Policy management method, device, equipment and system for network slicing
A policy management and network slicing technology, applied in the field of communication, can solve problems such as inability to adapt to flexible management of mobile networks, and inability to meet different network slicing management and service requirements
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0088] According to the embodiment of this application, Figure 3a It is a flow chart of the first embodiment of a policy management method for network slicing provided in this application. The method includes:
[0089] S101. The second management entity receives the policy management operation request message sent by the first management entity.
[0090] Wherein, the policy management operation request message carries indication information indicating the management object corresponding to the management policy, and the indication information is used to indicate the management object corresponding to the management policy, and may include the identity identifier and / or class identifier of the management object, wherein, The identity of the management object can be the ID of the management object, and the class identifier can be the identifier of a class of management objects that meet certain characteristics. For example, when the management object is a network slice instanc...
Embodiment 2
[0098] Figure 3b It is a flow chart of the second embodiment of a network slicing policy management method provided by this application. The difference between this embodiment and Embodiment 1 is that this embodiment also includes other processing steps that may be performed by the first management entity and the second management entity, and because the process of network slice management includes Interaction, in order to make it easier to understand the implementation of network slicing policy management in the embodiment, the steps performed by each entity are described together in this embodiment to reflect the integrity of the interaction, but it is by no means limiting the process involved in each entity Must be implemented together, the technical solution proposed by this application has improvements on each entity side. Contents that are the same as or similar to those in Embodiment 1 will not be repeated in this embodiment.
[0099] The method of this embodiment in...
Embodiment 3
[0121] Figure 4 It is a flow chart of the third embodiment of a network slicing policy management method provided by this application. The difference from Embodiment 1 or Embodiment 2 is that in this embodiment, the policy management operation request message is specifically a creation management policy request message, and the same or similar content as Embodiment 1 or Embodiment 2 is not included in this embodiment. To repeat, the method includes:
[0122] S301. The second management entity receives the management policy creation request message sent by the first management entity.
[0123] Wherein, in the creation management policy request message, the indication information indicating the management object corresponding to the management policy is carried, which may include the identity identifier and / or class identifier of the management object. For example, the indication information may be the identity of the management object to which the policy applies (such as the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


