI1#1 in the first rejected NSSAI stored by the UE.
  • the UE_A10 When the UE_A10 receives a rejected NSSAI, the UE_A10 stores the first rejected NSSAI and/or the S-NSSAI included in the second rejected NSSAI included in the received rejected NSSAI under the following conditions. You can delete it from The conditions for deleting an S-NSSAI from the Allowed NSSAIs stored by UE_A10 may be when UE_A10 is not roaming, or if the mapped S-NSSAI of that S-NSSAI is a set of mapped S-NSSAIs of Allowed NSSAIs.
  • the mapped S-NSSAI of that S-NSSAI may be included in the mapped S-NSSAI of the Allowed NSSAI stored in the UE_A10, and at least one mapped S-NSSAI of that S-NSSAI is stored in the UE_A10, and All those mapped S-NSSAIs may be included in the first rejected NSSAI and/or the second rejected NSSAI received by the UE, and the mapped S-NSSAI of that S-NSSAI may be , the S-NSSAI may not be included in the first rejected NSSAI and/or the second rejected NSSAI received by the UE_A10, and the S-NSSAI may not be associated with multiple mapped S-NSSAIs. Good too.
  • the mapped S-NSSAI of that S-NSSAI is not included in the first rejected NSSAI and/or second rejected NSSAI received by UE_A10, it means that the mapped S-NSSAI of that S-NSSAI is not included in the first rejected NSSAI and/or second rejected NSSAI received by UE_A10. It may be the case that the UE_A10 receives the NSSAI and/or the second rejected NSSAI, the mapped S-NSSAI is not included, the rejected S-NSSAI IE is included, the first rejected NSSAI and/or the second Extended rejected NSSAI IE containing rejected NSSAI may be received.
  • the UE_A10 When the UE_A10 receives a rejected NSSAI, it does not have to delete the first rejected NSSAI and/or the S-NSSAI included in the second rejected NSSAI included in the received rejected NSSAI from the Allowed NSSAI stored by the UE_A10.
  • the conditions for not deleting an S-NSSAI from the Allowed NSSAIs that UE_A10 remembers are if UE_A10 is roaming and/or when UE_A10 deletes the mapped S-NSSAI of that S-NSSAI from the list of mapped S-NSSAIs (aggregated ) and/or is associated with multiple mapped S-NSSAIs, and/or all those mapped S-NSSAIs include the first rejected NSSAI IE received by UE_A10. NSSAI and/or may be rejected if not included in the second NSSAI.
  • the conditions for deleting the first rejected NSSAI and/or the S-NSSAI included in the second rejected NSSAI included in the received rejected NSSAI from the fourth rejected NSSAI stored by UE_A10 are as follows: The conditions may be the same as the conditions for deleting the S-NSSAI included in the first rejected NSSAI and/or the second rejected NSSAI from the Allowed NSSAI stored by the UE_A10.
  • one or more mapped S-NSSAIs included in the Allowed NSSAI are all the first rejected NSSAI and/or If it is not included in the second rejected NSSAI and another mapped S-NSSAI or some mapped S-NSSAI is associated with the said S-NSSAI and included in the first rejected NSSAI and/or the second rejected NSSAI may behave so as not to delete the S-NSSAI from the Allowed NSSAI.
  • the UE_A10 If the UE_A10 receives the first rejected NSSAI and/or the second rejected NSSAI during roaming, the UE_A10 changes the current PLMN or SNPN contained in the first rejected NSSAI and/or the second rejected NSSAI from the Allowed NSSAI. may behave so as not to delete the S-NSSAI.
  • the UE_A10 If the UE_A10 receives the first rejected NSSAI and/or the second rejected NSSAI during roaming, the UE_A10 changes the current PLMN or SNPN contained in the first rejected NSSAI and/or the second rejected NSSAI from the Allowed NSSAI. S-NSSAI may be deleted.
  • UE_A10 When UE_A10 stores the first information consisting of S-NSSAI and mapped S-NSSAI in each NSSAI during roaming, UE_A10 stores information from the set of Allowed NSSAI and mapped S-NSSAI of Allowed NSSAI. , the combination of S-NSSAI and mapped S-NSSAI included in the received Extended rejected NSSAIIE may be deleted.
  • the UE_A10 When the UE_A10 receives a rejected NSSAI, it deletes the S-NSSAI included in the received rejected NSSAI from the Allowed NSSAI of the current PLMN or SNPN and/or the mapped S-NSSAI set of the Allowed NSSAI of the current PLMN or SNPN. It's fine.
  • UE_A10 when UE_A10 receives the third rejected NSSAI, and when roaming, UE_A10 deletes the S-NSSAI included in the third rejected NSSAI from the mapped S-NSSAI set of Allowed NSSAI that it remembers. It's fine.
  • the UE_A10 may delete the stored Allowed NSSAI and the S-NSSAI included in the third rejected NSSAI.
  • the UE_A10 receives the first rejected NSSAI and/or the second rejected NSSAI included in the Extended rejected NSSAI IE, when roaming, the UE_A10 stores the received Extended rejected NSSAI from the mapped S-NSSAI set of Allowed NSSAIs.
  • the first rejected NSSAI included in the NSSAI IE and/or the mapped S-NSSAI included in the second rejected NSSAI may be deleted.
  • the UE_A10 When the UE_A10 receives a rejected NSSAI, the UE_A10 stores the first rejected NSSAI and/or the S-NSSAI included in the second rejected NSSAI contained in the received rejected NSSAI under the following conditions. You can delete it from The conditions for deleting an S-NSSAI from the pending NSSAIs stored by UE_A10 may be when UE_A10 is not roaming, or if the mapped S-NSSAI of that S-NSSAI is a set of mapped S-NSSAIs of Allowed NSSAIs.
  • the mapped S-NSSAI of that S-NSSAI may be stored in the UE_A10, or the mapped S-NSSAI of that S-NSSAI is stored in the UE_A10.
  • Those mapped S-NSSAIs may be included in the first rejected NSSAI and/or the second rejected NSSAI received by the UE, or the mapped S-NSSAI of that S-NSSAI may be may not be included in the received and/or second rejected NSSAI, or the S-NSSAI may not be associated with multiple mapped S-NSSAIs.
  • the mapped S-NSSAI of that S-NSSAI is not included in the first rejected NSSAI and/or second rejected NSSAI received by UE_A10, it means that the mapped S-NSSAI of that S-NSSAI is not included in the first rejected NSSAI and/or second rejected NSSAI received by UE_A10. It may be the case that the UE_A10 receives the NSSAI and/or the second rejected NSSAI, the mapped S-NSSAI is not included, the rejected S-NSSAI IE is included, the first rejected NSSAI and/or the second This may be the case when an Extended rejected NSSAI IE containing a rejected NSSAI is received.
  • the UE_A10 When the UE_A10 receives a rejected NSSAI, it does not have to delete the first rejected NSSAI and/or the S-NSSAI included in the second rejected NSSAI included in the received rejected NSSAI from the Pending NSSAI stored by the UE_A10.
  • the conditions for not deleting an S-NSSAI from the Pending NSSAIs stored by UE_A10 are when UE_A10 is roaming and/or when UE_A10 deletes the mapped S-NSSAI of that S-NSSAI from the mapped S-NSSAI list of Pending NSSAIs ( set) and/or associated with multiple mapped S-NSSAIs, and/or all those mapped S-NSSAIs are stored in the Extended rejected NSSAI IE received by UE_A10. may be rejected NSSAI and/or if not included in a second rejected NSSAI.
  • one or more mapped S-NSSAIs of the S-NSSAI included in the Pending NSSAI are all the same as the first rejected NSSAI. and/or not included in the second rejected NSSAI, and other mapped S-NSSAI or some mapped S-NSSAI are associated with said S-NSSAI and included in the first rejected NSSAI and/or the second rejected NSSAI In this case, the S-NSSAI may not be deleted from the Pending NSSAI.
  • the UE_A10 If the UE_A10 receives the first rejected NSSAI and/or the second rejected NSSAI during roaming, the UE_A10 changes the current PLMN or SNPN contained in the first rejected NSSAI and/or the second rejected NSSAI from the pending NSSAI. may behave so as not to delete the S-NSSAI.
  • the UE_A10 If the UE_A10 receives the first rejected NSSAI and/or the second rejected NSSAI during roaming, the UE_A10 changes the current PLMN or SNPN contained in the first rejected NSSAI and/or the second rejected NSSAI from the Pending NSSAI. S-NSSAI may be deleted.
  • UE_A10 When UE_A10 stores the first information consisting of S-NSSAI and mapped S-NSSAI in each NSSAI during roaming, UE_A10 stores information from the mapped S-NSSAI set of Pending NSSAI and Allowed NSSAI. , the combination of S-NSSAI and mapped S-NSSAI included in the received Extended rejected NSSAIIE may be deleted.
  • the UE_A10 When the UE_A10 receives a rejected NSSAI, it deletes the S-NSSAI included in the received rejected NSSAI from the Allowed NSSAI of the current PLMN or SNPN and/or the mapped S-NSSAI set of the Allowed NSSAI of the current PLMN or SNPN. It's fine.
  • UE_A10 when UE_A10 receives the third rejected NSSAI, and when roaming, UE_A10 deletes the S-NSSAI included in the third rejected NSSAI from the mapped S-NSSAI set of Allowed NSSAI that it remembers. It's fine.
  • the UE_A10 may delete the stored pending NSSAI and the S-NSSAI included in the third rejected NSSAI.
  • the UE_A10 receives the first rejected NSSAI and/or the second rejected NSSAI included in the Extended rejected NSSAI IE, then when roaming, the UE_A10 remembers the received Extended rejected NSSAI from the mapped S-NSSAI set of the pending NSSAI.
  • the first rejected NSSAI included in the NSSAI IE and/or the mapped S-NSSAI included in the second rejected NSSAI may be deleted.
  • the UE_A10 may delete the S-NSSAI included in the received rejected NSSAI from "the fourth rejected NSSAI that the UE_A10 remembers and is associated with the current PLMN or SNPN". . Furthermore, when the UE_A10 receives the rejected NSSAI, it may delete the S-NSSAI included in the received allowed NSSAI from the "fourth rejected NSSAI stored by the UE_A10 and associated with EPLMN or ESNPN.”
  • the UE shall The backoff timer may be stopped.
  • the UE_A10 may replace the pending NSSAI stored in the UE_A10 with a new pending NSSAI.
  • the UE_A10 receives the pending NSSAI IE included in the registration acceptance message during the registration procedure for the current PLMN or SNPN
  • the UE_A10 replaces the pending NSSAI associated with the current PLMN or SNPN stored in the UE_A10 with a new pending NSSAI may be substituted.
  • the UE_A10 may operate as follows.
  • the UE_A 10 may replace the pending NSSAI of the current PLMN or SNPN to be stored with the S-NSSAI(s) of one or more current PLMNs or SNPNs included in the received pending NSSAI IE.
  • the UE_A10 stores one or more mapped S-NSSAI(s) of the pending NSSAI of the current PLMN or SNPN, and one or more current mapped S-NSSAI(s) contained in the received pending NSSAI IE. (s) and memorize it.
  • the UE_A10 may You may replace the stored pending NSSAI with a new pending NSSAI.
  • the UE_A10 may delete the mapped S-NSSAI of the pending NSSAI, or store the mapped S-NSSAI of the new pending NSSAI, Both processes may be performed.
  • the mapped S-NSSAI of the pending NSSAI may be stored based on the mapped S-NSSAI of the old allowed NSSAI.
  • the UE uses explicit signaling to de-register with the current PLMN or SNPN or enters the 5GMM-DEREGISTERED state for the current PLMN or SNPN, then the UE If not registered with the PLMN or SNPN, the UE deletes the pending NSSAI associated with the current PLMN or SNPN and/or one or more mapped S-NSSAI(s) of that pending NSSAI. If there is an EPLM or ESNPN of the current PLMN or SNPN, the UE further determines the pending NSSAI of the current PLMN's equivalent PLMN(s) or the current SNPN's equivalent SNPN(s) and/or the mapped S of its pending NSSAI. -NSSAI(s) may be deleted.
  • the UE If the UE successfully registers to the new PLMN or SNPN, or if the registration to the new PLMN or SNPN fails and enters the 5GMM-DEREGISTERED state, the UE also registers to the current PLMN or SNPN on another access type. If not, the UE may delete the pending NSSAI associated with the current PLMN or SNPN and/or the mapped S-NSSAI(s) of that pending NSSAI.
  • the UE determines the pending NSSAI of the current PLMN's equivalent PLMN(s) or the current SNPN's equivalent SNPN(s) and/or the mapped S of its pending NSSAI.
  • -NSSAI(s) may be deleted.
  • the UE may be deleted. If there is an EPLMN or ESNPN of the current PLMN or SNPN, the UE further determines the pending NSSAI of the current PLMN's equivalent PLMN(s) or the current SNPN's equivalent SNPN(s) and/or the mapped S of its pending NSSAI. -NSSAI(s) may be deleted. In other words, it may be as follows.
  • the UE will receive a pending request associated with the current PLMN.
  • the NSSAI and/or its pending NSSAI(s) may be deleted. If an EPLMN of the current PLMN exists, the UE shall further delete the pending NSSAI(s) of the equivalent PLMN(s) of the current PLMN and/or the mapped S-NSSAI(s) of its pending NSSAI(s). It's fine.
  • the UE will receive the pending request associated with the current SNPN.
  • the NSSAI and/or its pending NSSAI(s) may be deleted. If an ESNPN of the current SNPN exists, the UE shall further delete the pending NSSAI(s) of the equivalent SNPN(s) of the current SNPN and/or the mapped S-NSSAI(s) of that pending NSSAI(s). It's fine.
  • the UE is associated with the current PLMN or SNPN.
  • the pending NSSAI and/or one or more mapped S-NSSAI(s) of the pending NSSAI may be deleted. If there is an EPLM or ESNPN of the current PLMN or SNPN, the UE further determines the pending NSSAI of the current PLMN's equivalent PLMN(s) or the current SNPN's equivalent SNPN(s) and/or the mapped S of its pending NSSAI.
  • -NSSAI(s) may be deleted. In other words, it may be as follows.
  • the UE shall be able to register the pending NSSAI associated with the current PLMN and/or its pending NSSAI.
  • One or more mapped S-NSSAI(s) may be deleted. If an EPLMN of the current PLMN exists, the UE may also delete the pending NSSAI of the equivalent PLMN(s) of the current PLMN and/or the mapped S-NSSAI(s) of that pending NSSAI.
  • the UE shall register the pending NSSAI associated with the current SNPN and/or its pending NSSAI
  • One or more mapped S-NSSAI(s) may be deleted. If an ESNPN of the current SNPN exists, the UE may also delete the pending NSSAI of the equivalent SNPN(s) of the current SNPN and/or the mapped S-NSSAI(s) of that pending NSSAI.
  • the UE may delete the pending NSSAI associated with the current PLMN or SNPN and/or one or more mapped S-NSSAI(s) of that pending NSSAI. If there is an EPLM or ESNPN of the current PLMN or SNPN, the UE further determines the pending NSSAI of the current PLMN's equivalent PLMN(s) or the current SNPN's equivalent SNPN(s) and/or the mapped S of its pending NSSAI. -NSSAI(s) may be deleted.
  • the UE may delete one or more mapped S-NSSAI(s) of the deleted pending NSSAI.
  • the UE_A10 may receive one or more rejected S-NSSAI IEs indicating a fourth rejected NSSAI, and/or Partial extended rejected NSSAI list IEs, and/or Extended rejected NSSAI IEs, and/or upon receipt of a control message.
  • the following operations may be performed:
  • the UE_A10 may include and store the S-NSSAI of the current PLMN or SNPN indicated by the fourth rejected NSSAI in an appropriate fourth rejected NSSAI. Specifically, the UE adds and stores the S-NSSAI indicated by the received fourth rejected NSSAI to the fourth rejected NSSAI based on the associated rejection reason value and/or tenth identification information. You can.
  • the UE_A10 adds the mapped S-NSSAI for the received fourth rejected NSSAI to the one or more mapped S-NSSAIs for the fourth rejected NSSAI based on the associated rejection reason value and/or tenth identification information. and may be memorized.
  • the S-NSSAI included in the fourth rejected NSSAI stored in the UE is changed to the allowed NSSAI stored in the UE and associated with the PLMN or SNPN and the access type and other access types requested by the UE in this procedure. If included, the S-NSSAI may be removed from the allowed NSSAIs.
  • the mapped S-NSSAI included in the one or more mapped S-NSSAIs for the fourth rejected NSSAI that the UE remembers is the same as the PLMN or SNPN requested by the UE in this procedure, access type, and other information. If it is included in one or more mapped S-NSSAIs for allowed NSSAIs associated with an access type, that mapped S-NSSAI may be deleted from the one or more mapped S-NSSAIs for allowed NSSAIs.
  • the UE_A10 uses the value of the backoff timer to determine the S-NSSAI (the S-NSSAI of the current PLMN or SNPN, and/or the mapped S-NSSAI). (NSSAI) associated with a backoff timer, or may start a backoff timer or manage a backoff timer.
  • the UE_A10 associates the combination of S-NSSAI and mapped S-NSSAI of the current PLMN or SNPN using the value of the backoff timer based on reception of the fourth rejected NSSAI and/or reception of the control message. may start or manage a backoff timer, or may start a backoff timer.
  • the backoff timer value used for the backoff timer may be the value of its received backoff timer.
  • the backoff timer value used for the backoff timer may be an implementation-specific value.
  • the UE_A10 uses one or more S-NSSAIs associated with the backoff timer, or one or more mapped S-NSSAIs associated with the backoff timer (S-NSSAI of HPLMN or HSNPN). ), or one or more S-NSSAIs associated with one or more mapped S-NSSAIs to which backoff timers are mapped, or one or more S-NSSAIs included in NSSAIs to which backoff timers are mapped, or back-off timers.
  • the transmission of MM messages and transmission of SM messages using the mapped S-NSSAI of one or more S-NSSAIs included in the NSSAI to which the off timer is associated may be prohibited.
  • the UE_A10 While the backoff timer for the S-NSSAI of the current PLMN or SNPN is running, the UE_A10 sends the S-NSSAI associated with the backoff timer to the requested NSSAI along with the mapped S-NSSAI associated with that S-NSSAI. In addition, the sending of registration request messages may be prohibited.
  • the UE_A10 A backoff timer may be executed for both the S-NSSAI and the mapped S-NSSAI of the PLMN or SNPN.
  • UE_A10 determines the S-NSSAI associated with the backoff timer based on the information indicated by the 10th identification information. good.
  • the tenth identification information indicates that "the maximum number of UEs that can be registered for the S-NSSAI of the current PLMN or SNPN has been reached" or "that the backoff timer and/or rejection reason value has reached the maximum number of UEs that can be registered for the S-NSSAI of the current PLMN or SNPN" or the S-NSSAI of the SNPN, the UE_A10 may associate and start a back-off timer with the received current PLMN or S-NSSAI of the SNPN, and may manage the back-off timer. good.
  • the 10th identification information indicates that "the maximum number of UEs that can be registered for the mapped S-NSSAI has been reached" or "that the backoff timer and/or rejection reason value is associated with the mapped S-NSSAI". If so, the UE_A10 may associate and start a backoff timer with the received mapped S-NSSAI, and may manage the backoff timer.
  • the 10th identification information indicates that "the maximum number of UEs that can be registered for both the S-NSSAI and the mapped S-NSSAI of the current PLMN or SNPN has been reached" or "the backoff timer and/or reason for rejection If the value indicates that the value is mapped to both the S-NSSAI and the mapped S-NSSAI of the current PLMN or SNPN, the UE_A10 backs up the received S-NSSAI and mapped S-NSSAI of the current PLMN or SNPN.
  • An off timer may be associated and started, and a backoff timer may be managed.
  • the UE_A10 While the backoff timer for the mapped S-NSSAI is running, the UE_A10 stores the S-NSSAI of the current PLMN or SNPN associated with the mapped S-NSSAI associated with the backoff timer, along with its mapped S-NSSAI. It may be in a state where it is prohibited to send a registration request message by including it in the requested NSSAI.
  • the UE_A10 executes the S-NSSAI of the current PLMN or SNPN included in the combination associated with the backoff timer.
  • the NSSAI may be included in the requested NSSAI together with the mapped S-NSSAI included in the combination associated with the backoff timer, and the sending of a registration request message may be prohibited.
  • the UE_A10 uses the S-NSSAI to which the backoff timer was associated and/or the mapped S to which the backoff timer was associated.
  • a transition may be made to a state in which an MM message or an SM message can be transmitted using an S-NSSAI related to NSSAI and/or a mapped S-NSSAI associated with a backoff timer.
  • the UE_A10 determines the S-NSSAI associated with the backoff timer and/or the S-NSSAI regarding the mapped S-NSSAI associated with the backoff timer, And/or a transition may be made to a state in which an MM message can be transmitted using the mapped S-NSSAI associated with the backoff timer as the requested NSSAI.
  • UE_A10 selects the S-NSSAI to which the backoff timer was mapped, or the mapped S-NSSAI to which the backoff timer was mapped, from the fourth rejected NSSAI.
  • the S-NSSAI associated with the mapped S-NSSAI to which the backoff timer was associated may be deleted.
  • UE_A10 rejects the fourth rejected NSSAI associated with the current PLMN or SNPN to the S-NSSAI with which the back-off timer was associated, or
  • the S-NSSAI associated with the mapped S-NSSAI or the mapped S-NSSAI with which the backoff timer was associated may be deleted.
  • the UE_A10 may delete the S-NSSAI with which the backoff timer was associated from the fourth rejected NSSAI it remembers, or one or more S-NSSAIs for the fourth rejected NSSAI.
  • the mapped S-NSSAI to which the backoff timer was associated may be deleted from the mapped S-NSSAI.
  • the removed mapped S-NSSAI is further associated with and/or associated with the S-NSSAI contained in the fourth rejected NSSAI with which that S-NSSAI is associated. If the backoff timer is not running for other mapped S-NSSAIs that are rejected, the UE may also remove that S-NSSAI from the fourth rejected NSSAI.
  • the backoff timer runs for S-NSSAIs included in the fourth rejected NSSAI and/or for mapped S-NSSAIs that are different from the deleted mapped S-NSSAI associated with that S-NSSAI. If not, the UE may remove the S-NSSAI from the fourth rejected NSSAI.
  • the backoff timer is set for S-NSSAIs included in the fourth rejected NSSAI and/or for mapped S-NSSAIs that are different from the deleted mapped S-NSSAI associated with that S-NSSAI. If so, the UE may behave not to remove its S-NSSAI from the fourth rejected NSSAI.
  • a combination in which the backoff timer is further associated from one or more mapped S-NSSAIs to the fourth rejected NSSAI You may delete the mapped S-NSSAI included in the .
  • the UE may also remove that S-NSSAI from the fourth rejected NSSAI.
  • the deleted mapped S-NSSAI is associated with an S-NSSAI included in the fourth rejected NSSAI, or other mapped S-NSSAIs that are different from that S-NSSAI and the deleted mapped S-NSSAI If the backoff timer associated with the combination with an S-NSSAI is running, the UE may behave not to remove that S-NSSAI from the fourth rejected NSSAI.
  • the UE_A10 may stop the backoff timer.
  • the UE_A10 may stop the backoff timer.
  • the UE_A10 running the backoff timer may stop and/or delete the backoff timer, regardless of updating or deleting the fourth rejected NSSAI.
  • the UE_A10 fails to register for the current PLMN or SNPN and enters the 5GMM-DEREGISTERED state due to a reason value other than the reason value indicating that there are no network slices available, it shall If not registered with the current PLMN or SNPN, the UE may map one or more of the first or third rejected NSSAI and/or first or third rejected NSSAI associated with the current PLMN or SNPN. You may delete NSSAI(s).
  • the reason value may be 5GMM cause of 5GS. Further, in that case, the "reason value indicating that there are no network slices available" may be #62 "No network slices available", which is the 62nd 5GMM cause of 5GS.
  • the UE uses explicit signaling to de-register with the current PLMN or SNPN or enters the 5GMM-DEREGISTERED state for the current PLMN or SNPN, then the UE If not registered with the PLMN or SNPN, the UE maps one or more of the first or third rejected NSSAI and/or the first or third rejected NSSAI associated with the current PLMN or SNPN Delete (s). If there is an EPLM or ESNPN for the current PLMN or SNPN, the UE further rejects the first or third rejected NSSAI and/or The mapped S-NSSAI(s) of its first or third rejected NSSAI may be deleted.
  • the UE If the UE successfully registers to the new PLMN or SNPN, or if the registration to the new PLMN or SNPN fails and enters the 5GMM-DEREGISTERED state, the UE also registers to the current PLMN or SNPN on another access type. If not, the UE deletes the first or third rejected NSSAI and/or one or more mapped S-NSSAI(s) of the first or third rejected NSSAI associated with the current PLMN or SNPN. You may. If there is an EPLM or ESNPN for the current PLMN or SNPN, the UE further rejects the first or third rejected NSSAI and/or The mapped S-NSSAI(s) of its first or third rejected NSSAI may be deleted.
  • the UE may delete the first access type it remembers and/or the second rejected NSSAI associated with the current PLMN or SNPN. Furthermore, the UE may also delete one or more mapped S-NSSAI(s) of the second rejected NSSAI associated with the deleted current PLMN or SNPN and the first access type when roaming.
  • the UE If the UE de-registers on the first access type, or if the registration procedure on the first access type fails and the UE enters the 5GMM-DEREGISTERED state, the UE remembers the first access type and/or or may delete the fourth rejected NSSAI associated with the current PLMN or SNPN. Furthermore, the UE may also delete one or more mapped S-NSSAI(s) of the fourth rejected NSSAI associated with the deleted current PLMN or SNPN and the first access type when roaming.
  • the UE may delete one or more mapped S-NSSAI(s) of the deleted first to fourth rejected NSSAIs.
  • the UE stores and manages information regarding each NSSAI. Additionally, the UE may start and stop a backoff timer that is effective for the PLMN or SNPN based on storing and updating each NSSAI.
  • Embodiments of the invention may be a combination of one or more of the procedures described in Section 3. For example, in this embodiment, the UE transitions to the registered state based on the completion of the initial registration procedure described in Section 3.1, and further performs the registration procedure for movement and periodic registration update described in Section 3.1 one or more times. may be done.
  • each of the procedures described in Chapters 3.2 to 3.3 may be implemented.
  • UE_A10 executes the NSSAI update procedure described in Chapter 3.3 based on the information received from the NW and/or the state of the UE, and updates and/or deletes the stored information regarding NSSAI. good.
  • an SM procedure in which sending and receiving of SM messages is configured may be performed based on the completion of the registration procedure described in Section 3.1.
  • the UE starts the registration procedure by sending a registration request message.
  • the registration procedure may be the registration procedure explained in Section 3.1.
  • the AMF initiates the NSAC procedure for both the S-NSSAI and the mapped S-NSSAI of the current PLMN or SNPN included in the requested NSSAI IE, and requests the NSACF to perform the NSAC.
  • the AMF receives the results of the NSAC for the S-NSSAI and mapped S-NSSAI of the current PLMN or SNPN from the NSACF.
  • the NSAC result for the S-NSSAI of the current PLMN or SNPN is information indicating that "the maximum number of UEs that can be registered for this network slice has not been reached"
  • the result for the mapped S-NSSAI is The NSAC result may be information indicating that "the maximum number of UEs that can be registered for this network slice has been reached.”
  • the AMF sends a registration acceptance message including the Extended rejected NSSAI IE and the tenth identification information to the UE.
  • the Extended rejected NSSAI IE includes the S-NSSAI IE consisting of the S-NSSAI and mapped S-NSSAI of the current PLMN or SNPN included in the requested NSSAI IE, the rejection reason value, and the backoff timer value. may be included.
  • the rejection reason value may be “S-NSSAI not available due to maximum number of UEs reached for each network slice”.
  • the Extended rejected NSSAI IE may include a fourth rejected NSSAI.
  • the UE receives a registration acceptance message, which includes the tenth identification information, the S-NSSAI IE, the rejection reason value, and the backoff timer value.
  • the UE may include and store the S-NSSAI of the current PLMN or SNPN included in the S-NSSAI IE in the rejected NSSAI for the maximum number of UEs reached. Further, the UE may store the mapped S-NSSAI included in the S-NSSAI IE in the mapped S-NSSAI(s) for the rejected NSSAI for the maximum number of UEs reached based on the reason value.
  • the UE may start a backoff timer associated with the mapped S-NSSAI using the received backoff timer value.
  • the UE While the backoff timer is running, the UE may be controlled so that it cannot send a registration request message that includes the mapped S-NSSAI associated with the backoff timer in the requested NSSAI IE.
  • the S-NSSAI IE consisting of the S-NSSAI and mapped S-NSSAI of the received current PLMN or SNPN contained in the rejected NSSAI IE is included in the requested NSSAI IE. Cannot be sent.
  • any S-NSSAI IE other than the S-NSSAI IE consisting of the S-NSSAI and mapped S-NSSAI of the current PLMN or SNPN included in the rejected NSSAI IE and the received S-NSSAI If so, it can be included in the requested NSSAI IE and sent.
  • the UE may include in the requested NSSAI IE along with its mapped S-NSSAI, and a registration request message may be sent.
  • the mapped S-NSSAI(s) associated with the backoff timer may be removed from the mapped S-NSSAI(s) for the rejected NSSAI for the maximum number of UEs reached.
  • the S-NSSAI included in the rejected NSSAI for the maximum number of UEs reached may also be rejected from the maximum number of UEs reached.
  • the UE may appropriately control the S-NSSAI to be stored.
  • the UE starts the registration procedure by sending a registration request message.
  • the registration procedure may be the registration procedure explained in Section 3.1.
  • the AMF initiates the NSAC procedure for both the S-NSSAI and the mapped S-NSSAI of the current PLMN or SNPN included in the requested NSSAI IE, and requests the NSACF to perform the NSAC.
  • the AMF receives the results of the NSAC for the S-NSSAI and mapped S-NSSAI of the current PLMN or SNPN from the NSACF.
  • the NSAC result for the S-NSSAI of the current PLMN or SNPN is information indicating that "the maximum number of UEs that can be registered for this network slice has not been reached"
  • the result for the mapped S-NSSAI is The NSAC result may be information indicating that "the maximum number of UEs that can be registered for this network slice has been reached.”
  • the AMF sends a registration acceptance message including the Extended rejected NSSAI IE and the tenth identification information to the UE.
  • the Extended rejected NSSAI IE includes the S-NSSAI IE consisting of the S-NSSAI and mapped S-NSSAI of the current PLMN or SNPN included in the requested NSSAI IE, the rejection reason value, and the backoff timer value. may be included.
  • the rejection reason value may be “S-NSSAI not available due to maximum number of UEs reached for each network slice”.
  • the Extended rejected NSSAI IE may include a fourth rejected NSSAI.
  • the UE receives a Registration Accept message that includes the S-NSSAI IE, a rejection reason value, and a backoff timer value.
  • the UE may include and store the S-NSSAI of the current PLMN or SNPN included in the S-NSSAI IE in the rejected NSSAI for the maximum number of UEs reached. Further, the UE may store the mapped S-NSSAI included in the S-NSSAI IE in the mapped S-NSSAI(s) for the rejected NSSAI for the maximum number of UEs reached based on the reason value.
  • the received backoff timer value may be used to start a backoff timer associated with the combination of the mapped S-NSSAI and the S-NSSAI of the current PLMN or SNPN.
  • the UE While the backoff timer is running, the UE is controlled so that it cannot send a registration request message that includes the combination of the mapped S-NSSAI associated with the backoff timer and the S-NSSAI of the current PLMN or SNPN in the requested NSSAI IE. It's fine.
  • the S-NSSAI IE consisting of the S-NSSAI and mapped S-NSSAI of the received current PLMN or SNPN contained in the rejected NSSAI IE is included in the requested NSSAI IE. Cannot be sent.
  • an S-NSSAI IE other than the S-NSSAI IE consisting of the S-NSSAI and mapped S-NSSAI of the current PLMN or SNPN contained in the rejected NSSAI IE received If so, it can be included in the requested NSSAI IE and sent.
  • the UE while the UE is running the backoff timer associated with the combination of the first mapped S-NSSAI and the first current PLMN or S-NSSAI of the SNPN, the UE The S-NSSAI IE configured with the S-NSSAI of the current PLMN or SNPN can be included in the requested NSSAI IE and a registration request message can be sent.
  • the mapped S-NSSAI(s) associated with the backoff timer may be removed from the mapped S-NSSAI(s) for the rejected NSSAI for the maximum number of UEs reached.
  • the UE may appropriately control the S-NSSAI to be stored.
  • the program that runs on the device related to the present invention may be a program that controls a central processing unit (CPU) or the like to cause the computer to function so as to realize the functions of the embodiments related to the present invention.
  • Programs or information handled by programs are temporarily stored in volatile memory such as Random Access Memory (RAM), non-volatile memory such as flash memory, hard disk drive (HDD), or other storage system.
  • volatile memory such as Random Access Memory (RAM)
  • non-volatile memory such as flash memory, hard disk drive (HDD), or other storage system.
  • a program for realizing the functions of the embodiments related to the present invention may be recorded on a computer-readable recording medium.
  • the program recorded on this recording medium may be read into a computer system and executed.
  • the "computer system” herein refers to a computer system built into the device, and includes hardware such as an operating system and peripheral devices.
  • a "computer-readable recording medium” refers to a semiconductor recording medium, an optical recording medium, a magnetic recording medium, a medium that dynamically stores a program for a short period of time, or any other computer-readable recording medium. Also good.
  • each functional block or feature of the device used in the embodiments described above may be implemented or executed in an electrical circuit, such as an integrated circuit or multiple integrated circuits.
  • An electrical circuit designed to perform the functions described herein may be a general purpose processor, digital signal processor (DSP), application specific integrated circuit (ASIC), field programmable gate array (FPGA), or other programmable logic devices, discrete gate or transistor logic, discrete hardware components, or combinations thereof.
  • a general purpose processor may be a microprocessor or a conventional processor, controller, microcontroller, or state machine.
  • the electric circuit described above may be composed of a digital circuit or an analog circuit. Further, if an integrated circuit technology that replaces the current integrated circuit appears due to advances in semiconductor technology, one or more embodiments of the present invention can also use a new integrated circuit based on that technology.
  • the present invention is not limited to the above-described embodiments.
  • one example of the device has been described, but the present invention is not limited to this, and can be applied to stationary or non-movable electronic equipment installed indoors or outdoors, such as AV equipment, kitchen equipment, etc. It can be applied to terminal devices or communication devices such as cleaning/washing equipment, air conditioning equipment, office equipment, vending machines, and other household equipment.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention propose un moyen de communication pour réaliser, dans un 5GS, une fonction qui concerne la gestion des informations relatives à une tranche de réseau, ou une fonction de réseau non publique. Afin de réaliser la gestion des informations relatives à une tranche de réseau ou à une fonction de réseau non publique dans un 5GS, la présente invention propose un procédé et un moyen de communication pour les procédures d'enregistrement initial et d'enregistrement périodique ou basé sur le mouvement de l'UE. En outre, la présente invention propose un procédé et un moyen de communication pour l'achèvement d'une procédure d'enregistrement et pour une procédure de mise à jour de la configuration de l'UE. En outre, la présente invention propose un procédé de gestion des informations relatives à une tranche de réseau associée à chaque procédure et à une transition d'état.
PCT/JP2023/022032 2022-06-20 2023-06-14 Équipement utilisateur (ue) WO2023248884A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2022-098512 2022-06-20
JP2022098512 2022-06-20

Publications (1)

Publication Number Publication Date
WO2023248884A1 true WO2023248884A1 (fr) 2023-12-28

Family

ID=89379774

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2023/022032 WO2023248884A1 (fr) 2022-06-20 2023-06-14 Équipement utilisateur (ue)

Country Status (1)

Country Link
WO (1) WO2023248884A1 (fr)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2022074641A (ja) * 2020-11-05 2022-05-18 シャープ株式会社 UE(User Equipment)

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2022074641A (ja) * 2020-11-05 2022-05-18 シャープ株式会社 UE(User Equipment)

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ZTE, ERICSSON: "Clarificaiton on behaviors of the UE and the network supporting Network Slice Admission Control", 3GPP TSG CT WG1 #129E C1-212390, 22 April 2021 (2021-04-22), XP051997658 *

Similar Documents

Publication Publication Date Title
WO2021205955A1 (fr) Équipement utilisateur (ue) et procédé de communication pour un ue
WO2021215228A1 (fr) Équipement utilisateur (ue) et fonction de gestion d'accès et de mobilité (amf)
WO2021241114A1 (fr) Équipement utilisateur (ue), dispositif de réseau central, fonction de gestion d'accès et de mobilité (amf) et fonction de gestion de sessions (smf)
JP7402004B2 (ja) Ue及びコアネットワーク装置
JP7401989B2 (ja) Ue及びueによって実行される通信制御方法
WO2022097702A1 (fr) Équipement utilisateur (ue) et procédé de commande de communication exécuté par l'ue
WO2022097703A1 (fr) Équipement utilisateur (ue) et procédé de commande de communication effectué par l'ue
WO2022004699A1 (fr) Équipement d'utilisateur (ue) et procédé de commande de communication pour ue
WO2021132288A1 (fr) Équipement Utilisateur (UE)
WO2021132502A1 (fr) Ue, dispositif de commande et procédé de commande de communication
JP2021166360A (ja) UE(User Equipment)
WO2023248884A1 (fr) Équipement utilisateur (ue)
WO2023248883A1 (fr) Équipement utilisateur (ue)
WO2023210478A1 (fr) Équipement utilisateur (ue)
WO2023210479A1 (fr) Équipement utilisateur (ue)
WO2024048398A1 (fr) Équipement d'utilisateur (ue)
WO2023127744A1 (fr) Ue (équipement utilisateur) et procédé de commande de communication exécuté à l'aide d'un ue
WO2023127733A1 (fr) Ue (équipement utilisateur) et procédé de commande de communication exécuté à l'aide d'un ue
WO2023127745A1 (fr) Ue (équipement utilisateur) et procédé de commande de communication exécuté par l'ue
WO2023013318A1 (fr) Dispositif de réseau central, procédé de commande de communication et ue (équipement utilisateur)
WO2023013283A1 (fr) Équipement utilisateur (ue) et procédé de commande de communication exécuté par l'ue
WO2022030473A1 (fr) Équipement utilisateur (ue)
WO2022097701A1 (fr) Équipement utilisateur (ue) et procédé de commande de communication réalisé par l'ue
WO2022004700A1 (fr) Équipement utilisateur (ue) et procédé de communication pour ue
WO2021215227A1 (fr) Ue (équipement utilisateur)

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23827070

Country of ref document: EP

Kind code of ref document: A1