CN110661630A - Method, device and system for distributing network slice instances - Google Patents

Method, device and system for distributing network slice instances Download PDF

Info

Publication number
CN110661630A
CN110661630A CN201810685048.9A CN201810685048A CN110661630A CN 110661630 A CN110661630 A CN 110661630A CN 201810685048 A CN201810685048 A CN 201810685048A CN 110661630 A CN110661630 A CN 110661630A
Authority
CN
China
Prior art keywords
network slice
user
entity
target network
list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810685048.9A
Other languages
Chinese (zh)
Other versions
CN110661630B (en
Inventor
谢沛荣
陈洁
龙彪
李文苡
刘柳
刘佳一凡
王庆扬
曹磊
赵晔
王波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201810685048.9A priority Critical patent/CN110661630B/en
Publication of CN110661630A publication Critical patent/CN110661630A/en
Application granted granted Critical
Publication of CN110661630B publication Critical patent/CN110661630B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements

Abstract

The disclosure relates to a method, a device and a system for distributing network slice instances, and relates to the technical field of mobile communication. The method comprises the following steps: responding to the user registration, the NSSF entity acquires the identifier of a target network slice which is stored in the UDM entity in advance and corresponds to the user; judging whether the target network slice falls into an allowed access slice list corresponding to the user; in the case that the target network slice falls into the allowed access slice list, allocating a network slice instance for the user only in the target network slice; in the case where the target network slice does not fall into the list of allowed access slices, no network slice instance is allocated to the user before the user initiates the service. The technical scheme disclosed by the invention can avoid the waste of system resources and reduce the signaling interaction, thereby improving the processing efficiency of the system.

Description

Method, device and system for distributing network slice instances
Technical Field
The present disclosure relates to the field of mobile communications technologies, and in particular, to a method and an apparatus for allocating network slice instances, a system for allocating network slice instances, and a computer-readable storage medium.
Background
The concept of network slicing is introduced in 5G systems. Each network slice can have different mobility, security, time delay, reliability and even charging mode, thereby better providing wide connection service for various industries.
In a 5G network, a user may access multiple network slices simultaneously. When a network is deployed, each slice corresponds to multiple network slice instances, so that when a user actually accesses a network slice, the system needs to select a specific network slice instance for the user.
In the related art, network slice instance allocation is performed in all access network slices of a user at initial registration of a terminal, or a network slice instance is allocated to the user when the user initiates a service.
Disclosure of Invention
The inventors of the present disclosure found that the following problems exist in the above-described related art: the related technology wastes system resources seriously or needs more signaling interaction, so that the processing efficiency is low.
In view of this, the present disclosure provides a technical scheme for selecting a network slice instance, which can avoid system resource waste and improve processing efficiency.
According to some embodiments of the present disclosure, there is provided a method for allocating network slice instances, including: responding to user registration, acquiring an identifier of a target Network Slice corresponding to a user and pre-stored in a UDM (Unified Data Management) entity by an NSSF (Network Slice Selection Function) entity; judging whether the target network slice falls into an allowed access slice list corresponding to the user; in the case that the target network slice falls into the list of allowed access slices, allocating a network slice instance for the user only in the target network slice; and under the condition that the target network slice does not fall into the allowed access slice list, not allocating a network slice example to the user before the user initiates service.
In some embodiments, the identity of the target network slice is pre-stored in a user subscription parameter in the UDM entity.
In some embodiments, the identification of the target network slice is obtained from the UDM entity by an AMF (Access and Mobility Management Function) entity.
In some embodiments, the list of slices allowed to be accessed is returned to the AMF entity, so that the AMF entity completes registration with the terminal of the user.
In some embodiments, in the event that the target network slice falls within the list of allowed access slices, an identification of the network slice instance allocated for the user is returned to the AMF entity.
In some embodiments, the allowed access slice list is generated by the NSSF entity according to one or more of an access mode of a network slice, a coverage of a network slice, a location of the user, and a slice request list provided by the user.
According to other embodiments of the present disclosure, there is provided a network slice instance allocation apparatus, including: a receiver, configured to, in response to user registration, obtain an identifier of a target network slice that is pre-stored in a UDM entity and corresponds to the user; a processor, configured to determine whether the target network slice falls into an allowed access slice list corresponding to the user, allocate a network slice instance to the user only in the target network slice if the target network slice falls into the allowed access slice list, and not allocate a network slice instance to the user before the user initiates a service if the target network slice does not fall into the allowed access slice list.
In some embodiments, the receiver obtains, by an AMF entity, an identification of the target network slice from the UDM entity.
In some embodiments, the apparatus for allocating network slice instances further includes a transmitter, configured to return the list of allowed access slices to an AMF entity, so that the AMF entity completes registration with the terminal of the user.
In some embodiments, the transmitter returns to the AMF entity an identification of the network slice instance allocated for the user in case the target network slice falls into the allowed access slice list.
According to still further embodiments of the present disclosure, there is provided an apparatus for allocating a network slice instance, including: a memory; and a processor coupled to the memory, the processor configured to perform one or more steps of the method for allocating network slice instances in any of the above embodiments based on instructions stored in the memory device.
In accordance with still other embodiments of the present disclosure, there is provided a network slice instance allocation system, including: an NSSF entity for performing the method for allocating network slice instances in any of the above embodiments; and the UDM entity is used for pre-storing the identification of the target network slice corresponding to the user.
In some embodiments, the allocation system further comprises an AMF entity configured to obtain the identifier of the target network slice from the UDM entity and forward the identifier to the NSSF entity.
In some embodiments, the AMF entity is configured to receive the allowed access slice list corresponding to the user and the identifier of the network slice instance, which are returned by the NSSF entity, and complete registration in cooperation with the terminal of the user.
According to still further embodiments of the present disclosure, there is provided a method for allocating network slice instances, including: responding to user registration, the AMF entity acquires an identifier of a target network slice which is stored in a UDM entity in advance and corresponds to the user; the AMF entity forwards the identification of the target network slice to an NSSF entity; the NSSF entity judges whether the target network slice falls into an allowed access slice list corresponding to the user; in the case that the target network slice falls into the list of allowed access slices, the NSSF entity allocating a network slice instance for the user in the target network slice only; in the case that the target network slice does not fall into the allowed access slice list, the NSSF entity does not allocate a network slice instance to the user before the user initiates traffic.
According to still further embodiments of the present disclosure, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements one or more steps of the method for allocating network slice instances in any of the above embodiments.
In the above embodiment, a default target network slice is preset for the user, and when the user registers, only the network slice instance is allocated in the target network slice, but not all the network slices of the user. Therefore, the waste of system resources can be avoided, and the signaling interaction is reduced, so that the processing efficiency of the system is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
The present disclosure may be more clearly understood from the following detailed description, taken with reference to the accompanying drawings, in which:
fig. 1 illustrates a flow diagram of some embodiments of an allocation method of a network slice example of the present disclosure;
fig. 2 illustrates a signaling diagram of some embodiments of an allocation method of a network slice example of the present disclosure;
fig. 3 illustrates a block diagram of some embodiments of an allocation apparatus of a network slice example of the present disclosure;
fig. 4 shows a block diagram of further embodiments of a distribution device of a network slice example of the present disclosure;
fig. 5 shows a block diagram of still further embodiments of the network access device of the present disclosure;
fig. 6 illustrates a block diagram of some embodiments of a distribution system of a network slice example of the present disclosure;
fig. 7 illustrates a flow diagram of yet further embodiments of the disclosed network slice instance allocation method.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.
Meanwhile, it should be understood that the sizes of the respective portions shown in the drawings are not drawn in an actual proportional relationship for the convenience of description.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
As previously described, a user may access up to 8 network slices simultaneously. However, the inventors of the present disclosure have recognized that a user may only use one of the network slices to carry traffic at a time. The related art allocates a network slice instance to a user among 8 network slices to which the user is allowed to access when the user registers. This results in a waste of system resources.
Furthermore, the related art may not allocate network slice instances to users at the time of registration until the users are reallocated at the time of service initiation, which results in more signaling interaction, resulting in system processing inefficiency.
In view of the above technical problems, the technical solutions of the present disclosure may be implemented by the following embodiments.
Fig. 1 illustrates a flow diagram of some embodiments of an allocation method of a network slice example of the present disclosure.
As shown in fig. 1, the method includes: step 110, acquiring the pre-stored identification of the target network slice; step 120, judging whether the target network slice falls into an allowed access slice list; step 130, distributing network slice examples for users; and step 140, no network slice instance is assigned to the user.
In step 110, in response to the user registration, the NSSF entity obtains an identification of a target network slice corresponding to the user, which is stored in advance in the UDM entity. For example, the identifier of the target network slice is pre-stored in the user subscription parameter in the UDM entity, and when the target network slice is accessed by the user, the system allocates the network slice of the network slice instance to the user by default.
In some embodiments, the NSSF entity obtains the identification of the target network slice from the UDM entity through the AMF entity. For example, a user initiates registration, and after the user authentication is passed, the AMF entity obtains a corresponding user subscription parameter from the UDM entity, where the user subscription parameter includes an identifier of a target network slice corresponding to the user. The AMF entity may send a network slice selection request to the NSSF entity, where the network slice selection request carries an identifier of a target network slice.
In step 120, it is determined whether the target network slice falls into the list of allowed access slices corresponding to the user. For example, the NSSF entity generates the list of allowed access slices according to one or more of the access mode of the network slice, the coverage of the network slice, the location of the user, and the list of slice requests provided by the user.
In some embodiments, the NSSF entity checks whether the identification of the target network slice is received and, if so, determines whether the target network slice falls within the list of allowed access slices. In case the target network slice falls into the allowed access slice list, performing step 130; in case the target network slice does not fall into the allowed access slice list, step 140 is performed.
In step 130, the user is assigned a network slice instance only in the target network slice.
In step 140, no network slice instance is assigned to the user before the user initiates the service. For example, a network slice instance may be allocated in a network slice carrying traffic when the traffic is initiated by a user.
In some embodiments, a list of allowed access slices may be returned to the AMF entity. In the event that the target network slice falls into the allowed access slice list, an identification of the network slice instance allocated for the user may also be returned to the AMF entity. And the AMF entity completes registration in cooperation with the terminal of the user.
In order to more clearly illustrate the technical solution of the present disclosure, the following is described in detail with reference to the signaling diagram in fig. 2.
Fig. 2 illustrates a signaling diagram of some embodiments of an allocation method of a network slice example of the present disclosure.
As shown in fig. 2, in event 201, a default selected slice parameter (e.g., an identification of a target network slice) is added to the user subscription parameter of the UDM entity 23, which identifies which network slice instance will be immediately allocated for when the user accesses.
At event 202, the user's terminal 21 initiates a registration request to the AMF entity 22.
In event 203, the network elements such as the AMF entity 22 and the UDM entity 23 cooperate to complete the authentication operation of the user.
In event 204, AMF entity 22 requests the user subscription parameters for the user from UDM entity 23.
In event 205, the UDM entity 23 returns the corresponding user subscription parameters to the AMF entity 22, where the user subscription parameters include default selected slice parameters.
At event 206, the AMF entity 22 initiates a slice selection request to the NSSF entity 24, which includes default selected slice parameters and other slice-related information.
In event 207, the NSSF entity 24 determines the list of allowed access slices for the subscriber and determines whether the network slice identified by the default selected slice parameter is in the list of allowed access slices. The NSSF entity 24 allocates a network slice instance for the network slice identified by the default selected slice parameter if in the list of allowed access slices.
In event 208, the NSSF entity 24 returns a slice selection response to the AMF entity 22, which includes information about the user's list of allowed access slices, the assigned slice instance, etc.
At event 209, the AMF entity 22 completes the subsequent registration procedure with the terminal 21.
In the above embodiment, a default target network slice is preset for the user, and when the user registers, only the network slice instance is allocated in the target network slice, but not all the network slices of the user. Therefore, the waste of system resources can be avoided, and the signaling interaction is reduced, so that the processing efficiency of the system is improved.
Fig. 3 illustrates a block diagram of some embodiments of an allocation apparatus of a network slice example of the present disclosure.
As shown in fig. 3, the distribution apparatus 3 of the network slice example includes a receiver 31 and a processor 32.
The receiver 31 is configured to, in response to a user registration, retrieve an identification of a target network slice corresponding to the user, which is pre-stored in the UDM entity. For example, the receiver 31 obtains the identification of the target network slice from the UDM entity through the AMF entity.
Processor 32 is configured to determine whether the target network slice falls within a list of allowed access slices corresponding to the user. In the case where the target network slice falls into the allowed access slice list, the user is allocated a network slice instance only in the target network slice. In the case where the target network slice does not fall into the list of allowed access slices, no network slice instance is allocated to the user before the user initiates the service.
In some embodiments, the dispensing device 3 further comprises a transmitter 33. The transmitter 33 is configured to return the list of allowed access slices to the AMF entity so that the AMF entity completes registration with the terminal of the user. In the event that the target network slice falls into the allowed access slice list, the transmitter 33 may return to the AMF entity an identification of the network slice instance allocated for the user.
In the above embodiment, a default target network slice is preset for the user, and when the user registers, only the network slice instance is allocated in the target network slice, but not all the network slices of the user. Therefore, the waste of system resources can be avoided, and the signaling interaction is reduced, so that the processing efficiency of the system is improved.
Fig. 4 illustrates a block diagram of further embodiments of a distribution device of a network slice example of the present disclosure.
As shown in fig. 4, the distribution apparatus 4 of the network slice example of this embodiment includes: a memory 41 and a processor 42 coupled to the memory 41, the processor 42 being configured to execute one or more steps of the allocation method of network slice instances in any one of the embodiments of the present disclosure based on instructions stored in the memory 41.
The memory 41 may include, for example, a system memory, a fixed nonvolatile storage medium, and the like. The system memory stores, for example, an operating system, an application program, a Boot Loader (Boot Loader), a database, and other programs.
Fig. 5 illustrates a block diagram of still further embodiments of the network access device of the present disclosure.
As shown in fig. 5, the distribution apparatus 5 of the network slice example of this embodiment includes: a memory 510 and a processor 520 coupled to the memory 510, the processor 520 configured to perform the method of assigning network slice instances in any of the foregoing embodiments based on instructions stored in the memory 510.
The memory 510 may include, for example, system memory, fixed non-volatile storage media, and the like. The system memory stores, for example, an operating system, an application program, a Boot Loader (Boot Loader), and other programs.
The allocation means 5 of the network slice instance may further comprise an input output interface 530, a network interface 540, a storage interface 550, etc. These interfaces 530, 540, 550 and the connections between the memory 510 and the processor 520 may be, for example, via a bus 560. The input/output interface 530 provides a connection interface for input/output devices such as a display, a mouse, a keyboard, and a touch screen. The network interface 540 provides a connection interface for various networking devices. The storage interface 540 provides a connection interface for external storage devices such as an SD card and a usb disk.
Fig. 6 illustrates a block diagram of some embodiments of a distribution system of a network slice example of the present disclosure.
As shown in fig. 6, the distribution system 6 of the network slice example includes: NSSF entity 61 and UDM entity 62.
The NSSF entity 61 is configured to perform the method for allocating network slice instances in any of the above embodiments. The UDM entity 62 is used to pre-store the identification of the target network slice corresponding to the user.
In some embodiments, the distribution system 6 of the network slice instance further includes an AMF entity 63, configured to obtain the identifier of the target network slice from the UDM entity 62 and forward the identifier to the NSSF entity 61. The AMF entity 63 is further configured to receive the allowed access slice list and the identifier of the network slice instance corresponding to the user, which are returned by the NSSF entity 61, and complete registration in cooperation with the terminal of the user.
Fig. 7 illustrates a flow diagram of yet further embodiments of the disclosed network slice instance allocation method.
As shown in fig. 7, the method includes: step 710, acquiring the pre-stored identifier of the target network slice; step 720, forwarding the identifier of the target network slice; step 730, judging whether the target network slice falls into an allowed access slice list; step 740, allocating network slice instances for users; and step 750, no network slice instance is assigned to the user.
In step 710, in response to the user registration, the AMF entity obtains an identification of a target network slice corresponding to the user, which is pre-stored in the UDM entity.
In step 720, the AMF entity forwards the identification of the target network slice to the NSSF entity.
In step 730, the NSSF entity determines whether the target network slice falls into the allowed access slice list corresponding to the user. If so, go to step 740; if not, step 750 is performed.
In step 740, the NSSF entity allocates a network slice instance for the user only in the target network slice.
In step 750, the NSSF entity does not allocate a network slice instance to the user before the user initiates the service.
In the above embodiment, a default target network slice is preset for the user, and when the user registers, only the network slice instance is allocated in the target network slice, but not all the network slices of the user. Therefore, the waste of system resources can be avoided, and the signaling interaction is reduced, so that the processing efficiency of the system is improved.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
So far, the distribution method of network slice instances, the distribution apparatus of network slice instances, the distribution system of network slice instances, and the computer-readable storage medium according to the present disclosure have been described in detail. Some details that are well known in the art have not been described in order to avoid obscuring the concepts of the present disclosure. It will be fully apparent to those skilled in the art from the foregoing description how to practice the presently disclosed embodiments.
The method and system of the present disclosure may be implemented in a number of ways. For example, the methods and systems of the present disclosure may be implemented by software, hardware, firmware, or any combination of software, hardware, and firmware. The above-described order for the steps of the method is for illustration only, and the steps of the method of the present disclosure are not limited to the order specifically described above unless specifically stated otherwise. Further, in some embodiments, the present disclosure may also be embodied as programs recorded in a recording medium, the programs including machine-readable instructions for implementing the methods according to the present disclosure. Thus, the present disclosure also covers a recording medium storing a program for executing the method according to the present disclosure.
Although some specific embodiments of the present disclosure have been described in detail by way of example, it should be understood by those skilled in the art that the foregoing examples are for purposes of illustration only and are not intended to limit the scope of the present disclosure. It will be appreciated by those skilled in the art that modifications may be made to the above embodiments without departing from the scope and spirit of the present disclosure. The scope of the present disclosure is defined by the appended claims.

Claims (16)

1. A method for allocating network slice instances, comprising:
responding to user registration, a network slice selection function NSSF entity acquires an identifier of a target network slice which is stored in a Unified Data Management (UDM) entity in advance and corresponds to the user;
judging whether the target network slice falls into an allowed access slice list corresponding to the user;
in the case that the target network slice falls into the list of allowed access slices, allocating a network slice instance for the user only in the target network slice;
and under the condition that the target network slice does not fall into the allowed access slice list, not allocating a network slice example to the user before the user initiates service.
2. The distribution method according to claim 1,
the identity of the target network slice is pre-stored in a user subscription parameter in the UDM entity.
3. The distribution method according to claim 1,
and acquiring the identification of the target network slice from the UDM entity through an access and mobility management function (AMF) entity.
4. The allocation method according to any one of claims 1-3, further comprising:
and returning the list of the allowed access slices to the AMF entity so that the AMF entity completes registration in cooperation with the terminal of the user.
5. The allocation method according to any one of claims 1-3, further comprising:
returning to the AMF entity an identification of the network slice instance allocated for the user in case the target network slice falls into the list of allowed access slices.
6. The dispensing method of any of claims 1-3,
the allowed access slice list is generated by the NSSF entity according to one or more of the access mode of the network slice, the coverage area of the network slice, the position of the user and the slice request list provided by the user.
7. An apparatus for distributing network slice instances, comprising:
the receiver is used for responding to user registration and acquiring the identifier of a target network slice which is stored in a Unified Data Management (UDM) entity in advance and corresponds to the user;
a processor for
Determining whether the target network slice falls into a list of allowed access slices corresponding to the user,
in the case that the target network slice falls within the list of allowed access slices, allocating a network slice instance for the user only in the target network slice,
and under the condition that the target network slice does not fall into the allowed access slice list, not allocating a network slice example to the user before the user initiates service.
8. The dispensing device of claim 7,
and the receiver acquires the identification of the target network slice from the UDM entity through an access and mobility management function (AMF) entity.
9. The dispensing device of claim 7 or 8, further comprising:
and the transmitter is used for returning the access permission slice list to the AMF entity so that the AMF entity completes registration in cooperation with the terminal of the user.
10. The dispensing device of claim 9,
the sender returns to the AMF entity an identification of the network slice instance allocated for the user in case the target network slice falls into the list of allowed access slices.
11. An apparatus for distributing network slice instances, comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform one or more steps of the method of allocating network slice instances of any of claims 1-6 based on instructions stored in the memory device.
12. A system for distributing network slice instances, comprising:
a network slice selection function, NSSF, entity for performing the method of allocation of network slice instances according to any of claims 1-6;
and the unified data management UDM entity is used for pre-storing the identification of the target network slice corresponding to the user.
13. The dispensing system of claim 12, further comprising:
and the access and mobility management function AMF entity is used for acquiring the identifier of the target network slice from the UDM entity and forwarding the identifier to the NSSF entity.
14. The dispensing system of claim 13, wherein
And the AMF entity is used for receiving the allowed access slice list corresponding to the user and the identifier of the network slice instance, which are returned by the NSSF entity, and completing registration by matching with the terminal of the user.
15. A method for allocating network slice instances, comprising:
responding to user registration, and acquiring an identifier of a target network slice which is stored in a Unified Data Management (UDM) entity in advance and corresponds to a user by an access and mobility management function (AMF) entity;
the AMF entity forwards the identification of the target network slice to a network slice selection function NSSF entity;
the NSSF entity judges whether the target network slice falls into an allowed access slice list corresponding to the user;
in the case that the target network slice falls into the list of allowed access slices, the NSSF entity allocating a network slice instance for the user in the target network slice only;
in the case that the target network slice does not fall into the allowed access slice list, the NSSF entity does not allocate a network slice instance to the user before the user initiates traffic.
16. A computer readable storage medium having stored thereon a computer program which, when executed by a processor, carries out one or more steps of the method of allocating network slice instances of any of claims 1-6, 15.
CN201810685048.9A 2018-06-28 2018-06-28 Method, device and system for distributing network slice instances Active CN110661630B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810685048.9A CN110661630B (en) 2018-06-28 2018-06-28 Method, device and system for distributing network slice instances

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810685048.9A CN110661630B (en) 2018-06-28 2018-06-28 Method, device and system for distributing network slice instances

Publications (2)

Publication Number Publication Date
CN110661630A true CN110661630A (en) 2020-01-07
CN110661630B CN110661630B (en) 2023-04-07

Family

ID=69026398

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810685048.9A Active CN110661630B (en) 2018-06-28 2018-06-28 Method, device and system for distributing network slice instances

Country Status (1)

Country Link
CN (1) CN110661630B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113556743A (en) * 2020-04-26 2021-10-26 中国电信股份有限公司 User authorization management method and system, unified data management device and user terminal
WO2022257549A1 (en) * 2021-06-10 2022-12-15 深圳艾灵网络有限公司 Network slicing method and device, and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160353367A1 (en) * 2015-06-01 2016-12-01 Huawei Technologies Co., Ltd. System and Method for Virtualized Functions in Control and Data Planes
CN106375987A (en) * 2015-07-22 2017-02-01 中兴通讯股份有限公司 Method and system for selecting network slice
CN107040481A (en) * 2016-02-04 2017-08-11 中兴通讯股份有限公司 A kind of network section system of selection, strategy-generating method and network node
CN107819595A (en) * 2016-09-12 2018-03-20 清华大学 A kind of network section managing device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160353367A1 (en) * 2015-06-01 2016-12-01 Huawei Technologies Co., Ltd. System and Method for Virtualized Functions in Control and Data Planes
US20160353465A1 (en) * 2015-06-01 2016-12-01 Huawei Technologies Co., Ltd. System and Method for Virtualized Functions in Control and Data Planes
CN106375987A (en) * 2015-07-22 2017-02-01 中兴通讯股份有限公司 Method and system for selecting network slice
CN107040481A (en) * 2016-02-04 2017-08-11 中兴通讯股份有限公司 A kind of network section system of selection, strategy-generating method and network node
CN107819595A (en) * 2016-09-12 2018-03-20 清华大学 A kind of network section managing device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113556743A (en) * 2020-04-26 2021-10-26 中国电信股份有限公司 User authorization management method and system, unified data management device and user terminal
CN113556743B (en) * 2020-04-26 2022-09-16 中国电信股份有限公司 User authorization management method and system, unified data management device and user terminal
WO2022257549A1 (en) * 2021-06-10 2022-12-15 深圳艾灵网络有限公司 Network slicing method and device, and storage medium
US11864103B2 (en) 2021-06-10 2024-01-02 Shenzhen Ai-Link Co., Ltd. Network slicing method and device, and storage medium

Also Published As

Publication number Publication date
CN110661630B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
US20170208019A1 (en) Slice management system and slice management method
CN108399101B (en) Method, device and system for scheduling resources
US10205800B2 (en) Application takeover method and system, mobile terminal, and server
CN107679718B (en) List allocation method, apparatus and computer-readable storage medium
US10645568B2 (en) Carrier configuration processing method, device and system, and computer storage medium
EP3668009A1 (en) Life cycle management method and device for network service
US11132229B2 (en) Method, storage medium storing instructions, and apparatus for implementing hardware resource allocation according to user-requested resource quantity
EP3550775B1 (en) Resource determination method and device
CN110650503B (en) Network access method, device, system and computer readable storage medium
CN107786628B (en) Service number distribution method and device, computer equipment and storage medium
CN111835679B (en) Tenant resource management method and device under multi-tenant scene
CN110661630B (en) Method, device and system for distributing network slice instances
KR102045662B1 (en) System and method for managing logical channels for accessing several virtual profiles within a secure element
CN103944893A (en) Communication method and user equipment
CN112672420A (en) Method, system, device and storage medium for positioning terminal in communication network
CN110677884B (en) Terminal, network access method, device, system and computer readable storage medium
CN110677838A (en) Service distribution method and device
CN110351345B (en) Method and device for processing service request
CN112995982B (en) Method, device, server and storage medium for scheduling cloud SIM card
CN108038072B (en) Access method of serial device, terminal device and computer readable storage medium
KR101295508B1 (en) Method and Apparatus for operating an application in smart device
CN114270309A (en) Resource acquisition method and device and electronic equipment
CN113032111A (en) Application program migration method, device, system and computer readable storage medium
CN108268664B (en) Method and device for updating file resource access address
CN111050312B (en) eSIM card operator file management method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant