WO2024022136A1 - 网络数据处理方法、装置及存储介质 - Google Patents

网络数据处理方法、装置及存储介质 Download PDF

Info

Publication number
WO2024022136A1
WO2024022136A1 PCT/CN2023/107508 CN2023107508W WO2024022136A1 WO 2024022136 A1 WO2024022136 A1 WO 2024022136A1 CN 2023107508 W CN2023107508 W CN 2023107508W WO 2024022136 A1 WO2024022136 A1 WO 2024022136A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
smf
nwdaf
data processing
cell
Prior art date
Application number
PCT/CN2023/107508
Other languages
English (en)
French (fr)
Inventor
陈刚
曹义林
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2024022136A1 publication Critical patent/WO2024022136A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/24Negotiating SLA [Service Level Agreement]; Negotiating QoS [Quality of Service]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing

Definitions

  • the present application relates to the field of communication technology, and in particular, to a network data processing method, device and storage medium.
  • NWDAF Network Data Analytics Function, network data analysis function
  • NWDAF Network Data Analytics Function, network data analysis function
  • SMF Session Management Function, session management function
  • PCF Policy Control Function
  • PCF obtains the cell congestion information of the cell based on the slice, analysis type, cell location and other information.
  • Decision-making is based on cell congestion type and level, and provides session-level QoS (Quality of Service, Quality of Service) guarantee.
  • QoS Quality of Service
  • indiscriminate congestion guarantee for users inaccurate QoS guarantee
  • resource utilization Low-level problems prevent effective allocation and control of resources.
  • Embodiments of the present application provide a network data processing method, device and storage medium.
  • embodiments of the present application provide a network data processing method.
  • the target service information is determined according to the session creation request; and the target service information is determined according to the target service information.
  • Monitoring rules corresponding to the information wherein the monitoring rules are used to detect the terminal's use of services; send the monitoring rules to the SMF to receive the service occurrence event information returned by the SMF, and determine the service occurrence event information according to the service occurrence
  • the event information generates a protection policy for the target service, where the service occurrence event information is used to represent that the monitoring rule detects that the terminal is using the target service; the protection policy is sent to the SMF to implement the target service.
  • Business protection is used to the SMF to implement the target service.
  • embodiments of the present application provide a network data processing device, including: a memory, a processor, and a computer program stored in the memory and executable on the processor.
  • a network data processing device including: a memory, a processor, and a computer program stored in the memory and executable on the processor.
  • the processor executes the computer program, The network data processing method described in the first aspect.
  • embodiments of the present application provide a computer-readable storage medium that stores a computer-executable program.
  • the computer-executable program is used to cause a computer to execute the method described in the first aspect.
  • Network data processing methods are used to cause a computer to execute the method described in the first aspect.
  • Figure 1 is a schematic diagram of a network topology used in a network data processing method provided by an embodiment of the present application
  • Figure 2 is a flow chart of a network data processing method provided by an embodiment of the present application.
  • Figure 3 is a flow chart of a network data processing method provided by another embodiment of the present application.
  • Figure 4 is a method flow chart of step S600 in Figure 3;
  • Figure 5 is a method flow chart of step S300 in Figure 2;
  • Figure 6 is a method flow chart of step S400 in Figure 2;
  • Figure 7 is a flow chart of a network data processing method provided by another embodiment of the present application.
  • Figure 8 is a flow chart of a network data processing method provided by another embodiment of the present application.
  • Figure 9 is a flow chart of a network data processing method provided by another embodiment of the present application.
  • Figure 10 is an example diagram of a network data processing method provided by an example of this application.
  • Figure 11 is an example diagram of a network data processing method provided in an example of this application.
  • Figure 12 is an example diagram of a network data processing method provided by an example of this application.
  • Figure 13 is a schematic structural diagram of a network data processing device provided by an embodiment of the present application.
  • Embodiments of the present application provide a network data processing method, device and storage medium.
  • the target business information carried in the session creation request is determined, and corresponding monitoring rules are obtained based on the target business information to facilitate Detect the terminal's use of the service, and send the monitoring rules to the SMF to receive the business event information returned by the SMF, so that the monitoring rules can be detected to detect that the terminal is using the target service, realize the monitoring of specific business flows, and based on the business occurrence
  • the event information generates a protection strategy for the target business, so that different protection strategies can be generated according to different target services.
  • the protection strategy is sent to the SMF to protect the target business. It can track the location of specific services and avoid other irrelevant services. impact, thereby improving resource utilization and improving user experience.
  • Figure 1 is a schematic diagram of a network topology used in a network data processing method provided by an embodiment of the present application.
  • the network topology includes but is not limited to a first network node 110 , a second network node 120 , a third network node 130 and a fourth network node 140 .
  • the first network node 110 is a node with a session management function, and the first network node 110 is used to support 3GPP (3rd Generation Partnership Project, 3rd Generation Partnership Project), Non-3GPP (Non3rd Generation Partnership Project) , non-3rd generation partner program) session establishment, modification and release, etc., is also responsible for the allocation and management of the UE's IP (Intellectual Property, interconnection protocol between networks) address, and the implementation and termination of unified control policies.
  • 3GPP 3rd Generation Partnership Project, 3rd Generation Partnership Project
  • Non-3GPP Non3rd Generation Partnership Project
  • non-3rd generation partner program non-3rd generation partner program
  • the second network node 120 is a node with user plane function or UDM (Unified Data Management, unified data management function).
  • UDM Unified Data Management, unified data management function
  • the second network node 120 is used for data packet routing and forwarding, business detection, usage accumulation and reporting, and data messages. Transmission, replication and QoS guarantees.
  • the third network node 130 is a node with network data analysis function, used to collect data from network elements, applications, OAM (Operations and Maintenance, operation and maintenance), and register with NRF (NF Repository Function, network function storage function) as Other network elements provide data analysis sources.
  • OAM Operations and Maintenance, operation and maintenance
  • NRF NF Repository Function, network function storage function
  • the fourth network node 140 is a node with a network function storage function and is used to receive registration information of service providers for service users to discover service providers.
  • topological structure shown in Figure 1 does not constitute a limitation on the embodiments of the present application, and may include more or fewer components than shown, or combine certain components, or different components. layout.
  • Figure 2 is a flow chart of a network data processing method provided by an embodiment of the present application.
  • the network data processing method is applied to, but not limited to, the second network node 120, including but not limited to steps S100-S400.
  • Step S100 When receiving the session creation request sent by SMF, determine the target service information according to the session creation request;
  • the UE initiates a PDU (Protocol Data Unit) session creation request, and the SMF carries the target service information and sends the session creation request to the second network node, so that the second network node determines the target service information.
  • PDU Protocol Data Unit
  • session creation request includes but is not limited to parameters such as user number, data network name, slice, PDU session identifier, request type, user identifier, location area information, etc. This embodiment does not impose specific limitations.
  • Step S200 Determine monitoring rules corresponding to the target business information according to the target business information
  • monitoring rules are used to detect terminal usage of services.
  • the service type and service scope of the target service information are determined based on multiple parameter information in the target service information, and corresponding monitoring rules are determined according to the service type of the target service information to detect the terminal's use of the service.
  • monitoring rules can be predefined monitoring rules or monitoring rules with business flows.
  • the monitoring rules in this embodiment are ADC rules (Application Detection and Control, Application Detection Control).
  • Step S300 Send the monitoring rules to the SMF to receive the business event information returned by the SMF, and generate a protection policy for the target service based on the business event information;
  • the service occurrence event information is used to indicate that the monitoring rule detects that the terminal is using the target service.
  • the second network node sends the monitoring rules to the SMF, so that the SMF stores the monitoring rules and records the target services that the terminal is using when detected by the monitoring rules, thereby obtaining the service occurrence event information, and based on the service
  • the event information generates a protection policy corresponding to the target business, thereby achieving specific protection for the target business.
  • the protection strategy includes issuing QoS guarantee, charging policy and other rules for the target service.
  • Step S400 Send the protection policy to the SMF to protect the target service.
  • the second network node sends the protection policy to the SMF, so that the SMF protects the target service according to the protection policy, thereby meeting the application requirements of the target service and providing differentiated services for users of different levels.
  • the target service information includes at least one of the following: the user's cell congestion information, which is used to characterize the network performance of the cell where the user is located; or the user's subscription package, so that users of different levels can be screened out and Accurately determine the user's business type to provide differentiated services for users of different levels and avoid the pressure of reporting business information.
  • the user's subscription package is configured by PCF or obtained through UDR subscription.
  • the user's contract package is a user-specific package, such as voice call package, video traffic package, broadband service, etc.
  • Figure 3 is a flow chart for obtaining cell congestion information provided by another embodiment of the present application, including but not limited to steps S500 to S600.
  • the session creation request includes location area information.
  • Step S500 When the NWDAF information corresponding to the location area information is lacking locally, the location area information is sent to the NRF so that the NRF returns the NWDAF information of the cell, and the NWDAF information is sent to the NWDAF to obtain the cell congestion information corresponding to the location area information;
  • NWDAF information is used to characterize the network's ability to analyze data.
  • Step S600 When NWDAF information corresponding to the location area information exists locally, send the NWDAF information to the NWDAF to obtain cell congestion information corresponding to the location area information.
  • the second network node after the second network node receives the session creation request sent by the SMF, it stores the location area information in the session creation request. When it is found that the local NWDAF information corresponding to the location area information is missing, it needs to be based on the location area information. Obtain the cell congestion information of the cell. At this time, the location area information needs to be sent to the NRF, so that the NRF finds the NWDAF information corresponding to the location area and returns the NWDAF information to the second network node. The second network node then sends the NWDAF information.
  • the NWDAF information can be directly sent to the NWDAF to obtain cell congestion information corresponding to the location area information.
  • parameter information such as slice, analysis type, location area, etc. is also carried to send the NWDAF information to the NRF.
  • the cell congestion information includes but is not limited to cell information, cell congestion type, cell congestion level and other information, which is not specifically limited in this embodiment.
  • Step S600 includes but is not limited to steps S610 to step S620.
  • Step S610 Generate a congestion control request based on NWDAF information and location area information
  • Step S620 Send a congestion control request to NWDAF, so that NWDAF returns cell congestion information according to the congestion control request.
  • the second network node root After the NWDAF information corresponding to the location area information exists locally, the second network node root Generate a congestion control request based on NWDAF information and location area information, and send the congestion control request to NWDAF to obtain cell congestion information to facilitate subsequent determination of monitoring rules.
  • the congestion control request carries parameter information such as analysis type and location area information.
  • the location area information can be user level, TAI level (Tracking Area Identity, tracking area identification) or cell level, etc. This embodiment does not do this. Specific restrictions.
  • the cell congestion information can be obtained in advance or in real time.
  • the second network node immediately obtains the cell congestion situation from the NWDAF when receiving the location area information; when the cell congestion information is real-time Obtain, then when the second network node receives the service occurrence event, it needs to detect whether the target service needs to obtain the cell congestion situation from the NWDAF.
  • Step S300 includes but is not limited to steps S310 to step S330.
  • Step S310 Establish a session creation response corresponding to the session creation request
  • Step S320 Send monitoring rules to SMF through session creation response
  • Step S330 Receive the session update request sent by the SMF and the service occurrence event information sent by the session update request.
  • a session creation response corresponding to the session creation request is established, so as to send the monitoring rules to the SMF through the session creation response, and receive the session creation request sent by the SMF.
  • the SMF stores the monitoring rules and forwards the monitoring rules to UPF (User Plane Function) to detect whether the terminal is using the target service. If the result of the UPF detection is that the terminal is using the target service, the service occurrence event information is reported to the second network node through the SMF, thereby completing the detection of the target service through the monitoring rules.
  • UPF User Plane Function
  • Step S400 includes but is not limited to steps S410 to step S420.
  • Step S410 Establish a session update response corresponding to the session update request
  • Step S420 Send the protection policy to the SMF based on the session update response to protect the target service.
  • the second network node after receiving the session update request sent by the SMF, the second network node establishes a session update response corresponding to the session update request, and sends the protection policy to the SMF through the session update response, thereby providing services for the target service.
  • the protection strategy can be obtained by the second network node making a decision based on cell congestion information, for example, congestion level, congestion category and other information.
  • FIG. 7 is a flow chart of a network data processing method provided by another embodiment of the present application, including but not limited to steps S430 to S450.
  • Step S430 Receive the service end event information sent by the SMF through the session update request
  • the service end event information is obtained by UPF detecting the target service, and the service end event information is used to indicate that the monitoring rule detects that the terminal stops using the target service;
  • Step S440 Generate a deletion instruction based on the service end event information
  • deletion instruction is used to delete the protection policy of the target business
  • Step S450 Send the deletion instruction to the SMF through the session update response.
  • the second network node after sending the protection policy to the SMF, receives the service end event information sent by the SMF through the session update request, and generates a deletion instruction to delete the protection policy of the target service according to the service end event information, by The session update response sends a deletion instruction to SMF to delete protection policies such as QoS guarantee and charging method.
  • the UPF detects that the terminal in the monitoring rule stops using the target service, it reports the service end event information to the second network node through the SMF.
  • the SMF sends the service end event information and other parameters to the PCF through the session update request, thereby Achieve location tracking of target services and deletion of protection policies.
  • Figure 8 is a flow chart of a network data processing method provided by another embodiment of the present application.
  • the network data processing method includes but is not limited to steps S700-S1000.
  • Step S700 Receive the area switching request sent by SMF
  • Step S800 Send an area switching request to NWDAF, so that NWDAF returns the switching congestion information of the switching cell according to the area switching request;
  • Step S900 Generate a handover protection policy according to the handover congestion information and the area handover request;
  • Step S1000 Send the handover protection policy to the SMF through the session update response.
  • the SMF when the location of the UE is switched or changed, the SMF carries new location area information and other parameters, and sends the area switching request to the second network node through a session update request.
  • the second network node finds that there is no new location locally, If the area information is located in the handover congestion information of the handover cell, then the area handover request is sent to the NWDAF, so that the NWDAF returns the handover congestion information of the handover cell according to the area handover request.
  • the second network node generates the handover service based on the handover congestion information and the area handover request.
  • the handover protection policy is sent to the SMF through the session update response to protect the handover service, thereby accurately obtaining handover congestion information and providing specific protection for the handover service.
  • the switching congestion information includes switching cell information, switching cell congestion type, switching cell congestion level and other information, which is not specifically limited in this embodiment.
  • the second network node after receiving the area switching request sent by the SMF, if the second network node finds that there is local switching congestion information corresponding to the switching cell where the new location area information is located, it can directly perform the switching congestion information according to the switching congestion information and the area switching request. Generate a handover protection policy and send the handover protection policy to the SMF to protect the handover service.
  • the network data processing method also includes updating the cell congestion information of the cell at preset time intervals to avoid expiration of the cell congestion information, and updating the cell congestion information in a timely manner to avoid information leakage.
  • the second network node will update the cell congestion information of the cell at preset time intervals. After the second network node senses that the cell congestion information corresponding to the locally cached location area information has expired, it will re-obtain the cell congestion information of the cell. Congestion information, the second network node sends a new round of congestion control request to NWDAF based on the updated location area information to obtain the cell congestion information of the updated cell, etc., and then re-decides the protection strategy of the updated service based on the latest cell congestion information. , thereby realizing real-time tracking of the residential area where users using services are located, improving users’ service experience, protecting specific services, and improving resource utilization.
  • Example 1 is a flow chart for monitoring target services when cell congestion information is pre-obtained:
  • Step 1 The UE initiates a PDU session creation request, in which the SMF carries parameters such as user number, data network name, slice, PDU session ID, request type, user ID, location area information, etc., and sends the session creation request to the PCF;
  • the SMF carries parameters such as user number, data network name, slice, PDU session ID, request type, user ID, location area information, etc.
  • Step 2 PCF stores the location area information. If there is no cell congestion information for the cell locally, it needs to obtain the cell congestion information for the cell based on the location area information;
  • Step 3 If PCF has not sent NWDAF information about congestion in the cell to NRF, it will send parameters such as slice, analysis type, location area information, etc. to NRF;
  • Step 4 NRF returns the NWDAF information of the cell to PCF;
  • Step 5 PCF obtains the congestion situation of the location area information from NWDAF based on the returned NWDAF information
  • Step 6 PCF sends a congestion control request to NWDAF based on the location area information to obtain the cell congestion information of the cell.
  • the congestion control request carries parameters such as analysis type, location area (may be user level, TAI level or cell level);
  • Step 7 NWDAF returns the cell congestion information, including cell information, cell congestion type, cell congestion level and other information;
  • Step 8 PCF obtains the user's contract package and issues monitoring rules (predefined monitoring rules or monitoring rules with business flow).
  • the user's exclusive package can be configured locally by PCF or implemented through UDR signing;
  • Step 9 PCF replies to SMF with a session creation response, carrying application monitoring rules
  • Step 10 SMF stores the monitoring rules and forwards the monitoring rules to UPF to detect whether the service is used;
  • Step 11 UPF detects the business use of monitoring rules and reports business event information to PCF through SMF;
  • Step 12 SMF sends the monitoring service event information, business flow and other parameters to PCF through the session update request;
  • Step 13 PCF decides the QoS guarantee, charging strategy and other protection strategies for the target service based on the cell congestion information such as congestion level, congestion type and other information;
  • Step 14 PCF replies to SMF with a session update response and provides business-level QoS guarantee, billing and other policies;
  • Step 15 UPF detects the end of the service of the monitoring rule and reports the service end event information to PCF through SMF;
  • Step 16 SMF sends the session update request to PCF carrying monitoring service end event information and other parameters;
  • Step 17 PCF deletes the QoS guarantee, charging strategy and other protection strategies of the target service, and no longer provides exclusive guarantee
  • Step 18 The PCF replies to the SMF with a session update request response, and deletes the service-level QoS guarantee, charging policy and other protection policies.
  • service-level QoS guarantees are provided for monitoring the occurrence and cessation of specific applications, and dynamic control of wireless and bearer resources can be realized based on cell congestion information and validity periods, and wireless and bearer dedicated resources can be occupied.
  • the time when resources are available is short and the resource utilization rate is high.
  • FIG. 10 is an example diagram of a network data processing method provided by an example of this application.
  • Example 2 is a flow chart for monitoring target services while obtaining cell congestion information in real time:
  • Step 1 The UE initiates a PDU session establishment request.
  • the SMF carries parameters such as the user number, data network name, slice, PDU session ID, request type, user ID, location area information, etc., and sends the session creation request to the PCF;
  • Step 2 PCF obtains the user's contract package and issues monitoring rules (predefined monitoring rules or monitoring rules with business flow).
  • the user's exclusive package can be configured locally by PCF or implemented through UDR signing;
  • Step 3 PCF replies to SMF with a session creation response, carrying application monitoring rules
  • Step 4 SMF stores the monitoring rules and forwards the monitoring rules to UPF to detect whether the service is used;
  • Step 5 UPF detects the business use of monitoring rules and reports business event information to PCF through SMF;
  • Step 6 SMF sends the monitoring service event information, business flow and other parameters to PCF through the session update request;
  • Step 7 PCF stores the location area information of the cell. If there is no cell congestion information of the cell locally, and the detection should If the cell congestion information is needed, the cell congestion information of the cell is obtained according to the location area information;
  • Step 8 If PCF has not sent NWDAF information about congestion in the cell to NRF, it will send parameters such as slice, analysis type, location area information, etc. to NRF;
  • Step 9 NRF returns NWDAF information providing congestion information of the cell to PCF;
  • Step 10 PCF obtains the congestion situation of the location area information from NWDAF based on the returned NWDAF information
  • Step 11 PCF sends a congestion control request to NWDAF based on the location area information to obtain the cell congestion information of the cell.
  • the congestion control request carries parameters such as analysis type, location area (which may be user level, TAI level or cell level);
  • Step 12 NWDAF returns the cell congestion information, including cell information, cell congestion type, cell congestion level and other information;
  • Step 13 PCF decides the QoS guarantee, charging strategy and other protection strategies for the target service based on the cell congestion information such as congestion level, congestion type and other information;
  • Step 14 PCF replies to SMF with a session update response, providing QoS guarantee, charging strategy and other protection strategies for the target service at the service level;
  • Step 15 UPF detects the end of the service of the monitoring rule and reports the service end event information to PCF through SMF;
  • Step 16 SMF carries the service end event information and sends it to PCF through the session update request;
  • Step 17 PCF deletes the QoS guarantee, charging strategy and other protection strategies of the target service, and no longer provides exclusive guarantee
  • Step 18 The PCF replies to the SMF with a session update request response and deletes the service-level QoS guarantee, charging policy and other protection policies.
  • FIG. 11 is an example diagram of a network data processing method provided by an example of this application.
  • Example 3 is the step process of updating the location area information of the cell and re-obtaining the cell congestion information:
  • Step 1 The UE's location area information is switched, and the SMF carries the new location area information and other parameters and sends it to the PCF through a session update request;
  • Step 2 PCF finds that there is no local congestion information for the new location area information, and then obtains the cell congestion information of the cell based on the new location area information;
  • Step 3 PCF sends a congestion control request to NWDAF based on the location area information to obtain the cell congestion information of the cell, carrying parameters such as analysis type, location area (may be user level, TAI level or cell level);
  • Step 4 NWDAF returns the cell congestion information, including cell information, cell congestion type, cell congestion level and other information;
  • Step 5 PCF decides the QoS guarantee, charging strategy and other protection strategies for the service based on cell congestion information such as congestion level, congestion type and other information;
  • Step 6 PCF replies to SMF with a session update response, providing service-level QoS guarantees, charging policies and other protection strategies.
  • FIG. 12 is an example diagram of a network data processing method provided by an example of this application.
  • Example 4 is the step process of re-obtaining cell congestion information when the cell congestion information of a cell expires:
  • Step 1 PCF senses that the cell congestion information of the locally cached location area information has expired, and re-obtains the cell congestion information of the cell;
  • Step 2 PCF obtains the cell congestion control information of the cell from NWDAF based on the location area information, carrying parameters such as analysis type, location area information (which may be user level, TAI level or cell level);
  • Step 3 NWDAF returns the cell congestion information, including cell information, cell congestion type, cell congestion level and other information;
  • Step 4 PCF re-decides the QoS guarantee, charging strategy and other protection strategies for the detection service based on the latest cell congestion information such as congestion level, congestion type, etc.;
  • Step 5 PCF sends a session association notification request to SMF to provide service-level QoS guarantee, charging policy and other protection strategies;
  • Step 6 SMF replies to PCF with a session association notification response.
  • the PCF senses that the cell congestion information of the locally cached location area information has expired, and re-obtains the cell congestion information of the cell, thereby realizing real-time monitoring of the cell congestion information and avoiding information leakage.
  • an embodiment of the present application also provides a network data processing device.
  • the network data processing device includes: one or more processors and memories.
  • one processor and memory are taken as an example.
  • the processor and memory can be connected through a bus or other means.
  • Figure 13 takes the connection through a bus as an example.
  • the memory can be used to store non-transitory software programs and non-transitory computer executable programs, such as the network data processing method in the above embodiment of the present application.
  • the processor implements the above network data processing method in the embodiment of the present application by running non-transient software programs and programs stored in the memory.
  • the memory may include a storage program area and a storage data area, wherein the storage program area may store an operating system and an application program required for at least one function; the storage data area may store information required to execute the network data processing method in the embodiment of the present application. Data etc.
  • the memory may include high-speed random access memory and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid-state storage device.
  • the memory may include memory located remotely relative to the processor, and these remote memories may be connected to the network data processing device through a network. Examples of the above-mentioned networks include but are not limited to the Internet, intranets, local area networks, mobile communication networks and combinations thereof.
  • embodiments of the present application also provide a computer-readable storage medium, which stores a computer-executable program.
  • the computer-executable program is executed by one or more control processors, for example, as shown in FIG. 13 Execution by one of the processors may cause the one or more processors to execute the network data processing method in the embodiments of the present application.
  • one embodiment of the present application also provides a computer program product, including a computer program or computer instructions.
  • the computer program or computer instructions are stored in a computer-readable storage medium.
  • the centralized management unit of the computer device obtains the computer program from the computer-readable storage medium.
  • the computer program or computer instructions are read, and the centralized management unit executes the computer program or computer instructions, so that the computer device performs the network data processing method as in any of the previous embodiments.
  • each functional unit in each embodiment of the present application can be integrated into one processing unit, each unit can exist physically alone, or two or more units can be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the network data processing method provided by the embodiment of the present application has at least the following beneficial effects: when receiving a session creation request sent by SMF, determine the target service information carried in the session creation request, and obtain the corresponding monitoring rules based on the target service information to facilitate detection.
  • the terminal uses the service, and sends the monitoring rules to SMF to receive the business event information returned by SMF, so that the monitoring rules can be detected to detect that the terminal is using the target service, realize the monitoring of specific business flows, and according to the business events Information generates protection strategies for target services, so that different target services can be implemented Generate different protection policies and send the protection policies to SMF to protect target services. It can track the location of specific services and avoid the impact of other irrelevant services, thereby improving resource utilization and user experience.
  • a centralized management unit such as a central centralized management unit, a digital signal centralized management unit or a micro-centralized management unit, or as hardware, or as an integrated circuit, Such as application specific integrated circuits.
  • Such software may be distributed on computer-readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media).
  • computer storage media includes volatile and nonvolatile media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
  • Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disk (DVD) or other optical disk storage, magnetic cassettes, tapes, disk storage or other magnetic storage devices, or may Any other medium used to store the desired information and that can be accessed by a computer.
  • communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism, and may include any information delivery media .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了网络数据处理方法、装置及存储介质,网络数据处理方法包括:当接收到SMF发送的会话创建请求,根据会话创建请求确定目标业务信息(S100);根据目标业务信息确定与目标业务信息对应的监控规则(S200);将监控规则发送至SMF以接收SMF返回的业务发生事件信息,并根据业务发生事件信息生成目标业务的保护策略(S300);将保护策略发送至SMF以实现对目标业务的保护(S400)。

Description

网络数据处理方法、装置及存储介质
相关申请的交叉引用
本申请基于申请号为202210908729.3、申请日为2022年07月29日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本申请涉及通信技术领域,尤其涉及一种网络数据处理方法、装置及存储介质。
背景技术
随着5G(5th Generation Mobile Communication Technology,第五代移动通信技术)网络演进,5G标准协议引入了NWDAF(Network Data Analytics Function,网络数据分析功能)来收集无线资源和核心网元运行情况,NWDAF能够获取网络资源,并对资源进行配置和控制,其中,在对小区拥塞信息进行配置的过程中,当UE(User Equipment,用户设备)发起会话建立时,SMF(Session Management Function,会话管理功能)向PCF(Policy Control Function,策略控制功能)发起会话策略关联建立请求,PCF根据切片、分析类型、小区位置等信息得到该小区拥塞信息的NWDAF,并向NWDAF获取该小区的小区拥塞信息,最后PCF根据小区拥塞类型及等级进行决策,并提供会话级的QoS(Quality of Service,服务质量)保障,然而,在小区拥塞信息配置过程中仍然存在对用户无差别拥塞保障、QoS保障不精准、资源利用率低等问题,从而不能对资源进行有效配置和控制。
发明内容
本申请实施例提供了一种网络数据处理方法、装置及存储介质。
第一方面,本申请实施例提供了一种网络数据处理方法,当接收到SMF发送的会话创建请求,根据所述会话创建请求确定目标业务信息;根据所述目标业务信息确定与所述目标业务信息对应的监控规则,其中,所述监控规则用于检测终端对业务的使用情况;将所述监控规则发送至所述SMF以接收所述SMF返回的业务发生事件信息,并根据所述业务发生事件信息生成目标业务的保护策略,其中,所述业务发生事件信息用于表征所述监控规则检测到终端正在使用所述目标业务;将所述保护策略发送至所述SMF以实现对所述目标业务的保护。
第二方面,本申请实施例提供了一种网络数据处理装置,包括:存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现如第一方面所述的网络数据处理方法。
第三方面,本申请实施例提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可执行程序,所述计算机可执行程序用于使计算机执行如第一方面所述的网络数据处理方法。
附图说明
图1是本申请一个实施例提供的用于网络数据处理方法的网络拓扑的示意图;
图2是本申请一个实施例提供的网络数据处理方法的流程图;
图3是本申请另一实施例提供的网络数据处理方法的流程图;
图4是图3中的步骤S600的方法流程图;
图5是图2中的步骤S300的方法流程图;
图6是图2中的步骤S400的方法流程图;
图7是本申请另一实施例提供的网络数据处理方法的流程图;
图8是本申请另一实施例提供的网络数据处理方法的流程图;
图9是本申请另一实施例提供的网络数据处理方法的流程图;
图10为本申请一个示例提供的网络数据处理方法的示例图;
图11为本申请一个示例提供的网络数据处理方法的示例图;
图12为本申请一个示例提供的网络数据处理方法的示例图;
图13是本申请一个实施例提供的网络数据处理装置的结构示意图。
具体实施方式
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅用以解释本申请,并不用于限定本申请。
需要注意的是,在本申请实施例的描述中,说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量或者隐含指明所指示的技术特征的先后关系。“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示单独存在A、同时存在A和B、单独存在B的情况。其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。虽然在装置示意图中进行了功能模块划分,在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于装置中的模块划分,或流程图中的顺序执行所示出或描述的步骤。
此外,下面所描述的本申请各个实施方式中所涉及到的技术特征只要彼此之间未构成冲突就可以相互组合。
本申请实施例提供了一种网络数据处理方法、装置及存储介质,当接收到SMF发送的会话创建请求,确定会话创建请求携带的目标业务信息,并根据目标业务信息得到对应的监控规则以便于检测终端对业务的使用情况,将监控规则下发至SMF以接收SMF返回的业务发生事件信息,从而能够得到监控规则检测到终端正在使用目标业务,实现对特定业务流的监控,并根据业务发生事件信息生成目标业务的保护策略,从而能够实现根据不同的目标业务生成不同的保护策略,将保护策略发送至SMF以实现对目标业务的保护,能够对特定的业务进行位置跟踪,避免其他无关业务的影响,从而提高资源利用率,提升用户的使用体验。
下面结合附图,对本申请实施例作进一步阐述。
参照图1,图1是本申请一个实施例提供的用于网络数据处理方法的网络拓扑的示意图。
在图1的实施例中,该网络拓扑包括但不限于第一网络节点110、第二网络节点120、第三网络节点130和第四网络节点140。
在一些实施例中,第一网络节点110为具有会话管理功能的节点,第一网络节点110用于支持3GPP(3rd Generation Partnership Project,第三代合作伙伴计划)、Non-3GPP(Non3rd Generation Partnership Project,非第三代合作伙伴计划)会话的建立、修改以及释放等,还负责UE的IP(Intellectual Property,网络之间互连的协议)地址的分配和管理,统一控制策略的实施和终结。
第二网络节点120为具有用户面功能或者UDM(Unified Data Management,统一数据管理功能)的节点,第二网络节点120用于数据包路由和转发、业务探测、用量累计和上报,以及数据报文传输、复制和QoS保障。
第三网络节点130为具有网络数据分析功能的节点,用于从网元、应用程序、OAM(Operations and Maintenance,操作与维护)收集数据,向NRF(NF Repository Function,网络功能存储功能)注册为其他网元提供数据分析来源。
第四网络节点140为具有网络功能存储功能的节点,用于接收服务提供者的注册信息,供服务使用者发现服务提供者。
本申请实施例描述的网络拓扑以及应用场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域技术人员可知,随着网络拓扑的演变和新应用场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
本领域技术人员可以理解的是,图1中示出的拓扑结构并不构成对本申请实施例的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
参照图2,图2是本申请一个实施例提供的网络数据处理方法的流程图,该网络数据处理方法应用但不限于应用于第二网络节点120上,包括但不限于步骤S100-S400。
步骤S100:当接收到SMF发送的会话创建请求,根据会话创建请求确定目标业务信息;
在一些实施例中,UE发起PDU(Protocol Data Unit,协议数据单元)会话创建请求,SMF携带目标业务信息向第二网络节点发送该会话创建请求,以让第二网络节点确定目标业务信息。
需要说明的是,会话创建请求包括但不限于包括用户号码、数据网名称、切片、PDU会话标识、请求类型、用户标识、位置区域信息等参数,本实施例不做具体限制。
步骤S200:根据目标业务信息确定与目标业务信息对应的监控规则;
需要说明的是,监控规则用于检测终端对业务的使用情况。
在一些实施例中,根据目标业务信息中的多个参数信息确定目标业务信息的业务类型以及业务范围等,并根据目标业务信息的业务类型确定对应的监控规则以检测终端对业务的使用情况。
可以理解的是,监控规则可以为预定义的监控规则或者带业务流的监控规则,本实施例中的监控规则为ADC规则(Application Detection and Control,应用检测控制)。
步骤S300:将监控规则发送至SMF以接收SMF返回的业务发生事件信息,并根据业务发生事件信息生成目标业务的保护策略;
需要说明的是,业务发生事件信息用于表征监控规则检测到终端正在使用目标业务。
在一些实施例中,第二网络节点将监控规则发送至SMF,使得SMF存储监控规则,并将监控规则检测到终端正在使用的目标业务进行记录,从而得到业务发生事件信息,并根据业务 发生事件信息生成与目标业务对应的保护策略,从而实现对目标业务进行特定的保护。
需要说明的是,保护策略包括为该目标业务下发QoS保障、计费策略等规则。
步骤S400:将保护策略发送至SMF以实现对目标业务的保护。
在一些实施例中,第二网络节点将保护策略发送至SMF,使得SMF根据保护策略对目标业务进行保障,从而满足目标业务的应用要求,能够为不同等级用户提供差异化服务。
在一些实施例中,目标业务信息至少包括如下一种:用户的小区拥塞信息,小区拥塞信息用于表征用户所在的小区的网络性能;或用户的签约套餐,从而能够筛选出不同等级的用户并准确判断用户的业务类型,便于为不同等级用户提供差异化服务,避免业务信息上报的指令压力。
在一些实施例中,用户的签约套餐由PCF配置得到或者通过UDR签约得到。
需要说明的是,用户的签约套餐为用户专属套餐,例如,语音通话套餐、视频流量套餐、宽带服务等。
参照图3,图3是本申请另一实施例提供的获取小区拥塞信息的流程图,包括但不限于包括步骤S500至步骤S600。
需要说明的是,会话创建请求包括位置区域信息。
步骤S500:当本地缺少与位置区域信息对应的NWDAF信息,将位置区域信息发送至NRF以使NRF返回小区的NWDAF信息,将NWDAF信息发送至NWDAF以获取与位置区域信息对应的小区拥塞信息;
需要说明的是,NWDAF信息用于表征网络对数据分析的能力。
步骤S600:当本地存在与位置区域信息对应的NWDAF信息,将NWDAF信息发送至NWDAF以获取与位置区域信息对应的小区拥塞信息。
在一些实施例中,在第二网络节点接收到SMF发送的会话创建请求之后,存储会话创建请求中的位置区域信息,当发现本地缺少与位置区域信息对应的NWDAF信息,则需要按照位置区域信息获取该小区的小区拥塞信息,此时,需要将位置区域信息发送至NRF,使得NRF发现与位置区域对应的NWDAF信息,并返回NWDAF信息至第二网络节点,之后第二网络节点将NWDAF信息发送至NWDAF,从而能够根据NWDAF信息获取与位置区域信息对应的位置区域的拥塞情况,根据拥塞情况得到小区拥塞信息,便于后续根据小区拥塞信息进行业务决策,下发不同的保护策略;当确定本地存在与位置区域信息对应的NWDAF信息,则可以直接将NWDAF信息发送至NWDAF以获取与位置区域信息对应的小区拥塞信息。
需要说明的是,在将位置区域信息发送至NRF以使NRF返回小区的NWDAF信息的过程中,还携带切片、分析类型、位置区域等参数信息,向NRF发送NWDAF信息。
可以理解的是,小区拥塞信息包括但不限于包括小区信息、小区拥塞类型、小区拥塞等级等信息,本实施例不做具体限制。
参照图4,图4是对图3中步骤S600的说明,步骤S600包括但不限于包括步骤S610至步骤S620。
步骤S610:根据NWDAF信息以及位置区域信息生成拥塞控制请求;
步骤S620:发送拥塞控制请求至NWDAF,使得NWDAF根据拥塞控制请求返回小区拥塞信息。
在一些实施例中,当本地存在与位置区域信息对应的NWDAF信息之后,第二网络节点根 据NWDAF信息以及位置区域信息生成拥塞控制请求,并将拥塞控制请求发送至NWDAF以得到小区拥塞信息,便于后续监控规则的确定。
需要说明的是,拥塞控制请求携带分析类型、位置区域信息等参数信息,其中,位置区域信息可以为用户级、TAI级(Tracking Area Identity,跟踪区标识)或小区级等,本实施例不做具体限制。
可以理解的是,小区拥塞信息可以预先获取也可以实时获取,当小区拥塞信息为预先获取,则第二网络节点在收到位置区域信息时立即向NWDAF获取小区拥塞情况;当小区拥塞信息为实时获取,则第二网络节点在收到业务发生事件时,需要探测目标业务是否需要向NWDAF获取小区拥塞情况。
参照图5,图5是对图2中步骤S300的说明,步骤S300包括但不限于包括步骤S310至步骤S330。
步骤S310:建立与会话创建请求对应的会话创建应答;
步骤S320:通过会话创建应答发送监控规则至SMF;
步骤S330:接收SMF发送的会话更新请求以及通过会话更新请求发送的业务发生事件信息。
在一些实施例中,在接收到SMF发送的会话创建请求以及确定目标业务信息之后,建立与会话创建请求对应的会话创建应答,以便于通过会话创建应答发送监控规则至SMF,并接收SMF发送的会话更新请求以及通过会话更新请求发送的业务发生事件信息,其中,会话更新请求携带业务发生事件信息以及业务流等参数,从而实现对目标业务的监控与更新。
需要说明的是,在第二网络节点通过会话更新请求发送监控规则至SMF后,SMF存储监控规则,并将监控规则转发给UPF(User Plane Function,用户面功能)探测终端是否正在使用目标业务,如果UPF探测的结果为终端正在使用目标业务,则通过SMF上报业务发生事件信息至第二网络节点,从而完成通过监控规则对目标业务的检测。
参照图6,图6是对图2中步骤S400的说明,步骤S400包括但不限于包括步骤S410至步骤S420。
步骤S410:建立与会话更新请求对应的会话更新应答;
步骤S420:基于会话更新应答将保护策略发送至SMF以实现对目标业务的保护。
在一些实施例中,当接收到SMF发送的会话更新请求后,第二网络节点建立与会话更新请求对应的会话更新应答,并通过会话更新应答将保护策略发送至SMF,从而为目标业务提供业务级的QoS保障、计费方式等保护策略。
需要说明的是,保护策略可以为第二网络节点根据小区拥塞信息,例如,拥塞级别、拥塞类别等信息进行决策得到。
参照图7,图7是本申请另一实施例提供的网络数据处理方法的流程图,包括但不限于包括步骤S430至步骤S450。
步骤S430:接收SMF通过会话更新请求发送的业务结束事件信息;
需要说明的是,业务结束事件信息由UPF对目标业务进行探测得到,业务结束事件信息用于表征监控规则检测到终端停止使用目标业务;
步骤S440:根据业务结束事件信息生成删除指令;
需要说明的是,删除指令用于删除目标业务的保护策略;
步骤S450:通过会话更新应答向SMF发送删除指令。
在一些实施例中,在将保护策略发送至SMF之后,第二网络节点接收SMF通过会话更新请求发送的业务结束事件信息,并根据业务结束事件信息生成删除目标业务的保护策略的删除指令,通过会话更新应答向SMF发送删除指令,从而删除QoS保障、计费方式等保护策略。
需要说明的是,在UPF探测到监控规则中的终端停止使用目标业务后,通过SMF上报业务结束事件信息至第二网络节点,SMF通过会话更新请求将业务结束事件信息等参数发送给PCF,从而实现对目标业务的位置跟踪,以及对保护策略的删除。
参照图8,图8是本申请另一实施例提供的网络数据处理方法的流程图,该网络数据处理方法包括但不限于步骤S700-S1000。
步骤S700:接收由SMF发送的区域切换请求;
步骤S800:向NWDAF发送区域切换请求,以使NWDAF根据区域切换请求返回切换小区的切换拥塞信息;
步骤S900:根据切换拥塞信息以及区域切换请求生成切换保护策略;
步骤S1000:通过会话更新应答将切换保护策略发送至SMF。
在一些实施例中,当UE的位置发生切换或者改变,SMF携带新的位置区域信息等参数,通过会话更新请求将区域切换请求发送至第二网络节点,当第二网络节点发现本地没有新位置区域信息所处的切换小区的切换拥塞信息,则向NWDAF发送区域切换请求,以使NWDAF根据区域切换请求返回切换小区的切换拥塞信息,第二网络节点根据切换拥塞信息以及区域切换请求生成切换业务的切换保护策略,并通过会话更新应答将切换保护策略发送至SMF,以实现对切换业务的保护,从而精准获取切换拥塞信息,对切换业务进行特定的保护。
需要说明的是,切换拥塞信息包括切换小区信息、切换小区拥塞类型、切换小区拥塞等级等信息,本实施例不做具体限制。
在一些实施例中,在接收SMF发送的区域切换请求后,如果第二网络节点发现本地存在与新位置区域信息所处的切换小区的切换拥塞信息,则可以直接根据切换拥塞信息以及区域切换请求生成切换保护策略,并将切换保护策略发送至SMF进行切换业务的保护。
在一些实施例中,网络数据处理方法还包括每隔预设时间间隔更新小区的小区拥塞信息,避免小区拥塞信息发生过期的情况,及时更新小区拥塞信息,避免发生信息泄露的情况。
需要说明的是,第二网络节点会每隔预设时间间隔更新小区的小区拥塞信息,在第二网络节点感知到本地缓存的位置区域信息对应的小区拥塞信息过期后,重新获取该小区的小区拥塞信息,第二网络节点根据更新得到的位置区域信息向NWDAF发送新一轮的拥塞控制请求,以获取更新小区的小区拥塞信息等,再根据最新的小区拥塞信息重新决策该更新业务的保护策略,从而实现对使用业务的用户所在小区实时跟踪,提升用户的业务使用体验,针对特定业务进行保护,提高资源利用率。
为了更加清楚的说明网络数据处理方法的流程,下面以示例进行说明。
示例一:
参考图9,图9为本申请一个示例提供的网络数据处理方法的示例图;
示例一为预获取小区拥塞信息情况下,对目标业务进行监控的流程图:
步骤1:UE发起PDU会话创建请求,其中,SMF携带用户号码、数据网名称、切片、PDU会话标识、请求类型、用户标识、位置区域信息等参数,发送会话创建请求给PCF;
步骤2:PCF存储该位置区域信息,若本地无该小区的小区拥塞信息,则需要按位置区域信息获取该小区的小区拥塞信息;
步骤3:PCF若未向NRF发送过该小区拥塞的NWDAF信息,则发送携带切片、分析类型、位置区域信息等参数至NRF;
步骤4:NRF向PCF返回该小区的NWDAF信息;
步骤5:PCF根据返回的NWDAF信息,向NWDAF获取该位置区域信息的拥塞情况;
步骤6:PCF按位置区域信息向NWDAF发送拥塞控制请求以获取该小区的小区拥塞信息,其中,拥塞控制请求携带分析类型、位置区域(可能是用户级、TAI级或小区级)等参数;
步骤7:NWDAF返回该小区拥塞信息,包括小区信息、小区拥塞类型、小区拥塞等级等信息;
步骤8:PCF获取该用户的签约套餐,下发监控规则(预定义监控规则或带业务流的监控规则),该用户的专属套餐可PCF本地配置,也可以通过UDR签约实现;
步骤9:PCF向SMF回复会话创建应答,携带应用监控规则;
步骤10:SMF存储监控规则,并将监控规则转发给UPF探测业务是否使用;
步骤11:UPF探测到监控规则的业务使用,通过SMF上报业务发生事件信息给PCF;
步骤12:SMF通过会话更新请求,携带监控业务发生事件信息及业务流等参数发送给PCF;
步骤13:PCF根据小区拥塞信息如拥塞级别、拥塞类型等信息决策该目标业务的QoS保障、计费策略等保护策略;
步骤14:PCF向SMF回复会话更新应答,提供业务级的QoS保障、计费等策略;
步骤15:UPF探测到监控规则的业务结束,通过SMF上报业务结束事件信息给PCF;
步骤16:SMF通过会话更新请求,携带监控业务结束事件信息等参数发送给PCF;
步骤17:PCF删除目标业务的QoS保障、计费策略等保护策略,不再提供专属保障;
步骤18:PCF向SMF回复会话更新请求应答,删除业务级的QoS保障、计费策略等保护策略。
在一些实施例中,通过本申请实施例的方法,针对特定应用监控发生和停止,提供业务级QoS保障,并能根据小区拥塞信息和有效期实现无线、承载资源的动态调控,占用无线、承载专有资源的时间短,资源利用率高。
示例二:
参考图10,图10为本申请一个示例提供的网络数据处理方法的示例图;
示例二为实时获取小区拥塞信息情况下,对目标业务进行监控的流程图:
步骤1:UE发起PDU会话建立请求,SMF携带用户号码、数据网名称、切片、PDU会话标识、请求类型、用户标识、位置区域信息等参数,发送会话创建请求给PCF;
步骤2:PCF获取该用户的签约套餐,下发监控规则(预定义监控规则或带业务流的监控规则),该用户的专属套餐可PCF本地配置,也可以通过UDR签约实现;
步骤3:PCF向SMF回复会话创建应答,携带应用监控规则;
步骤4:SMF存储监控规则,并将监控规则转发给UPF探测业务是否使用;
步骤5:UPF探测到监控规则的业务使用,通过SMF上报业务发生事件信息给PCF;
步骤6:SMF通过会话更新请求,携带监控业务发生事件信息及业务流等参数发送给PCF;
步骤7:PCF存储该小区的位置区域信息,若本地无该小区的小区拥塞信息,且该探测应 用需要小区拥塞信息,则按位置区域信息获取该小区的小区拥塞信息;
步骤8:PCF若未向NRF发送过该小区拥塞的NWDAF信息,则发送携带切片、分析类型、位置区域信息等参数至NRF;
步骤9:NRF向PCF返回提供该小区拥塞信息的NWDAF信息;
步骤10:PCF根据返回的NWDAF信息,向NWDAF获取该位置区域信息的拥塞情况;
步骤11:PCF按位置区域信息向NWDAF发送拥塞控制请求以获取该小区的小区拥塞信息,其中,拥塞控制请求携带分析类型、位置区域(可能是用户级、TAI级或小区级)等参数;
步骤12:NWDAF返回该小区拥塞信息,包括小区信息、小区拥塞类型、小区拥塞等级等信息;
步骤13:PCF根据小区拥塞信息如拥塞级别、拥塞类型等信息决策该目标业务的QoS保障、计费策略等保护策略;
步骤14:PCF向SMF回复会话更新应答,提供业务级的目标业务的QoS保障、计费策略等保护策略;
步骤15:UPF探测到监控规则的业务结束,通过SMF上报业务结束事件信息给PCF;
步骤16:SMF通过会话更新请求,携带业务结束事件信息发送给PCF;
步骤17:PCF删除目标业务的QoS保障、计费策略等保护策略,不再提供专属保障;
步骤18:PCF向SMF回复会话更新请求应答,删除业务级的QoS保障、计费策略等保护策略。
示例三:
参考图11,图11为本申请一个示例提供的网络数据处理方法的示例图;
示例三为小区的位置区域信息更新重新获取小区拥塞信息的步骤流程:
步骤1:UE的位置区域信息发生切换,SMF携带新的位置区域信息等参数,通过会话更新请求发送给PCF;
步骤2:PCF发现本地没有新位置区域信息的拥塞信息,则按新的位置区域信息获取该小区的小区拥塞信息;
步骤3:PCF按位置区域信息向NWDAF发送拥塞控制请求以获取该小区的小区拥塞信息,携带分析类型、位置区域(可能是用户级、TAI级或小区级)等参数;
步骤4:NWDAF返回该小区拥塞信息,包括小区信息、小区拥塞类型、小区拥塞等级等信息;
步骤5:PCF根据小区拥塞信息如拥塞级别、拥塞类型等信息决策该业务的QoS保障、计费策略等保护策略;
步骤6:PCF向SMF回复会话更新应答,提供业务级的QoS保障、计费策略等保护策略。
示例四:
参考图12,图12为本申请一个示例提供的网络数据处理方法的示例图;
示例四为小区的小区拥塞信息过期重新获取小区拥塞信息的步骤流程:
步骤1:PCF感知到本地缓存的位置区域信息的小区拥塞信息过期,重新获取该小区的小区拥塞信息;
步骤2:PCF按位置区域信息向NWDAF获取该小区的小区拥塞控制信息,携带分析类型、位置区域信息(可能是用户级、TAI级或小区级)等参数;
步骤3:NWDAF返回该小区拥塞信息,包括小区信息、小区拥塞类型、小区拥塞等级等信息;
步骤4:PCF根据最新的小区拥塞信息如拥塞级别、拥塞类型等重新决策该探测业务的QoS保障、计费策略等保护策略;
步骤5:PCF向SMF发送会话关联通知请求,提供业务级的QoS保障、计费策略等保护策略;
步骤6:SMF向PCF回复会话关联通知应答。
在一些实施例中,PCF感知到本地缓存的位置区域信息的小区拥塞信息过期,重新获取该小区的小区拥塞信息,从而实现实时对小区拥塞信息的监控,避免发生信息泄露等情况。
如图13所示,本申请实施例还提供了一种网络数据处理装置。
在一些实施例中,该网络数据处理装置包括:一个或多个处理器和存储器,图13中以一个处理器及存储器为例。处理器和存储器可以通过总线或者其他方式连接,图13中以通过总线连接为例。
存储器作为一种非暂态计算机可读存储介质,可用于存储非暂态软件程序以及非暂态性计算机可执行程序,如上述本申请实施例中的网络数据处理方法。处理器通过运行存储在存储器中的非暂态软件程序以及程序,从而实现上述本申请实施例中的网络数据处理方法。
存储器可以包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需要的应用程序;存储数据区可存储执行上述本申请实施例中的网络数据处理方法所需的数据等。此外,存储器可以包括高速随机存取存储器,还可以包括非暂态存储器,例如至少一个磁盘存储器件、闪存器件、或其他非暂态固态存储器件。在一些实施方式中,存储器可包括相对于处理器远程设置的存储器,这些远程存储器可以通过网络连接至该网络数据处理装置。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
此外,本申请实施例还提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机可执行程序,该计算机可执行程序被一个或多个控制处理器执行,例如,被图13中的一个处理器执行,可使得上述一个或多个处理器执行上述本申请实施例中的网络数据处理方法。
此外,本申请的一个实施例还提供了一种计算机程序产品,包括计算机程序或计算机指令,计算机程序或计算机指令存储在计算机可读存储介质中,计算机设备的集中管理单元从计算机可读存储介质读取计算机程序或计算机指令,集中管理单元执行计算机程序或计算机指令,使得计算机设备执行如前面任意实施例的网络数据处理方法。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。
本申请实施例提供的网络数据处理方法,至少具有如下有益效果:当接收到SMF发送的会话创建请求,确定会话创建请求携带的目标业务信息,并根据目标业务信息得到对应的监控规则以便于检测终端对业务的使用情况,将监控规则下发至SMF以接收SMF返回的业务发生事件信息,从而能够得到监控规则检测到终端正在使用目标业务,实现对特定业务流的监控,并根据业务发生事件信息生成目标业务的保护策略,从而能够实现根据不同的目标业务 生成不同的保护策略,将保护策略发送至SMF以实现对目标业务的保护,能够对特定的业务进行位置跟踪,避免其他无关业务的影响,从而提高资源利用率,提升用户的使用体验。
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、系统可以被实施为软件、固件、硬件及其适当的组合。某些物理组件或所有物理组件可以被实施为由集中管理单元,如中央集中管理单元、数字信号集中管理单元或微集中管理单元执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于RAM、ROM、EEPROM、闪存或其他存储器技术、CD-ROM、数字多功能盘(DVD)或其他光盘存储、磁盒、磁带、磁盘存储或其他磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其他的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。

Claims (12)

  1. 一种网络数据处理方法,包括:
    当接收到SMF发送的会话创建请求,根据所述会话创建请求确定目标业务信息;
    根据所述目标业务信息确定与所述目标业务信息对应的监控规则,其中,所述监控规则用于检测终端对业务的使用情况;
    将所述监控规则发送至所述SMF以接收所述SMF返回的业务发生事件信息,并根据所述业务发生事件信息生成目标业务的保护策略,其中,所述业务发生事件信息用于表征所述监控规则检测到终端正在使用所述目标业务;
    将所述保护策略发送至所述SMF以实现对所述目标业务的保护。
  2. 根据权利要求1所述的网络数据处理方法,其中,所述目标业务信息至少包括如下一种:
    用户的小区拥塞信息,所述小区拥塞信息用于表征所述用户所在的小区的网络性能;或
    用户的签约套餐。
  3. 根据权利要求2所述的网络数据处理方法,其中,所述会话创建请求包括位置区域信息;所述小区拥塞信息由如下步骤得到:
    当本地缺少与所述位置区域信息对应的NWDAF信息,将所述位置区域信息发送至NRF以使所述NRF返回所述小区的NWDAF信息,将所述NWDAF信息发送至NWDAF以获取与所述位置区域信息对应的所述小区拥塞信息,其中,所述NWDAF信息用于表征网络对数据分析的能力;
    当本地存在与所述位置区域信息对应的NWDAF信息,将所述NWDAF信息发送至NWDAF以获取与所述位置区域信息对应的所述小区拥塞信息。
  4. 根据权利要求3所述的网络数据处理方法,其中,所述将所述NWDAF信息发送至NWDAF以获取与所述位置区域信息对应的所述小区拥塞信息,包括:
    根据所述NWDAF信息以及所述位置区域信息生成拥塞控制请求;
    发送所述拥塞控制请求至NWDAF,使得所述NWDAF根据所述拥塞控制请求返回所述小区拥塞信息。
  5. 根据权利要求1所述的网络数据处理方法,其中,所述将所述监控规则发送至所述SMF以接收所述SMF返回的业务发生事件信息,包括:
    建立与所述会话创建请求对应的会话创建应答;
    通过所述会话创建应答发送所述监控规则至所述SMF;
    接收所述SMF发送的会话更新请求以及通过所述会话更新请求发送的所述业务发生事件信息。
  6. 根据权利要求5所述的网络数据处理方法,其中,所述将所述保护策略发送至所述SMF以实现对所述目标业务的保护,包括:
    建立与所述会话更新请求对应的会话更新应答;
    基于所述会话更新应答将所述保护策略发送至所述SMF以实现对所述目标业务的保护。
  7. 根据权利要求6所述的网络数据处理方法,其中,在所述基于所述会话更新应答将所述保护策略发送至所述SMF之后,还包括:
    接收所述SMF通过所述会话更新请求发送的业务结束事件信息,其中,所述业务结束事 件信息由UPF对所述目标业务进行探测得到,所述业务结束事件信息用于表征所述监控规则检测到终端停止使用所述目标业务;
    根据所述业务结束事件信息生成删除指令,所述删除指令用于删除所述目标业务的所述保护策略;
    通过所述会话更新应答向所述SMF发送所述删除指令。
  8. 根据权利要求6所述的网络数据处理方法,其中,所述会话更新请求包括区域切换请求;所述方法还包括:
    接收由所述SMF发送的所述区域切换请求;
    向NWDAF发送所述区域切换请求,以使所述NWDAF根据所述区域切换请求返回切换小区的切换拥塞信息;
    根据所述切换拥塞信息以及所述区域切换请求生成切换保护策略;
    通过所述会话更新应答将所述切换保护策略发送至所述SMF。
  9. 根据权利要求2所述的网络数据处理方法,还包括:
    每隔预设时间间隔更新所述小区的小区拥塞信息。
  10. 根据权利要求2所述的网络数据处理方法,其中,所述签约套餐由本地配置得到或者通过UDR签约得到。
  11. 一种网络数据处理装置,包括:存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现如权利要求1至10中任意一项所述的网络数据处理方法。
  12. 一种计算机可读存储介质,存储有计算机可执行程序,所述计算机可执行程序用于使计算机执行如权利要求1至10任意一项所述的网络数据处理方法。
PCT/CN2023/107508 2022-07-29 2023-07-14 网络数据处理方法、装置及存储介质 WO2024022136A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210908729.3 2022-07-29
CN202210908729.3A CN117528563A (zh) 2022-07-29 2022-07-29 网络数据处理方法、装置及存储介质

Publications (1)

Publication Number Publication Date
WO2024022136A1 true WO2024022136A1 (zh) 2024-02-01

Family

ID=89705340

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/107508 WO2024022136A1 (zh) 2022-07-29 2023-07-14 网络数据处理方法、装置及存储介质

Country Status (2)

Country Link
CN (1) CN117528563A (zh)
WO (1) WO2024022136A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200092424A1 (en) * 2018-09-13 2020-03-19 Weihua QIAO Charging Control with SMF and PCF
CN111699709A (zh) * 2018-01-11 2020-09-22 欧芬诺有限责任公司 监测和报告服务性能
WO2021063627A1 (en) * 2019-10-04 2021-04-08 Nokia Technologies Oy Apparatus and method for subscribing analytic services to a user repository in the 5g core network
US20210112478A1 (en) * 2018-02-20 2021-04-15 Telefonaktiebolaget Lm Ericsson (Publ) Methods and functions for handling local breakout
CN113259988A (zh) * 2021-06-25 2021-08-13 中兴通讯股份有限公司 服务质量设定的方法、通信设备
WO2022022840A1 (en) * 2020-07-28 2022-02-03 Telefonaktiebolaget Lm Ericsson (Publ) Quality of service dependent policy rules

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111699709A (zh) * 2018-01-11 2020-09-22 欧芬诺有限责任公司 监测和报告服务性能
US20210112478A1 (en) * 2018-02-20 2021-04-15 Telefonaktiebolaget Lm Ericsson (Publ) Methods and functions for handling local breakout
US20200092424A1 (en) * 2018-09-13 2020-03-19 Weihua QIAO Charging Control with SMF and PCF
WO2021063627A1 (en) * 2019-10-04 2021-04-08 Nokia Technologies Oy Apparatus and method for subscribing analytic services to a user repository in the 5g core network
WO2022022840A1 (en) * 2020-07-28 2022-02-03 Telefonaktiebolaget Lm Ericsson (Publ) Quality of service dependent policy rules
CN113259988A (zh) * 2021-06-25 2021-08-13 中兴通讯股份有限公司 服务质量设定的方法、通信设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI, HISILICON, XIAOMI, ZTE: "Clarifications for slice related policy control", 3GPP TSG-WG SA2 MEETING #146E E-MEETING S2-2106855, 26 August 2021 (2021-08-26), XP052059373 *

Also Published As

Publication number Publication date
CN117528563A (zh) 2024-02-06

Similar Documents

Publication Publication Date Title
US11758416B2 (en) System and method of network policy optimization
US11202240B2 (en) Systems and methods for managing and monitoring communication sessions
WO2020063335A1 (zh) 一种切片信息处理方法及装置
CN111093225B (zh) 一种数据路径服务质量的监视及报告方法、装置及介质
US20230362024A1 (en) Method of and a session management function for provisioning a user plane function, a method of and a user plane function for processing user traffic and a method of and charging function for charging user traffic
US10972368B2 (en) Methods, systems, and computer readable media for providing reduced signaling internet of things (IoT) device monitoring
WO2021036441A1 (zh) 一种统计业务流量的方法和装置
WO2021139696A1 (zh) 一种报告信息的发送方法、装置及系统
US8059598B2 (en) Wireless communication system and method for managing service flow identifier in the same
US20190182104A1 (en) Method and device for processing communication path
KR20110113651A (ko) 로컬 교환을 구현하는 방법 및 시스템
CN108092899A (zh) Manet环境下基于命名数据网络的路由策略更新方法
US8804492B2 (en) Handling alarms based on user session records
CN111919501B (zh) 专用承载管理
US20220150797A1 (en) Method for performing access control on user equipment, network system, and related device
WO2021056314A1 (zh) 一种为分布式服务提供请求响应确切通信时延保障的系统
US20230336432A1 (en) Traffic classification rules based on analytics
CN109196895B (zh) 一种报文传输方法、装置及系统
WO2024022136A1 (zh) 网络数据处理方法、装置及存储介质
US20230269574A1 (en) Apparatus and method for providing data measured by user plane function in a wireless communication system
US20230011348A1 (en) System And Method For Subscriber Awareness In A 5G Network
WO2018177003A1 (zh) 一种计费方法、相关设备和系统
US20230179437A1 (en) Quality of Service Dependent Policy Rules
WO2021218270A1 (zh) 一种通信方法、装置及系统
WO2020249101A1 (zh) 一种通信方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23845348

Country of ref document: EP

Kind code of ref document: A1