CN110661630A - Method, device and system for distributing network slice instances - Google Patents
Method, device and system for distributing network slice instances Download PDFInfo
- Publication number
- CN110661630A CN110661630A CN201810685048.9A CN201810685048A CN110661630A CN 110661630 A CN110661630 A CN 110661630A CN 201810685048 A CN201810685048 A CN 201810685048A CN 110661630 A CN110661630 A CN 110661630A
- Authority
- CN
- China
- Prior art keywords
- network slice
- user
- entity
- target network
- list
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
Abstract
The disclosure relates to a method, a device and a system for distributing network slice instances, and relates to the technical field of mobile communication. The method comprises the following steps: responding to the user registration, the NSSF entity acquires the identifier of a target network slice which is stored in the UDM entity in advance and corresponds to the user; judging whether the target network slice falls into an allowed access slice list corresponding to the user; in the case that the target network slice falls into the allowed access slice list, allocating a network slice instance for the user only in the target network slice; in the case where the target network slice does not fall into the list of allowed access slices, no network slice instance is allocated to the user before the user initiates the service. The technical scheme disclosed by the invention can avoid the waste of system resources and reduce the signaling interaction, thereby improving the processing efficiency of the system.
Description
Technical Field
The present disclosure relates to the field of mobile communications technologies, and in particular, to a method and an apparatus for allocating network slice instances, a system for allocating network slice instances, and a computer-readable storage medium.
Background
The concept of network slicing is introduced in 5G systems. Each network slice can have different mobility, security, time delay, reliability and even charging mode, thereby better providing wide connection service for various industries.
In a 5G network, a user may access multiple network slices simultaneously. When a network is deployed, each slice corresponds to multiple network slice instances, so that when a user actually accesses a network slice, the system needs to select a specific network slice instance for the user.
In the related art, network slice instance allocation is performed in all access network slices of a user at initial registration of a terminal, or a network slice instance is allocated to the user when the user initiates a service.
Disclosure of Invention
The inventors of the present disclosure found that the following problems exist in the above-described related art: the related technology wastes system resources seriously or needs more signaling interaction, so that the processing efficiency is low.
In view of this, the present disclosure provides a technical scheme for selecting a network slice instance, which can avoid system resource waste and improve processing efficiency.
According to some embodiments of the present disclosure, there is provided a method for allocating network slice instances, including: responding to user registration, acquiring an identifier of a target Network Slice corresponding to a user and pre-stored in a UDM (Unified Data Management) entity by an NSSF (Network Slice Selection Function) entity; judging whether the target network slice falls into an allowed access slice list corresponding to the user; in the case that the target network slice falls into the list of allowed access slices, allocating a network slice instance for the user only in the target network slice; and under the condition that the target network slice does not fall into the allowed access slice list, not allocating a network slice example to the user before the user initiates service.
In some embodiments, the identity of the target network slice is pre-stored in a user subscription parameter in the UDM entity.
In some embodiments, the identification of the target network slice is obtained from the UDM entity by an AMF (Access and Mobility Management Function) entity.
In some embodiments, the list of slices allowed to be accessed is returned to the AMF entity, so that the AMF entity completes registration with the terminal of the user.
In some embodiments, in the event that the target network slice falls within the list of allowed access slices, an identification of the network slice instance allocated for the user is returned to the AMF entity.
In some embodiments, the allowed access slice list is generated by the NSSF entity according to one or more of an access mode of a network slice, a coverage of a network slice, a location of the user, and a slice request list provided by the user.
According to other embodiments of the present disclosure, there is provided a network slice instance allocation apparatus, including: a receiver, configured to, in response to user registration, obtain an identifier of a target network slice that is pre-stored in a UDM entity and corresponds to the user; a processor, configured to determine whether the target network slice falls into an allowed access slice list corresponding to the user, allocate a network slice instance to the user only in the target network slice if the target network slice falls into the allowed access slice list, and not allocate a network slice instance to the user before the user initiates a service if the target network slice does not fall into the allowed access slice list.
In some embodiments, the receiver obtains, by an AMF entity, an identification of the target network slice from the UDM entity.
In some embodiments, the apparatus for allocating network slice instances further includes a transmitter, configured to return the list of allowed access slices to an AMF entity, so that the AMF entity completes registration with the terminal of the user.
In some embodiments, the transmitter returns to the AMF entity an identification of the network slice instance allocated for the user in case the target network slice falls into the allowed access slice list.
According to still further embodiments of the present disclosure, there is provided an apparatus for allocating a network slice instance, including: a memory; and a processor coupled to the memory, the processor configured to perform one or more steps of the method for allocating network slice instances in any of the above embodiments based on instructions stored in the memory device.
In accordance with still other embodiments of the present disclosure, there is provided a network slice instance allocation system, including: an NSSF entity for performing the method for allocating network slice instances in any of the above embodiments; and the UDM entity is used for pre-storing the identification of the target network slice corresponding to the user.
In some embodiments, the allocation system further comprises an AMF entity configured to obtain the identifier of the target network slice from the UDM entity and forward the identifier to the NSSF entity.
In some embodiments, the AMF entity is configured to receive the allowed access slice list corresponding to the user and the identifier of the network slice instance, which are returned by the NSSF entity, and complete registration in cooperation with the terminal of the user.
According to still further embodiments of the present disclosure, there is provided a method for allocating network slice instances, including: responding to user registration, the AMF entity acquires an identifier of a target network slice which is stored in a UDM entity in advance and corresponds to the user; the AMF entity forwards the identification of the target network slice to an NSSF entity; the NSSF entity judges whether the target network slice falls into an allowed access slice list corresponding to the user; in the case that the target network slice falls into the list of allowed access slices, the NSSF entity allocating a network slice instance for the user in the target network slice only; in the case that the target network slice does not fall into the allowed access slice list, the NSSF entity does not allocate a network slice instance to the user before the user initiates traffic.
According to still further embodiments of the present disclosure, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements one or more steps of the method for allocating network slice instances in any of the above embodiments.
In the above embodiment, a default target network slice is preset for the user, and when the user registers, only the network slice instance is allocated in the target network slice, but not all the network slices of the user. Therefore, the waste of system resources can be avoided, and the signaling interaction is reduced, so that the processing efficiency of the system is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
The present disclosure may be more clearly understood from the following detailed description, taken with reference to the accompanying drawings, in which:
fig. 1 illustrates a flow diagram of some embodiments of an allocation method of a network slice example of the present disclosure;
fig. 2 illustrates a signaling diagram of some embodiments of an allocation method of a network slice example of the present disclosure;
fig. 3 illustrates a block diagram of some embodiments of an allocation apparatus of a network slice example of the present disclosure;
fig. 4 shows a block diagram of further embodiments of a distribution device of a network slice example of the present disclosure;
fig. 5 shows a block diagram of still further embodiments of the network access device of the present disclosure;
fig. 6 illustrates a block diagram of some embodiments of a distribution system of a network slice example of the present disclosure;
fig. 7 illustrates a flow diagram of yet further embodiments of the disclosed network slice instance allocation method.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.
Meanwhile, it should be understood that the sizes of the respective portions shown in the drawings are not drawn in an actual proportional relationship for the convenience of description.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
As previously described, a user may access up to 8 network slices simultaneously. However, the inventors of the present disclosure have recognized that a user may only use one of the network slices to carry traffic at a time. The related art allocates a network slice instance to a user among 8 network slices to which the user is allowed to access when the user registers. This results in a waste of system resources.
Furthermore, the related art may not allocate network slice instances to users at the time of registration until the users are reallocated at the time of service initiation, which results in more signaling interaction, resulting in system processing inefficiency.
In view of the above technical problems, the technical solutions of the present disclosure may be implemented by the following embodiments.
Fig. 1 illustrates a flow diagram of some embodiments of an allocation method of a network slice example of the present disclosure.
As shown in fig. 1, the method includes: step 110, acquiring the pre-stored identification of the target network slice; step 120, judging whether the target network slice falls into an allowed access slice list; step 130, distributing network slice examples for users; and step 140, no network slice instance is assigned to the user.
In step 110, in response to the user registration, the NSSF entity obtains an identification of a target network slice corresponding to the user, which is stored in advance in the UDM entity. For example, the identifier of the target network slice is pre-stored in the user subscription parameter in the UDM entity, and when the target network slice is accessed by the user, the system allocates the network slice of the network slice instance to the user by default.
In some embodiments, the NSSF entity obtains the identification of the target network slice from the UDM entity through the AMF entity. For example, a user initiates registration, and after the user authentication is passed, the AMF entity obtains a corresponding user subscription parameter from the UDM entity, where the user subscription parameter includes an identifier of a target network slice corresponding to the user. The AMF entity may send a network slice selection request to the NSSF entity, where the network slice selection request carries an identifier of a target network slice.
In step 120, it is determined whether the target network slice falls into the list of allowed access slices corresponding to the user. For example, the NSSF entity generates the list of allowed access slices according to one or more of the access mode of the network slice, the coverage of the network slice, the location of the user, and the list of slice requests provided by the user.
In some embodiments, the NSSF entity checks whether the identification of the target network slice is received and, if so, determines whether the target network slice falls within the list of allowed access slices. In case the target network slice falls into the allowed access slice list, performing step 130; in case the target network slice does not fall into the allowed access slice list, step 140 is performed.
In step 130, the user is assigned a network slice instance only in the target network slice.
In step 140, no network slice instance is assigned to the user before the user initiates the service. For example, a network slice instance may be allocated in a network slice carrying traffic when the traffic is initiated by a user.
In some embodiments, a list of allowed access slices may be returned to the AMF entity. In the event that the target network slice falls into the allowed access slice list, an identification of the network slice instance allocated for the user may also be returned to the AMF entity. And the AMF entity completes registration in cooperation with the terminal of the user.
In order to more clearly illustrate the technical solution of the present disclosure, the following is described in detail with reference to the signaling diagram in fig. 2.
Fig. 2 illustrates a signaling diagram of some embodiments of an allocation method of a network slice example of the present disclosure.
As shown in fig. 2, in event 201, a default selected slice parameter (e.g., an identification of a target network slice) is added to the user subscription parameter of the UDM entity 23, which identifies which network slice instance will be immediately allocated for when the user accesses.
At event 202, the user's terminal 21 initiates a registration request to the AMF entity 22.
In event 203, the network elements such as the AMF entity 22 and the UDM entity 23 cooperate to complete the authentication operation of the user.
In event 204, AMF entity 22 requests the user subscription parameters for the user from UDM entity 23.
In event 205, the UDM entity 23 returns the corresponding user subscription parameters to the AMF entity 22, where the user subscription parameters include default selected slice parameters.
At event 206, the AMF entity 22 initiates a slice selection request to the NSSF entity 24, which includes default selected slice parameters and other slice-related information.
In event 207, the NSSF entity 24 determines the list of allowed access slices for the subscriber and determines whether the network slice identified by the default selected slice parameter is in the list of allowed access slices. The NSSF entity 24 allocates a network slice instance for the network slice identified by the default selected slice parameter if in the list of allowed access slices.
In event 208, the NSSF entity 24 returns a slice selection response to the AMF entity 22, which includes information about the user's list of allowed access slices, the assigned slice instance, etc.
At event 209, the AMF entity 22 completes the subsequent registration procedure with the terminal 21.
In the above embodiment, a default target network slice is preset for the user, and when the user registers, only the network slice instance is allocated in the target network slice, but not all the network slices of the user. Therefore, the waste of system resources can be avoided, and the signaling interaction is reduced, so that the processing efficiency of the system is improved.
Fig. 3 illustrates a block diagram of some embodiments of an allocation apparatus of a network slice example of the present disclosure.
As shown in fig. 3, the distribution apparatus 3 of the network slice example includes a receiver 31 and a processor 32.
The receiver 31 is configured to, in response to a user registration, retrieve an identification of a target network slice corresponding to the user, which is pre-stored in the UDM entity. For example, the receiver 31 obtains the identification of the target network slice from the UDM entity through the AMF entity.
In some embodiments, the dispensing device 3 further comprises a transmitter 33. The transmitter 33 is configured to return the list of allowed access slices to the AMF entity so that the AMF entity completes registration with the terminal of the user. In the event that the target network slice falls into the allowed access slice list, the transmitter 33 may return to the AMF entity an identification of the network slice instance allocated for the user.
In the above embodiment, a default target network slice is preset for the user, and when the user registers, only the network slice instance is allocated in the target network slice, but not all the network slices of the user. Therefore, the waste of system resources can be avoided, and the signaling interaction is reduced, so that the processing efficiency of the system is improved.
Fig. 4 illustrates a block diagram of further embodiments of a distribution device of a network slice example of the present disclosure.
As shown in fig. 4, the distribution apparatus 4 of the network slice example of this embodiment includes: a memory 41 and a processor 42 coupled to the memory 41, the processor 42 being configured to execute one or more steps of the allocation method of network slice instances in any one of the embodiments of the present disclosure based on instructions stored in the memory 41.
The memory 41 may include, for example, a system memory, a fixed nonvolatile storage medium, and the like. The system memory stores, for example, an operating system, an application program, a Boot Loader (Boot Loader), a database, and other programs.
Fig. 5 illustrates a block diagram of still further embodiments of the network access device of the present disclosure.
As shown in fig. 5, the distribution apparatus 5 of the network slice example of this embodiment includes: a memory 510 and a processor 520 coupled to the memory 510, the processor 520 configured to perform the method of assigning network slice instances in any of the foregoing embodiments based on instructions stored in the memory 510.
The memory 510 may include, for example, system memory, fixed non-volatile storage media, and the like. The system memory stores, for example, an operating system, an application program, a Boot Loader (Boot Loader), and other programs.
The allocation means 5 of the network slice instance may further comprise an input output interface 530, a network interface 540, a storage interface 550, etc. These interfaces 530, 540, 550 and the connections between the memory 510 and the processor 520 may be, for example, via a bus 560. The input/output interface 530 provides a connection interface for input/output devices such as a display, a mouse, a keyboard, and a touch screen. The network interface 540 provides a connection interface for various networking devices. The storage interface 540 provides a connection interface for external storage devices such as an SD card and a usb disk.
Fig. 6 illustrates a block diagram of some embodiments of a distribution system of a network slice example of the present disclosure.
As shown in fig. 6, the distribution system 6 of the network slice example includes: NSSF entity 61 and UDM entity 62.
The NSSF entity 61 is configured to perform the method for allocating network slice instances in any of the above embodiments. The UDM entity 62 is used to pre-store the identification of the target network slice corresponding to the user.
In some embodiments, the distribution system 6 of the network slice instance further includes an AMF entity 63, configured to obtain the identifier of the target network slice from the UDM entity 62 and forward the identifier to the NSSF entity 61. The AMF entity 63 is further configured to receive the allowed access slice list and the identifier of the network slice instance corresponding to the user, which are returned by the NSSF entity 61, and complete registration in cooperation with the terminal of the user.
Fig. 7 illustrates a flow diagram of yet further embodiments of the disclosed network slice instance allocation method.
As shown in fig. 7, the method includes: step 710, acquiring the pre-stored identifier of the target network slice; step 720, forwarding the identifier of the target network slice; step 730, judging whether the target network slice falls into an allowed access slice list; step 740, allocating network slice instances for users; and step 750, no network slice instance is assigned to the user.
In step 710, in response to the user registration, the AMF entity obtains an identification of a target network slice corresponding to the user, which is pre-stored in the UDM entity.
In step 720, the AMF entity forwards the identification of the target network slice to the NSSF entity.
In step 730, the NSSF entity determines whether the target network slice falls into the allowed access slice list corresponding to the user. If so, go to step 740; if not, step 750 is performed.
In step 740, the NSSF entity allocates a network slice instance for the user only in the target network slice.
In step 750, the NSSF entity does not allocate a network slice instance to the user before the user initiates the service.
In the above embodiment, a default target network slice is preset for the user, and when the user registers, only the network slice instance is allocated in the target network slice, but not all the network slices of the user. Therefore, the waste of system resources can be avoided, and the signaling interaction is reduced, so that the processing efficiency of the system is improved.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
So far, the distribution method of network slice instances, the distribution apparatus of network slice instances, the distribution system of network slice instances, and the computer-readable storage medium according to the present disclosure have been described in detail. Some details that are well known in the art have not been described in order to avoid obscuring the concepts of the present disclosure. It will be fully apparent to those skilled in the art from the foregoing description how to practice the presently disclosed embodiments.
The method and system of the present disclosure may be implemented in a number of ways. For example, the methods and systems of the present disclosure may be implemented by software, hardware, firmware, or any combination of software, hardware, and firmware. The above-described order for the steps of the method is for illustration only, and the steps of the method of the present disclosure are not limited to the order specifically described above unless specifically stated otherwise. Further, in some embodiments, the present disclosure may also be embodied as programs recorded in a recording medium, the programs including machine-readable instructions for implementing the methods according to the present disclosure. Thus, the present disclosure also covers a recording medium storing a program for executing the method according to the present disclosure.
Although some specific embodiments of the present disclosure have been described in detail by way of example, it should be understood by those skilled in the art that the foregoing examples are for purposes of illustration only and are not intended to limit the scope of the present disclosure. It will be appreciated by those skilled in the art that modifications may be made to the above embodiments without departing from the scope and spirit of the present disclosure. The scope of the present disclosure is defined by the appended claims.
Claims (16)
1. A method for allocating network slice instances, comprising:
responding to user registration, a network slice selection function NSSF entity acquires an identifier of a target network slice which is stored in a Unified Data Management (UDM) entity in advance and corresponds to the user;
judging whether the target network slice falls into an allowed access slice list corresponding to the user;
in the case that the target network slice falls into the list of allowed access slices, allocating a network slice instance for the user only in the target network slice;
and under the condition that the target network slice does not fall into the allowed access slice list, not allocating a network slice example to the user before the user initiates service.
2. The distribution method according to claim 1,
the identity of the target network slice is pre-stored in a user subscription parameter in the UDM entity.
3. The distribution method according to claim 1,
and acquiring the identification of the target network slice from the UDM entity through an access and mobility management function (AMF) entity.
4. The allocation method according to any one of claims 1-3, further comprising:
and returning the list of the allowed access slices to the AMF entity so that the AMF entity completes registration in cooperation with the terminal of the user.
5. The allocation method according to any one of claims 1-3, further comprising:
returning to the AMF entity an identification of the network slice instance allocated for the user in case the target network slice falls into the list of allowed access slices.
6. The dispensing method of any of claims 1-3,
the allowed access slice list is generated by the NSSF entity according to one or more of the access mode of the network slice, the coverage area of the network slice, the position of the user and the slice request list provided by the user.
7. An apparatus for distributing network slice instances, comprising:
the receiver is used for responding to user registration and acquiring the identifier of a target network slice which is stored in a Unified Data Management (UDM) entity in advance and corresponds to the user;
a processor for
Determining whether the target network slice falls into a list of allowed access slices corresponding to the user,
in the case that the target network slice falls within the list of allowed access slices, allocating a network slice instance for the user only in the target network slice,
and under the condition that the target network slice does not fall into the allowed access slice list, not allocating a network slice example to the user before the user initiates service.
8. The dispensing device of claim 7,
and the receiver acquires the identification of the target network slice from the UDM entity through an access and mobility management function (AMF) entity.
9. The dispensing device of claim 7 or 8, further comprising:
and the transmitter is used for returning the access permission slice list to the AMF entity so that the AMF entity completes registration in cooperation with the terminal of the user.
10. The dispensing device of claim 9,
the sender returns to the AMF entity an identification of the network slice instance allocated for the user in case the target network slice falls into the list of allowed access slices.
11. An apparatus for distributing network slice instances, comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform one or more steps of the method of allocating network slice instances of any of claims 1-6 based on instructions stored in the memory device.
12. A system for distributing network slice instances, comprising:
a network slice selection function, NSSF, entity for performing the method of allocation of network slice instances according to any of claims 1-6;
and the unified data management UDM entity is used for pre-storing the identification of the target network slice corresponding to the user.
13. The dispensing system of claim 12, further comprising:
and the access and mobility management function AMF entity is used for acquiring the identifier of the target network slice from the UDM entity and forwarding the identifier to the NSSF entity.
14. The dispensing system of claim 13, wherein
And the AMF entity is used for receiving the allowed access slice list corresponding to the user and the identifier of the network slice instance, which are returned by the NSSF entity, and completing registration by matching with the terminal of the user.
15. A method for allocating network slice instances, comprising:
responding to user registration, and acquiring an identifier of a target network slice which is stored in a Unified Data Management (UDM) entity in advance and corresponds to a user by an access and mobility management function (AMF) entity;
the AMF entity forwards the identification of the target network slice to a network slice selection function NSSF entity;
the NSSF entity judges whether the target network slice falls into an allowed access slice list corresponding to the user;
in the case that the target network slice falls into the list of allowed access slices, the NSSF entity allocating a network slice instance for the user in the target network slice only;
in the case that the target network slice does not fall into the allowed access slice list, the NSSF entity does not allocate a network slice instance to the user before the user initiates traffic.
16. A computer readable storage medium having stored thereon a computer program which, when executed by a processor, carries out one or more steps of the method of allocating network slice instances of any of claims 1-6, 15.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810685048.9A CN110661630B (en) | 2018-06-28 | 2018-06-28 | Method, device and system for distributing network slice instances |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810685048.9A CN110661630B (en) | 2018-06-28 | 2018-06-28 | Method, device and system for distributing network slice instances |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110661630A true CN110661630A (en) | 2020-01-07 |
CN110661630B CN110661630B (en) | 2023-04-07 |
Family
ID=69026398
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810685048.9A Active CN110661630B (en) | 2018-06-28 | 2018-06-28 | Method, device and system for distributing network slice instances |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110661630B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113556743A (en) * | 2020-04-26 | 2021-10-26 | 中国电信股份有限公司 | User authorization management method and system, unified data management device and user terminal |
WO2022257549A1 (en) * | 2021-06-10 | 2022-12-15 | 深圳艾灵网络有限公司 | Network slicing method and device, and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160353367A1 (en) * | 2015-06-01 | 2016-12-01 | Huawei Technologies Co., Ltd. | System and Method for Virtualized Functions in Control and Data Planes |
CN106375987A (en) * | 2015-07-22 | 2017-02-01 | 中兴通讯股份有限公司 | Method and system for selecting network slice |
CN107040481A (en) * | 2016-02-04 | 2017-08-11 | 中兴通讯股份有限公司 | A kind of network section system of selection, strategy-generating method and network node |
CN107819595A (en) * | 2016-09-12 | 2018-03-20 | 清华大学 | A kind of network section managing device |
-
2018
- 2018-06-28 CN CN201810685048.9A patent/CN110661630B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160353367A1 (en) * | 2015-06-01 | 2016-12-01 | Huawei Technologies Co., Ltd. | System and Method for Virtualized Functions in Control and Data Planes |
US20160353465A1 (en) * | 2015-06-01 | 2016-12-01 | Huawei Technologies Co., Ltd. | System and Method for Virtualized Functions in Control and Data Planes |
CN106375987A (en) * | 2015-07-22 | 2017-02-01 | 中兴通讯股份有限公司 | Method and system for selecting network slice |
CN107040481A (en) * | 2016-02-04 | 2017-08-11 | 中兴通讯股份有限公司 | A kind of network section system of selection, strategy-generating method and network node |
CN107819595A (en) * | 2016-09-12 | 2018-03-20 | 清华大学 | A kind of network section managing device |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113556743A (en) * | 2020-04-26 | 2021-10-26 | 中国电信股份有限公司 | User authorization management method and system, unified data management device and user terminal |
CN113556743B (en) * | 2020-04-26 | 2022-09-16 | 中国电信股份有限公司 | User authorization management method and system, unified data management device and user terminal |
WO2022257549A1 (en) * | 2021-06-10 | 2022-12-15 | 深圳艾灵网络有限公司 | Network slicing method and device, and storage medium |
US11864103B2 (en) | 2021-06-10 | 2024-01-02 | Shenzhen Ai-Link Co., Ltd. | Network slicing method and device, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110661630B (en) | 2023-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20170208019A1 (en) | Slice management system and slice management method | |
CN108399101B (en) | Method, device and system for scheduling resources | |
US10205800B2 (en) | Application takeover method and system, mobile terminal, and server | |
CN107679718B (en) | List allocation method, apparatus and computer-readable storage medium | |
US10645568B2 (en) | Carrier configuration processing method, device and system, and computer storage medium | |
EP3668009A1 (en) | Life cycle management method and device for network service | |
US11132229B2 (en) | Method, storage medium storing instructions, and apparatus for implementing hardware resource allocation according to user-requested resource quantity | |
EP3550775B1 (en) | Resource determination method and device | |
CN110650503B (en) | Network access method, device, system and computer readable storage medium | |
CN107786628B (en) | Service number distribution method and device, computer equipment and storage medium | |
CN111835679B (en) | Tenant resource management method and device under multi-tenant scene | |
CN110661630B (en) | Method, device and system for distributing network slice instances | |
KR102045662B1 (en) | System and method for managing logical channels for accessing several virtual profiles within a secure element | |
CN103944893A (en) | Communication method and user equipment | |
CN112672420A (en) | Method, system, device and storage medium for positioning terminal in communication network | |
CN110677884B (en) | Terminal, network access method, device, system and computer readable storage medium | |
CN110677838A (en) | Service distribution method and device | |
CN110351345B (en) | Method and device for processing service request | |
CN112995982B (en) | Method, device, server and storage medium for scheduling cloud SIM card | |
CN108038072B (en) | Access method of serial device, terminal device and computer readable storage medium | |
KR101295508B1 (en) | Method and Apparatus for operating an application in smart device | |
CN114270309A (en) | Resource acquisition method and device and electronic equipment | |
CN113032111A (en) | Application program migration method, device, system and computer readable storage medium | |
CN108268664B (en) | Method and device for updating file resource access address | |
CN111050312B (en) | eSIM card operator file management method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |