Slicing control method and device

A control method, slicing technology, applied in the computer field, can solve problems such as no solution

Active Publication Date: 2021-07-16
HUAWEI TECH CO LTD
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the scenario of over-limit access, there is currently no relevant solution for how the network performs policy and charging rule control.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Slicing control method and device
  • Slicing control method and device
  • Slicing control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0117] Please refer to image 3 , which is a schematic flowchart of a slice control method provided in the embodiment of the present application, the method specifically includes the following steps:

[0118] Step S301, the access management network element receives a first session establishment request message from a terminal device, and the first session establishment request message includes an identifier of a network slice.

[0119] In this embodiment of the present application, the first session establishment request message is used to request establishment of the first session of the terminal device, and the first session may specifically be a protocol data unit (protocol data unit, PDU) session. Optionally, the first session establishment request message may include an identifier of the first session (that is, a PDU session ID) and / or an identifier of a terminal device (that is, a UEID), and the identifier of a terminal device may also be understood as a user identifier...

Embodiment 2

[0206] The embodiment of the present application also provides another slice control method. The main difference between the slice control method and the slice control method provided in Embodiment 1 is that the slice access decision can be performed by the session management network element. That is, after the access management network element receives the session establishment request message from the terminal device, it does not need to judge whether the network slice is in an overrun state, and the session establishment request message sent by the access management network element to the session management network element may not include Limit indication, after the session management network element receives the session establishment request message from the access management network element, it can determine whether the network slice is in the limit state, and decide whether to allow the session to be established in the limit state.

[0207] Please refer to Figure 10 , i...

Embodiment 3

[0229] The embodiment of the present application also provides another slice control method. The main difference between this slice control method and the slice control methods provided in Embodiment 1 and Embodiment 2 is that the policy control network element can judge the overrun state of the network slice . That is, the session establishment request message received by the session management network element from the access management network element, and the first request message received by the policy control network element from the session management network element may not include an overrun indication, and may be received by the policy control network element After receiving the first request message, judge whether the network slice is in an overrun state, and generate corresponding policy control information.

[0230] Please refer to Figure 11 , is a schematic flowchart of another slice control method provided in the embodiment of the present application. The meth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a slice control method and device, the method comprising the steps: a session management network element sends a first request message to a policy control network element, the first request message being used for requesting first session policy control information associated with a first session; and the session management network element receives the first response message from the policy control network element, and performs policy control on the first session according to the first session policy control information in the first response message. A session management network element can carry an identifier of a network slice in a first request message sent to a policy control network element, and an overrun indication used for indicating a terminal device or a first session to access the network slice in an overrun state. Therefore, the policy control network element can formulate the corresponding session policy control information for the first session established in the over-limit state, thereby supporting the terminal equipment to establish the session in the over-limit state of the network slice, and fully utilizing network resources.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a slice control method and device. Background technique [0002] Network slice (network slice, NS) is a logical network with specific network characteristics divided in the operator's communication network. generation, 5G) mobile communication system is a key technology for network differentiation requirements. [0003] When an operator creates and deploys a network slice, it will define the service level specification (service level specification, SLS) of the network slice, where the SLS includes some scale parameters of the network slice, for example, the maximum number of terminals supported by the network slice, the maximum Number of session connections, etc. During the operation of network slicing, the policy control network element can implement policy control on the network slice according to the scale parameters of the network slice. For example, in the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/08
CPCH04L67/14H04L41/0896H04L41/0894H04L41/00H04L41/0895H04L41/5019H04L41/5009H04W4/50H04W76/10H04W48/16
Inventor 丁辉李卓明
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products