CN112565324A - Method, device and system for transmitting non-access stratum message - Google Patents

Method, device and system for transmitting non-access stratum message Download PDF

Info

Publication number
CN112565324A
CN112565324A CN201910917615.3A CN201910917615A CN112565324A CN 112565324 A CN112565324 A CN 112565324A CN 201910917615 A CN201910917615 A CN 201910917615A CN 112565324 A CN112565324 A CN 112565324A
Authority
CN
China
Prior art keywords
amf
proxy server
message
information
nas message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910917615.3A
Other languages
Chinese (zh)
Other versions
CN112565324B (en
Inventor
黄亚达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201910917615.3A priority Critical patent/CN112565324B/en
Priority to PCT/CN2020/116675 priority patent/WO2021057692A1/en
Publication of CN112565324A publication Critical patent/CN112565324A/en
Application granted granted Critical
Publication of CN112565324B publication Critical patent/CN112565324B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/143Termination or inactivation of sessions, e.g. event-controlled end of session
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • H04L67/5682Policies or rules for updating, deleting or replacing the stored data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a method, a device and a system for transmitting non-access stratum (NAS) messages. The method comprises the following steps: the proxy server receives a first NAS message of the terminal from the access network device and determines whether the first NAS message comprises a centralized NAS message or a distributed NAS message. If the first NAS message comprises a first centralized NAS message, the proxy server sends a second centralized NAS message to the AMF; if the first NAS message comprises a first distributed NAS message, the proxy server sends a second distributed NAS message to a distributed non-access stratum service function, NSFd. That is to say, the proxy server in the embodiment of the present application may send the distributed NAS message and the centralized NAS message to different processing network elements for processing, that is, perform offloading processing on the NAS messages, thereby improving processing efficiency.

Description

Method, device and system for transmitting non-access stratum message
Technical Field
The present application relates to the field of communications, and in particular, to a method, an apparatus, and a system for non-access stratum message transmission.
Background
The 5th generation wireless systems (5G) system provides three service capabilities: ultra-large bandwidth, ultra-large number of connections, and ultra-short delay.
In the 5G technology, a User Plane Function (UPF) module is sunk to a network edge, and a service flow is divided into edge (edge) UPFs, so that a transmission path of user plane data is shortened, and transmission delay of the user plane data is reduced. However, since the control plane network element manages the signaling connection and mobility of the terminal device, the control plane network element is usually deployed at a relatively high position (for example, at the level of provincial city or city), so that when the terminal device moves within a large range, the control plane network element of the terminal device does not need to be changed, thereby avoiding signaling overhead or service interruption caused by switching or replacing the control plane network element.
That is to say, in the above solution, the control plane data (e.g. non-access stratum (NAS)) message needs to be processed by the control plane network element, and the processing efficiency of the control plane network element is low due to the deployment location of the control plane network element.
Disclosure of Invention
The application provides a method, a device and a system for transmitting a non-access stratum message, which can improve the processing efficiency.
In a first aspect, a system for non-access stratum NAS message transmission is provided, where the system includes an access network device and a proxy server, where the access network device is configured to receive a first NAS message from a terminal and send the first NAS message to the proxy server; the proxy server is configured to send a second centralized NAS message to the access management function AMF when the first NAS message includes the first centralized NAS message, and/or send a second distributed NAS message to the distributed non-access stratum service function NSFd when the first NAS message includes the first distributed NAS message.
The proxy server receives a first NAS message from the access network device and determines whether the first NAS message comprises a centralized NAS message or a distributed NAS message. If the first NAS message comprises a first centralized NAS message, the proxy server sends a second centralized NAS message to the AMF; if the first NAS message comprises a first distributed NAS message, the proxy server sends a second distributed NAS message to the NSFd. That is to say, compared with the conventional scheme, the embodiment of the present application deploys the proxy server and the NSFd, and the proxy server can send the distributed NAS message and the centralized NAS message to different processing network elements for processing, that is, the NAS message is subjected to offloading processing, thereby improving the processing efficiency.
In some possible implementations, a transport layer network association, TNLA, connection exists between the access network device and the proxy server for the terminal.
Instead of switching to a different AMF, the access network equipment switches between different proxy servers, i.e. a TNLA switch. That is, the connections of N2 and N1 are not changed for the terminal and the access network device, so that the terminal does not need to switch the signaling connection, thereby reducing the signaling overhead or service interruption.
In some possible implementations, the NSFd is set at a position where a transmission delay of the distributed NAS message with the access network device is less than or equal to a preset threshold.
Thus, for the distributed NAS message, compared with the conventional scheme that the message needs to be forwarded through the AMF, transmission of the distributed NAS message according to the embodiment of the present application can reduce transmission delay.
In some possible implementations, the second network element in the system is configured to send, to the AMF, configuration information, where the configuration information is used to configure a transport layer network association, TNLA, for the terminal between the access network device and the AMF, and/or is used to configure a TNLA connection for the terminal between the access network device and the proxy server; and/or the second network element, configured to send a release request to the AMF, where the release request is used to request the proxy server to release the TNLA connection.
The second network element may send configuration information to the AMF to manage connection establishment and release of the TNLA for the terminal.
In some possible implementations, the second network element is disposed within the AMF.
The NSFc may manage the NSFd, e.g., create, update, or delete the NSFd, etc.
In a second aspect, a method for NAS message transmission is provided, where the method includes: the method comprises the steps that a proxy server receives a first non-access stratum (NAS) message of a terminal from access network equipment; and when the proxy server judges that the first NAS message is a centralized NAS message, the proxy server sends a second centralized NAS message to an Access Management Function (AMF), and/or when the first NAS message is a distributed NAS message, the proxy server sends a second distributed NAS message to a distributed non-access stratum service function (NSFd).
The proxy server receives a first NAS message from the access network device and determines whether the first NAS message comprises a centralized NAS message or a distributed NAS message. If the first NAS message comprises a first centralized NAS message, the proxy server sends a second centralized NAS message to the AMF; if the first NAS message comprises a first distributed NAS message, the proxy server sends a second distributed NAS message to the NSFd. That is to say, compared with the conventional scheme, the embodiment of the present application deploys the proxy server and the NSFd, and the proxy server can send the distributed NAS message and the centralized NAS message to different processing network elements for processing, that is, the NAS message is subjected to offloading processing, thereby improving the processing efficiency.
In some possible implementations, the method further includes: the proxy server receiving first configuration information from the AMF, the first configuration information being used for configuring a transport layer network association (TNLA) connection between the proxy server and the AMF for the terminal; the proxy server establishes a TNLA connection between the proxy server and the AMF for the terminal according to the first configuration information.
The AMF may configure the proxy server with a TNLA for establishing a connection between the proxy server and the AMF, thereby enabling communication between the AMF and the proxy server.
In some possible implementations, the method further includes: the proxy server decrypts the first NAS message according to the security parameters.
And the proxy server NSFd analyzes the first NAS message according to the security parameters, and the content included by the first NAS message can be obtained after the analysis.
In some possible implementations, before the proxy server receives the first NAS message from the access network device, the method further includes: the proxy server sends a request message to the AMF, the request message requesting to establish a TNLA connection for the terminal between the proxy server and the access network device.
The proxy server can actively send the request message to the AMF, and the AMF sends the second configuration information after receiving the request message, so that the TNLA is prevented from being still established under the condition that the TNLA is not required to be established between the proxy server and the access network equipment, and signaling and resource expenses are saved.
In some possible implementations, the method further includes: the proxy server receiving a release message from the AMF, the release message being for releasing the TNLA connection for the terminal; and the proxy server releases the TNLA connection aiming at the terminal according to the release message.
The proxy server may release the connection with the access network device, the connection with the AMF, and the connection with the NSFd according to the release request.
In a third aspect, a method for transporting a non-access stratum NAS message is provided, where the method includes: the access network equipment receives a first NAS message from a terminal; the access network device sends the first NAS message to a proxy server, such that the proxy server sends the second centralized NAS message to the AMF when the first NAS message comprises a first centralized NAS message, and/or sends the second distributed NAS message to the NSFd when the first NAS message comprises a first distributed NAS message.
The access network equipment receives the first NAS message from the middle terminal and sends the first NAS message to the proxy server, so that the proxy server judges whether the first NAS message comprises a centralized NAS message or a distributed NAS message. If the first NAS message comprises a first centralized NAS message, the proxy server sends a second centralized NAS message to the AMF; if the first NAS message comprises a first distributed NAS message, the proxy server sends a second distributed NAS message to the NSFd. That is to say, compared with the conventional scheme, the embodiment of the present application deploys the proxy server and the NSFd, and the proxy server can send the distributed NAS message and the centralized NAS message to different processing network elements for processing, that is, the NAS message is subjected to offloading processing, thereby improving the processing efficiency.
In some possible implementations, the method further includes: the access network equipment receives second configuration information from the AMF, wherein the second configuration information is used for configuring TNLA connection between the access network equipment and the proxy server for the terminal; and the access network equipment establishes the TNLA connection aiming at the terminal between the access network equipment and the proxy server according to the second configuration information.
And the access network equipment receives the second configuration information and establishes a TNLA connection aiming at the terminal between the access network equipment and the AMF according to the second configuration information and/or establishes a TNLA connection aiming at the terminal between the access network equipment and each proxy server in at least one proxy server. In this way, the access network device can switch the TNLA connection during the moving process of the terminal, but the connections of N1 and N2 are not changed for the access network device and the terminal, that is, the signaling connection does not need to be switched, thereby avoiding unnecessary signaling overhead.
In some possible implementations, the second configuration information includes TNLA information of the proxy server and/or TNLA information of the AMF; the TNLA information of the proxy server includes at least one of address information of the proxy server, identification information of a distributed core network corresponding to the proxy server, slice information that can be used by the proxy server, information of a geographical area to which the proxy server belongs, list information of a tracking area to which the proxy server belongs, an NSFd type supported by the distributed core network corresponding to the proxy server, and a capacity supported by the distributed core network corresponding to the proxy server; the TNLA information of the AMF includes at least one of address information of the AMF, identification information of a distributed core network corresponding to the AMF, slice information that the AMF can use, information of a geographical area to which the AMF belongs, list information of a tracking area to which the AMF belongs, an NSFd type supported by the distributed core network corresponding to the AMF, and a capacity supported by the distributed core network corresponding to the AMF.
In a fourth aspect, a method for non-access stratum NAS message transmission is provided, where the method includes: the AMF acquires second configuration information, wherein the second configuration information is used for configuring transport layer network association (TNLA) between the access network equipment and the AMF and/or is used for configuring TNLA connection between the access network equipment and the proxy server for the terminal; the AMF sends the second configuration information to the access network device.
And the access network equipment acquires second configuration information and sends the second configuration information to the access network equipment, so that the access network equipment establishes a TNLA connection aiming at the terminal between the access network equipment and the AMF and/or establishes a TNLA connection aiming at the terminal between the access network equipment and each proxy server in at least one proxy server according to the second configuration information. In this way, the access network device can switch the TNLA connection during the moving process of the terminal, but the connections of N1 and N2 are not changed for the access network device and the terminal, that is, the signaling connection does not need to be switched, thereby avoiding unnecessary signaling overhead.
In some possible implementations, the AMF obtaining the second configuration information includes: the AMF receives the second configuration information from an operation maintenance OAM network management system; or the AMF receives the second configuration information from a central non-access layer data processing network element, NSFc.
In some possible implementations, the second configuration information includes TNLA information of the proxy server and/or TNLA information of the AMF; the TNLA information of the proxy server includes at least one of address information of the proxy server, identification information of a distributed core network corresponding to the proxy server, slice information that can be used by the proxy server, information of a geographical area to which the proxy server belongs, list information of a tracking area to which the proxy server belongs, an NSFd type supported by the distributed core network corresponding to the proxy server, and a capacity supported by the distributed core network corresponding to the proxy server; the TNLA information of the AMF includes at least one of address information of the AMF, identification information of a distributed core network corresponding to the AMF, slice information that the AMF can use, information of a geographical area to which the AMF belongs, list information of a tracking area to which the AMF belongs, an NSFd type supported by the distributed core network corresponding to the AMF, and a capacity supported by the distributed core network corresponding to the AMF.
In some possible implementations, the method further includes: the AMF sends first configuration information to a proxy server, wherein the first configuration information is used for configuring a TNLA connection between the proxy server and the AMF and aiming at the terminal.
The AMF may configure the proxy server with a TNLA for establishing a connection between the proxy server and the AMF, thereby enabling communication between the AMF and the proxy server.
In some possible implementations, the method further includes: the AMF receives a service request, wherein the service request comprises the time delay requirement of the service; the AMF determines the target proxy server from a plurality of proxy servers according to the time delay requirement.
The AMF receives the service request and selects an appropriate proxy server from the plurality of proxy servers according to the service type requested by the service request. Specifically, the service request includes a service type, and the low delay may be classified under the condition that the service type of the service request is a low delay service. The AMF can select different proxy servers for service requests with different delay levels, thereby improving the service processing performance of the system.
In some possible implementations, the method further includes: the AMF receives a request message from a proxy server, wherein the request message is used for requesting to establish a transport layer network association (TNLA) between the proxy server and the access network equipment for the terminal; wherein the sending, by the AMF, the second configuration information to the access network device includes: the AMF transmits the second configuration information according to the request message.
The proxy server can actively send the request message to the AMF, and the AMF sends the second configuration information after receiving the request message, so that the TNLA is prevented from being still established under the condition that the TNLA is not required to be established between the proxy server and the access network equipment, and signaling and resource expenses are saved.
In some possible implementations, the method further includes: the AMF sends a release message to the proxy server, the release message being used to instruct the proxy server to release the TNLA connection for the terminal.
The AMF sends a release message to the proxy server, so that the proxy server can release the connection with the access network equipment, the connection with the AMF and the connection with the NSFd according to the release message.
In some possible implementations, before the AMF sends the release message to the proxy server, the method further includes: the AMF receives a release request from the NSFc requesting the proxy server to release the TNLA connection.
The AMF sends a release message to the proxy server only if it receives a release request, i.e. the NSFc can manage and control the TNLA connection with the proxy server.
In a fifth aspect, a system for NAS transport of a non-access stratum message is provided, where the system includes an access network device, an access management function, AMF, and a first network element, and the access network device is configured to receive a NAS message of a terminal, send a second centralized NAS message to the AMF when the NAS message includes a first centralized NAS message, and/or send a second distributed NAS message to the NSFd when the first NAS message includes a first distributed NAS message.
The access network device can divide the NAS messages, that is, the centralized NAS message and the distributed NAS message in the first NAS message are respectively processed and then sent to different network elements for processing, so that the message processing efficiency is improved.
In some possible implementations, the NSFd is set at a position where a transmission delay of the second distributed NAS message with the access network device is smaller than or equal to a preset threshold.
The first network element may be a location disposed at a distance from the access network device, where a transmission delay for transmitting the distributed NAS message is less than or equal to a preset threshold. Therefore, the access network equipment sends the distributed NAS message to the first network element for processing, and transmission delay is saved.
In some possible implementations, there is a non-access stratum tunnel between the access network device and the NSFd.
The connection between the access network equipment and the AMF may be the same as in the conventional scheme, and the non-access stratum tunnel between the access network equipment and the first network element may be specifically established. That is, communication between the access network device and the NSFd is achieved by the presence of a non-access stratum tunnel between the access network device and the NSFd.
In some possible implementations, a second network element in the system, the second network element configured to send configuration information to the AMF or to the access network device, the configuration information being used to configure a non-access stratum tunnel between the access network device and the NSFd; and/or the second network element sends a release message to the NSFd, the release request requesting the NSFd to release a non-access stratum tunnel with the access network device.
The second network element may be configured to manage a connection relationship between the first network element and the access network device, so as to improve flexibility of the connection relationship between the first network element and the access network device.
In some possible implementations, the second network element is disposed within the AMF.
The second network element may be a module or an element inside the AMF, and may be understood as controlling a connection relationship between the first network element and the access network device through the AMF, so as to avoid adding more network elements and save power consumption overhead.
In a sixth aspect, a method for non-access stratum NAS message transmission is provided, where the method includes: the access network device receives a NAS message from the terminal, and sends a second centralized NAS message to the access management function AMF when the NAS message includes the first centralized NAS message, and/or sends a second distributed NAS message to the distributed non-access stratum service function NSFd when the first NAS message includes the first distributed NAS message.
The access network device may receive the NAS message from the terminal, and process the centralized NAS message and the distributed NAS message in the NAS message respectively. If the NAS message includes the first centralized NAS message, the access network device processes the first centralized NAS message to obtain a second centralized NAS message, and sends the second centralized NAS message to the AMF. If the NAS message includes the first distributed NAS message, the access network device processes the first distributed NAS message to obtain a second distributed NAS message, and sends the second NAS message to the first network element. That is, the access network device may perform offloading processing on the NAS message, thereby improving processing efficiency.
In some possible implementations, the method further includes: the access network equipment decrypts the NAS message according to the first security parameter, and determines that the NAS message comprises the first centralized NAS message; and/or the access network equipment decrypts the NAS message according to the second security parameter, and determines that the NAS message comprises the first distributed NAS message.
The first centralized NAS message and the first distributed NAS message in the NAS messages may be respectively subjected to security processing by using different security parameters, so that the access network device may respectively analyze the messages included in the NAS messages by using different security parameters, thereby further improving the security performance of NAS message transmission.
In some possible implementations, the method further includes: the access network equipment receives first configuration information, wherein the first configuration information is used for configuring a non-access stratum channel between the access network equipment and the first network element; and the access network equipment establishes a non-access stratum channel between the access network equipment and the first network element according to the first configuration information.
In some possible implementations, the method further includes: the access network equipment sends a switching request to the AMF, wherein the switching request is used for requesting to switch from the access network equipment currently accessed by the terminal to the access network equipment; the access network equipment receives a switching response from the AMF, wherein the switching response comprises configuration information, and the configuration information is used for configuring a non-access stratum channel between the access network equipment and a third network element; and the access network equipment establishes a non-access layer channel between the access network equipment and the third network element according to the configuration information.
When the access network device is changed, the NSFd changes. That is to say, the second network element determines that the NSFd needs to be replaced according to the handover request for requesting handover to the new access network device sent by the AMF, and the configuration information included in the handover response message sent by the second network element to the AMF is used for configuring the non-access stratum channel between the new access device and the new NSFd.
A seventh aspect provides a method for transporting a NAS message in a non-access stratum, where the method includes: a distributed non-access stratum service function NSFd receives configuration information, wherein the configuration information is used for configuring a non-access stratum channel between access network equipment and the NSFd; the NSFd establishes a non-access stratum channel with the access network equipment according to the configuration information.
The access network device may receive the NAS message from the terminal, and process the centralized NAS message and the distributed NAS message in the NAS message respectively. If the NAS message includes the first distributed NAS message, the access network device processes the first distributed NAS message to obtain a second distributed NAS message, and sends the second NAS message to the first network element. That is, the access network device may perform offloading processing on the NAS message, thereby improving processing efficiency.
In some possible implementations, the method further includes: the first network element receives a second distributed NAS message from the access network device over the non-access stratum tunnel.
In some possible implementations, the method further includes: the first network element receives a handover response message, where the handover response message includes second configuration information, and the second configuration information is used to configure a non-access stratum channel between the access network device and the first network element.
When the access network device is changed, the NSFd changes. That is to say, the second network element determines that the NSFd needs to be replaced according to the handover request for requesting handover to the new access network device sent by the AMF, and the configuration information included in the handover response message sent by the second network element to the AMF is used for configuring the non-access stratum channel between the new access device and the new NSFd.
In an eighth aspect, a system for message transmission is provided, where the system includes an access network device, a first network element, and a third network element, and the access network device is configured to receive a first message from a terminal, send a second non-terminal-related message to the first network element when the first message includes a first non-terminal-related message, and/or send a second terminal-related message to the third network element when the first message includes a first terminal-related message.
The access network equipment can divide the message into non-terminal related message and terminal related message by judging whether the message is related to the terminal or not, and then send the message to different network elements for processing respectively, thereby improving the processing efficiency.
In some possible implementations, a transport layer network association TNLA connection exists between the access network device and the first network element, and/or a TNLA connection exists between the access network device and the third network element.
The access network equipment performs switching between different first network elements or performs switching between different third network elements, which may be understood as performing TNLA switching, and for the terminal and the access network equipment, the power consumption overhead of performing TNLA switching is lower than that of performing signaling connection switching, and the time delay is shorter, thereby reducing signaling overhead or service interruption.
In some possible implementations, the first network element and the third network element are deployed within an access management function AMF.
The first network element and the third network element may be regarded as having partial functions of the AMF in the conventional scheme, or the conventional scheme divides the AMF functions to be performed by the first network element and the third network element, respectively. For example, the first network element may be AMF-N2-common, which is used to handle management of the N2 interface and non-terminal related signaling processing. The third network element may be AMF-N1N2, the AMF-N1N2 being responsible for terminal dependent N2 signaling.
In some possible implementations, the third network element is disposed at a position where a transmission delay of the terminal-related message between the third network element and the access network device is less than or equal to a preset threshold.
The distance between the third network element and the access network device is that the transmission delay of the terminal-related message between the third network element and the access network device is less than or equal to a preset threshold value, so that the transmission delay of the terminal-related message can be reduced.
In a ninth aspect, a method for message transmission is provided, the method comprising: the access network equipment receives a first message from a terminal; when the first message comprises a terminal related message, the access network equipment sends the terminal related message to a first network element; and/or the access network equipment sends the non-terminal related message to a third network element when the first message comprises the non-terminal related message.
The access network equipment can divide the message into non-terminal related message and terminal related message by judging whether the message is related to the terminal or not, and then send the message to different network elements for processing respectively, thereby improving the processing efficiency.
In some possible implementations, the method further includes: the access network device receives configuration information, where the configuration information is used to configure a transport layer network association (TNLA) connection between the access network device and the first network element for the terminal, and/or is used to configure a TNLA connection between the access network device and the third network element for the terminal; the access network equipment establishes TNLA connection aiming at the terminal between the access network equipment and the first network element according to the configuration information; and/or the access network equipment establishes the TNLA connection aiming at the terminal between the access network equipment and the third network element according to the configuration information.
The second configuration information may be used to configure a TNLA connection between the third network element and the access network device for the terminal, so that for the terminal and the access network device, power consumption overhead for performing a TNLA handover is lower than that for performing a signaling connection handover, and a time delay is shorter, thereby reducing signaling overhead or service interruption.
In some possible implementations, the configuration information includes TNLA information of the first network element and/or TNLA information of the third network element; the TNLA information of the first network element includes at least one of address information of the first network element, identification information of a distributed core network corresponding to the first network element, slice information that can be used by the first network element, information of a geographical area to which the first network element belongs, list information of a tracking area to which the first network element belongs, an NSFd type supported by the distributed core network corresponding to the first network element, and a capacity supported by the distributed core network corresponding to the first network element; the TNLA information of the third network element includes at least one of address information of the third network element, identification information of a distributed core network corresponding to the third network element, slice information that can be used by the third network element, information of a geographical area to which the third network element belongs, list information of a tracking area to which the third network element belongs, an NSFd type supported by the distributed core network corresponding to the third network element, and a capacity supported by the distributed core network corresponding to the third network element.
In a tenth aspect, a method for message transmission is provided, the method comprising: a third network element sends configuration information, wherein the configuration information is used for configuring transport layer network association (TNLA) connection aiming at a terminal between access network equipment and the third network element; the third network element receives a terminal-related message from the access network device via the TNLA.
The access network equipment can divide the message into non-terminal related message and terminal related message by judging whether the message is related to the terminal or not, and then send the message to different network elements for processing respectively, thereby improving the processing efficiency.
In some possible implementations, before the third network element receives the terminal-related message from the access network device through the TNLA, the method further includes: the third network element sends a registration request to the network storage function NRF, the registration request requesting access to the network.
In some possible implementations, the method further includes: the third network element sends update information to a fourth network element, the update information including context information of the terminal, the fourth network element being configured to process a terminal-related message.
The third network element and the fourth network element may be different network elements of the same type, for example, the third network element is an old (old) AMF-N1N2, and the fourth network element is a new (new) AMF-N1N 2. The terminal can perform the switching of the AMF-N1N2 due to movement or service difference. In particular, old AMF-N1N2 may select an appropriate AMF-N1N2 (i.e., newAMF-N1N2) in conjunction with the cause of the current AMF-N1N2 change and synchronize the context information of the terminal to newAMF-N1N 2.
In some possible implementations, the method further includes: the third network element receiving a release message from the fourth network element; and the third network element releases the TNLA connection aiming at the terminal between the third network element and the access network equipment according to the release message.
And the fourth network element confirms that the terminal completes the switching from the third network element to the fourth network element, and then sends a release message to the third network element, and the third network element releases the TNLA connection between the third network element and the access network equipment for the terminal according to the release message.
In some possible implementations, the configuration information includes TNLA information of the first network element and/or TNLA information of the third network element; the TNLA information of the first network element includes at least one of address information of the first network element, identification information of a distributed core network corresponding to the first network element, slice information that can be used by the first network element, information of a geographical area to which the first network element belongs, list information of a tracking area to which the first network element belongs, an NSFd type supported by the distributed core network corresponding to the first network element, and a capacity supported by the distributed core network corresponding to the first network element; the TNLA information of the third network element includes at least one of address information of the third network element, identification information of a distributed core network corresponding to the third network element, slice information that can be used by the third network element, information of a geographical area to which the third network element belongs, list information of a tracking area to which the third network element belongs, an NSFd type supported by the distributed core network corresponding to the third network element, and a capacity supported by the distributed core network corresponding to the third network element.
In an eleventh aspect, a method for message transmission is provided, the method including: the first network element sends configuration information, wherein the configuration information is used for configuring transport layer network association (TNLA) connection between the access network equipment and the first network element for the terminal; the first network element receives a non-terminal related message from the access network device via the TNLA.
The first configuration information may be used to configure a TNLA connection between the first network element and the access network device for the terminal, so that for the terminal and the access network device, power consumption overhead for performing a TNLA handover is lower than that for performing a signaling connection handover, and a time delay is shorter, thereby reducing signaling overhead or service interruption.
In some possible implementations, before the first network element receives the non-terminal-related message from the access network device through the TNLA, the method further includes: the first network element sends a registration request to a network storage function (NRF), wherein the registration request is used for requesting to access a network; and the third network element receives a registration response message, wherein the registration response message is used for indicating the second network element corresponding to the third network element.
The first network element may send a registration request to the NRF or the service communication framework to request access to the network, which may be for handling messages sent by the access network device. In addition, after completing the access of the first network element to the network, the NRF or the service communication framework may further send a response message to the first network element, where the response message may include an identifier of the second network element.
In some possible implementations, the configuration information includes TNLA information of the first network element and/or TNLA information of the third network element; the TNLA information of the first network element includes at least one of address information of the first network element, identification information of a distributed core network corresponding to the first network element, slice information that can be used by the first network element, information of a geographical area to which the first network element belongs, list information of a tracking area to which the first network element belongs, an NSFd type supported by the distributed core network corresponding to the first network element, and a capacity supported by the distributed core network corresponding to the first network element; the TNLA information of the third network element includes at least one of address information of the third network element, identification information of a distributed core network corresponding to the third network element, slice information that can be used by the third network element, information of a geographical area to which the third network element belongs, list information of a tracking area to which the third network element belongs, an NSFd type supported by the distributed core network corresponding to the third network element, and a capacity supported by the distributed core network corresponding to the third network element.
In a twelfth aspect, an apparatus is provided, which may be a proxy server, or a chip within a proxy server, such as a chip that may be disposed within a proxy server. The apparatus has the functionality to implement the second aspect described above, as well as various possible implementations. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
In one possible design, the apparatus includes: the apparatus further comprises a transceiver module, which may be at least one of a transceiver, a receiver, a transmitter, for example, and optionally a processing module, which may include a radio frequency circuit or an antenna. The processing module may be a processor. Optionally, the apparatus further comprises a storage module, which may be a memory, for example. When included, the memory module is used to store instructions. The processing module is connected with the storage module, and the processing module can execute the instructions stored in the storage module or the instructions from other sources, so as to enable the apparatus to execute the communication method of the second aspect and various possible implementation manners. In this design, the apparatus may be a primary access network device.
In another possible design, when the device is a chip, the chip includes: and a transceiver module. Optionally, the apparatus further comprises a processing module, and the transceiver module may be, for example, an input/output interface, a pin, a circuit, or the like on the chip. The processing module may be, for example, a processor. The processing module may execute instructions to cause a chip within the terminal device to perform the second aspect described above, as well as any possible implemented communication method. Alternatively, the processing module may execute instructions in a memory module, which may be an on-chip memory module, such as a register, a cache, and the like. The memory module may also be located within the communication device, but outside the chip, such as a read-only memory (ROM) or other types of static memory devices that may store static information and instructions, a Random Access Memory (RAM), and so on.
The processor mentioned in any above may be a general purpose Central Processing Unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of the program of the communication method according to the second aspect and any possible implementation.
In a thirteenth aspect, an apparatus is provided, which may be an access network device or a chip for an access network device, such as a chip that may be disposed in an access network device, and has functions to implement the third aspect and various possible implementations. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
In one possible design, the apparatus includes: and a transceiver module. Optionally, the apparatus further comprises a processing module. The transceiver module may be at least one of a transceiver, a receiver, a transmitter, for example, and may include a radio frequency circuit or an antenna. The processing module may be a processor.
Optionally, the apparatus further comprises a storage module, which may be a memory, for example. When included, the memory module is used to store instructions. The processing module is connected to the storage module, and the processing module can execute the instructions stored in the storage module or the instructions from other sources, so as to cause the apparatus to execute the third aspect or the method of any one of the above aspects.
In another possible design, when the device is a chip, the chip includes: a transceiver module, optionally, the chip further comprises a processing module. The transceiver module may be, for example, an input/output interface, pin or circuit on the chip, etc. The processing module may be, for example, a processor. The processing module may execute instructions to cause a chip within the secondary access network device to perform the third aspect described above, and any possible implemented communication method.
Alternatively, the processing module may execute instructions in a memory module, which may be an on-chip memory module, such as a register, a cache, and the like. The memory module may also be located within the communication device, but outside the chip, such as a read-only memory (ROM) or other types of static memory devices that may store static information and instructions, a Random Access Memory (RAM), and so on.
The processor mentioned in any of the above may be a general-purpose Central Processing Unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of programs of the communication methods in the above aspects.
In a fourteenth aspect, an apparatus is provided, which may be an AMF, or a chip for an AMF, such as a chip that may be disposed within an AMF. The apparatus has the function of implementing the fourth aspect described above, as well as various possible implementations. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
In one possible design, the apparatus includes: a receiving and sending module and a processing module. The transceiver module may be at least one of a transceiver, a receiver, a transmitter, for example, and may include a radio frequency circuit or an antenna. The processing module may be a processor.
Optionally, the apparatus further comprises a storage module, which may be a memory, for example. When included, the memory module is used to store instructions. The processing module is connected to the storage module, and the processing module can execute the instructions stored in the storage module or the instructions from other sources, so as to cause the apparatus to perform the method of the fourth aspect or any one of the above aspects.
In another possible design, when the device is a chip, the chip includes: a receiving and sending module and a processing module. The transceiver module may be, for example, an input/output interface, pin or circuit on the chip, etc. The processing module may be, for example, a processor. The processing module can execute instructions to cause a chip in the terminal device to execute the fourth aspect and the communication method of any possible implementation.
Alternatively, the processing module may execute instructions in a memory module, which may be an on-chip memory module, such as a register, a cache, and the like. The memory module may also be located within the communication device, but outside the chip, such as a read-only memory (ROM) or other types of static memory devices that may store static information and instructions, a Random Access Memory (RAM), and so on.
The processor mentioned in any of the above may be a general-purpose Central Processing Unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of programs of the communication methods in the above aspects.
In a fifteenth aspect, an apparatus is provided, which may be an access network device, or a chip for an access network device, such as a chip that may be disposed within an access network device. The apparatus has the function of implementing the sixth aspect described above, as well as various possible implementations. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
In one possible design, the apparatus includes: the apparatus further comprises a transceiver module, which may be at least one of a transceiver, a receiver, a transmitter, for example, and optionally a processing module, which may include a radio frequency circuit or an antenna. The processing module may be a processor. Optionally, the apparatus further comprises a storage module, which may be a memory, for example. When included, the memory module is used to store instructions. The processing module is connected with the storage module, and the processing module can execute the instructions stored in the storage module or other instructions from other sources, so as to enable the apparatus to execute the communication method of the sixth aspect and various possible implementation manners. In this design, the apparatus may be a primary access network device.
In another possible design, when the device is a chip, the chip includes: the transceiver module, which may be, for example, an input/output interface, a pin, a circuit, or the like on the chip, optionally further comprises a processing module. The processing module may be, for example, a processor. The processing module may execute instructions to cause a chip in the terminal device to execute the sixth aspect and the communication method of any possible implementation. Alternatively, the processing module may execute instructions in a memory module, which may be an on-chip memory module, such as a register, a cache, and the like. The memory module may also be located within the communication device, but outside the chip, such as a read-only memory (ROM) or other types of static memory devices that may store static information and instructions, a Random Access Memory (RAM), and so on.
The processor mentioned in any above may be a general-purpose Central Processing Unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the program execution of the communication method according to the sixth aspect and any possible implementation.
In a sixteenth aspect, there is provided a device which may be an NSFd or a chip for an NSFd, such as a chip which may be provided within an NSFd. The apparatus has the function of implementing the seventh aspect, as well as various possible implementations. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
In one possible design, the apparatus includes: a receiving and sending module and a processing module. The transceiver module may be at least one of a transceiver, a receiver, a transmitter, for example, and may include a radio frequency circuit or an antenna. The processing module may be a processor.
Optionally, the apparatus further comprises a storage module, which may be a memory, for example. When included, the memory module is used to store instructions. The processing module is connected to the storage module, and the processing module can execute the instructions stored in the storage module or the instructions from other sources, so as to cause the apparatus to execute the seventh aspect or the method of any one of the foregoing aspects.
In another possible design, when the device is a chip, the chip includes: the chip comprises a receiving module and a sending module, and optionally, the chip further comprises a processing module. The receiving module and the transmitting module may be, for example, input/output interfaces, pins or circuits, etc. on the chip. The processing module may be, for example, a processor. The processing module may execute instructions to cause a chip in the secondary access network device to execute the seventh aspect and any possible implemented communication method.
Alternatively, the processing module may execute instructions in a memory module, which may be an on-chip memory module, such as a register, a cache, and the like. The memory module may also be located within the communication device, but outside the chip, such as a read-only memory (ROM) or other types of static memory devices that may store static information and instructions, a Random Access Memory (RAM), and so on.
The processor mentioned in any above may be a general-purpose Central Processing Unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of the program of the communication method of the seventh aspect.
In a seventeenth aspect, an apparatus is provided, which may be an access network device, or a chip for an access network device, such as a chip that may be disposed within an access network device. The apparatus has the function of implementing the ninth aspect described above, as well as various possible implementations. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
In one possible design, the apparatus includes: the apparatus further comprises a transceiver module, which may be at least one of a transceiver, a receiver, a transmitter, for example, and optionally a processing module, which may include a radio frequency circuit or an antenna. The processing module may be a processor. Optionally, the apparatus further comprises a storage module, which may be a memory, for example. When included, the memory module is used to store instructions. The processing module is connected with the storage module, and the processing module can execute the instructions stored in the storage module or other instructions from other sources, so as to enable the apparatus to execute the communication method of the ninth aspect and various possible implementation manners. In this design, the apparatus may be a primary access network device.
In another possible design, when the device is a chip, the chip includes: the transceiver module, which may be, for example, an input/output interface, a pin, a circuit, or the like on the chip, optionally further comprises a processing module. The processing module may be, for example, a processor. The processing module can execute the instructions to cause the chip in the terminal device to execute the ninth aspect and the communication method of any possible implementation. Alternatively, the processing module may execute instructions in a memory module, which may be an on-chip memory module, such as a register, a cache, and the like. The memory module may also be located within the communication device, but outside the chip, such as a read-only memory (ROM) or other types of static memory devices that may store static information and instructions, a Random Access Memory (RAM), and so on.
The processor mentioned in any above may be a general-purpose Central Processing Unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the program execution of the communication method according to the ninth aspect and any possible implementation.
In an eighteenth aspect, an apparatus is provided, which may be a third network element, or a chip for a third network element, such as a chip that may be disposed within a third network element. The apparatus has the function of implementing the tenth aspect described above, as well as various possible implementations. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
In one possible design, the apparatus includes: and a transceiver module. Optionally, the apparatus further comprises a processing module. The transceiver module may be at least one of a transceiver, a receiver, a transmitter, for example, and may include a radio frequency circuit or an antenna. The processing module may be a processor.
Optionally, the apparatus further comprises a storage module, which may be a memory, for example. When included, the memory module is used to store instructions. The processing module is connected to the storage module, and the processing module can execute the instructions stored in the storage module or the instructions from other sources, so as to cause the apparatus to execute the method of the tenth aspect or any one of the above aspects.
In another possible design, when the device is a chip, the chip includes: a transceiver module, optionally, the chip further comprises a processing module. The transceiver module may be, for example, an input/output interface, pin or circuit on the chip, etc. The processing module may be, for example, a processor. The processing module may execute instructions to cause the chip in the secondary access network device to execute the tenth aspect and any possible implemented communication method.
Alternatively, the processing module may execute instructions in a memory module, which may be an on-chip memory module, such as a register, a cache, and the like. The memory module may also be located within the communication device, but outside the chip, such as a read-only memory (ROM) or other types of static memory devices that may store static information and instructions, a Random Access Memory (RAM), and so on.
The processor mentioned in any above may be a general-purpose Central Processing Unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of the program of the communication method according to the tenth aspect.
In a nineteenth aspect, an apparatus is provided, which may be the first network element or a chip for the first network element, such as a chip that may be disposed within the first network element. The apparatus has the function of implementing the eleventh aspect, as well as various possible implementations. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
In one possible design, the apparatus includes: and a transceiver module. Optionally, the apparatus further comprises a processing module. The transceiver module may be at least one of a transceiver, a receiver, a transmitter, for example, and may include a radio frequency circuit or an antenna. The processing module may be a processor.
Optionally, the apparatus further comprises a storage module, which may be a memory, for example. When included, the memory module is used to store instructions. The processing module is connected to the storage module, and the processing module can execute the instructions stored in the storage module or other instructions from other sources, so as to cause the apparatus to perform the method of the eleventh aspect or any one of the eleventh aspects.
In another possible design, when the device is a chip, the chip includes: a transceiver module, optionally, the chip further comprises a processing module. The transceiver module may be, for example, an input/output interface, pin or circuit on the chip, etc. The processing module may be, for example, a processor. The processing module may execute instructions to cause a chip within the terminal device to perform the communication method of the eleventh aspect, and any possible implementation.
Alternatively, the processing module may execute instructions in a memory module, which may be an on-chip memory module, such as a register, a cache, and the like. The memory module may also be located within the communication device, but outside the chip, such as a read-only memory (ROM) or other types of static memory devices that may store static information and instructions, a Random Access Memory (RAM), and so on.
The processor mentioned in any above may be a general-purpose Central Processing Unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of the program of the communication method of the eleventh aspect.
A twentieth aspect provides a computer storage medium having stored therein program code for instructing to execute instructions of a method in any one of the second to fourth aspects, the sixth to seventh aspects, the ninth to eleventh aspects, and any possible implementation thereof.
A twenty-first aspect provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any one of the second to fourth aspects, the sixth to seventh aspects, the ninth to eleventh aspects, or any possible implementation thereof.
Based on the technical scheme, the proxy server receives the first NAS message of the terminal from the access network equipment, and judges whether the first NAS message comprises a centralized NAS message or a distributed NAS message. If the first NAS message comprises a first centralized NAS message, the proxy server sends a second centralized NAS message to the AMF; if the first NAS message comprises a first distributed NAS message, the proxy server sends a second distributed NAS message to a distributed non-access stratum service function, NSFd. That is to say, the proxy server in the embodiment of the present application may send the distributed NAS message and the centralized NAS message to different processing network elements for processing, that is, perform offloading processing on the NAS messages, thereby improving processing efficiency.
Drawings
FIG. 1 is a schematic diagram of a possible network architecture according to an embodiment of the present application;
FIG. 2 is a schematic diagram of one possible network architecture of a conventional scheme;
FIG. 3 is a schematic diagram of another possible network architecture for a conventional scheme;
FIG. 4 is a schematic diagram of another possible network architecture for a conventional scheme;
FIG. 5 is a schematic block diagram of a system for non-access stratum messaging in accordance with an embodiment of the present application;
FIG. 6 is a schematic flow chart diagram of a method of NAS message transport according to an embodiment of the present application;
FIG. 7 is a schematic flow diagram of a session connection establishment for a proxy server;
FIG. 8 is a schematic flow chart diagram of a method for NAS message transport in accordance with one embodiment of the present application;
FIG. 9 is a schematic flow chart diagram of a method of NAS message transport in accordance with another embodiment of the present application;
FIG. 10 is a schematic flow chart diagram illustrating a method for session release in accordance with one embodiment of the present application;
FIG. 11 is a schematic flow chart diagram of a method of proxy server replacement according to one embodiment of the present application;
FIG. 12 is a schematic flow chart diagram of a method of proxy server replacement according to another embodiment of the present application;
FIG. 13 is a schematic block diagram of a system for NAS message transport according to an embodiment of the present application;
FIG. 14 is a schematic flow chart diagram of a method of NAS message transport in an embodiment of the present application;
fig. 15 is a schematic diagram of a generation manner of a security parameter in the embodiment of the present application;
fig. 16 is a schematic diagram of a message structure included in a NAS message according to an embodiment of the present application;
FIG. 17 is a schematic diagram of a system for message transmission according to one embodiment of the present application;
FIG. 18 is a schematic flow chart diagram of a method of message transmission of an embodiment of the present application;
fig. 19 is a schematic block diagram of a communication apparatus of an embodiment of the present application;
FIG. 20 is a schematic block diagram of a communication device according to an embodiment of the present application;
fig. 21 is a schematic block diagram of a communication device of another embodiment of the present application;
fig. 22 is a schematic configuration diagram of a communication apparatus according to an embodiment of the present application;
fig. 23 is a schematic block diagram of a communication device of another embodiment of the present application;
fig. 24 is a schematic configuration diagram of a communication apparatus according to an embodiment of the present application;
fig. 25 is a schematic configuration diagram of a communication apparatus according to another embodiment of the present application.
Detailed Description
The technical solution in the present application will be described below with reference to the accompanying drawings.
The technical scheme of the embodiment of the application can be applied to various communication systems, for example: global system for mobile communications (GSM) systems, Code Division Multiple Access (CDMA) systems, Wideband Code Division Multiple Access (WCDMA) systems, General Packet Radio Service (GPRS), Long Term Evolution (LTE) systems, LTE Frequency Division Duplex (FDD) systems, LTE Time Division Duplex (TDD), universal mobile telecommunications system (universal mobile telecommunications system, UMTS), Worldwide Interoperability for Microwave Access (WiMAX) communication systems, future fifth generation (5G) or new radio NR systems, etc.
A terminal in the embodiments of the present application may refer to a user equipment, an access terminal, a subscriber unit, a subscriber station, a mobile station, a remote terminal, a mobile device, a user terminal, a wireless communication device, a user agent, or a user equipment. The terminal may also be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), a handheld device with wireless communication function, a computing device or other processing device connected to a wireless modem, a vehicle-mounted device, a wearable device, a terminal in a future 5G network or a terminal in a future evolved Public Land Mobile Network (PLMN), and the like, which is not limited in this embodiment.
The network device in the embodiment of the present application may be a device for communicating with a terminal, the network device may be a Base Transceiver Station (BTS) in a global system for mobile communications (GSM) system or a Code Division Multiple Access (CDMA) system, may also be a base station (NB, NodeB) in a Wideband Code Division Multiple Access (WCDMA) system, may also be an evolved NodeB (eNB, or eNodeB) in an LTE system, may also be a wireless controller in a Cloud Radio Access Network (CRAN) scenario, or may be a relay station, an access point, a vehicle-mounted device, a wearable device, and a network device in a future 5G network or a network device in a future evolved PLMN network, one or a set of antenna panels (including multiple antenna panels) of a base station in a 5G system, alternatively, the network node may also be a network node forming a gNB or a transmission point, such as a baseband unit (BBU), a Distributed Unit (DU), or the like, and the embodiment of the present application is not limited.
In some deployments, the gNB may include a Centralized Unit (CU) and a DU. The gNB may also include an Active Antenna Unit (AAU). The CU implements part of the function of the gNB and the DU implements part of the function of the gNB. For example, the CU is responsible for processing non-real-time protocols and services, and implementing functions of a Radio Resource Control (RRC) layer and a Packet Data Convergence Protocol (PDCP) layer. The DU is responsible for processing a physical layer protocol and a real-time service, and implements functions of a Radio Link Control (RLC) layer, a Medium Access Control (MAC) layer, and a Physical (PHY) layer. The AAU implements part of the physical layer processing functions, radio frequency processing and active antenna related functions. Since the information of the RRC layer eventually becomes or is converted from the information of the PHY layer, the higher layer signaling, such as the RRC layer signaling, may also be considered to be transmitted by the DU or by the DU + AAU under this architecture. It is to be understood that the network device may be a device comprising one or more of a CU node, a DU node, an AAU node. In addition, the CU may be divided into network devices in an access network (RAN), or may be divided into network devices in a Core Network (CN), which is not limited in this application.
In the embodiment of the application, the terminal or the network device includes a hardware layer, an operating system layer running on the hardware layer, and an application layer running on the operating system layer. The hardware layer includes hardware such as a Central Processing Unit (CPU), a Memory Management Unit (MMU), and a memory (also referred to as a main memory). The operating system may be any one or more computer operating systems that implement business processing through processes (processes), such as a Linux operating system, a Unix operating system, an Android operating system, an iOS operating system, or a windows operating system. The application layer comprises applications such as a browser, an address list, word processing software, instant messaging software and the like. Furthermore, the embodiment of the present application does not particularly limit the specific structure of the execution subject of the method provided by the embodiment of the present application, as long as the execution subject can communicate with the method provided by the embodiment of the present application by running the program recorded with the code of the method provided by the embodiment of the present application, for example, the execution subject of the method provided by the embodiment of the present application may be a terminal or a network device, or a functional module capable of calling the program and executing the program in the terminal or the network device.
In addition, various aspects or features of the present application may be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques. The term "article of manufacture" as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media. For example, computer-readable media can include but are not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips, etc.), optical disks (e.g., Compact Disk (CD), Digital Versatile Disk (DVD), etc.), smart cards, and flash memory devices (e.g., erasable programmable read-only memory (EPROM), card, stick, or key drive, etc.). In addition, various storage media described herein can represent one or more devices and/or other machine-readable media for storing information. The term "machine-readable medium" can include, without being limited to, wireless channels and various other media capable of storing, containing, and/or carrying instruction(s) and/or data.
Fig. 1 is a schematic diagram of a possible network architecture according to an embodiment of the present application. Taking 5G network architecture as an example, the network architecture includes: a terminal 101, a (radio) access network device (R) AN102, a User Plane Function (UPF) network element 103, a Data Network (DN) network element 104, AN authentication server function (AUSF) network element 105, AN access and mobility management function (AMF) network element 106, a Session Management Function (SMF) network element 107, a network open function (NEF) network element 108, a network storage function (NRF) network element 109, a Policy Control Function (PCF) network element 110, a Unified Data Management (UDM) network element 111. Hereinafter, UPF network element 103, DN network element 104, AUSF network element 105, AMF network element 106, SMF network element 107, NEF network element 108, NRF network element 109, Policy Control Function (PCF) network element 110, and UDM network element 111 are referred to as UPF103, DN104, AUSF105, AMF106, SMF107, NEF108, NRF109, PCF120, and UDM111 for short.
The AMF106 belongs to a network element of a core network, and is mainly responsible for a signaling processing part, for example: the AMF106 may also provide a storage resource of a control plane for a session in the terminal device when providing a service for the session, so as to store a session identifier, an SMF network element identifier associated with the session identifier, and the like. The SMF107 is responsible for user plane network element selection, user plane network element redirection, Internet Protocol (IP) address allocation, bearer establishment, modification, and release, and quality of service (QoS) control. The UPF103 is responsible for forwarding and receiving user data in the terminal device. For example, the UPF may receive user data from the data network and transmit the user data to the end device via the access network device, or may receive user data from the end device via the access network device and forward the user data to the data network. The transmission resources and scheduling functions in the UPF103 for providing services to the terminal devices are managed and controlled by the SMF network element. PCF110 is primarily responsible for providing a unified policy framework to control network behavior, providing policy rules to control layer network functions, and acquiring user subscription information related to policy decisions. The UDM111 may be used for unified data management, supporting functions such as 3GPP authentication, user identity operation, permission grant, registration, and mobility management.
In the network architecture, Nausf is a service-based interface presented by AUSF105, Namf is a service-based interface presented by AMF106, Nsmf is a service-based interface presented by SMF107, Nnef is a service-based interface presented by NEF108, nrrf is a service-based interface presented by NRF109, Npcf is a service-based interface presented by PCF110, and numm is a service-based interface presented by UDM 111. The N1 interface is a reference point between the UE101 and the AMF106, the N2 interface is a reference point of the (R) AN102 and the AMF106, and is used for sending non-access stratum (NAS) messages, and the like; the N3 interface is a reference point between (R) AN102 and UPF103 for transmitting user plane data and the like; the N4 interface is a reference point between the SMF107 and the UPF103, and is used for transmitting information such as tunnel identification information, data cache indication information, and downlink data notification message of the N3 connection; the N6 interface is a reference point between the UPF103 and DN104 for transmitting user plane data and the like.
In a conventional scheme, data interaction between a terminal and a network element of a core network needs to be forwarded through an AMF through control plane data (i.e., non-access stratum (NAS) bearer) of an NAS, and in order to avoid frequent signaling connection change caused by terminal movement, the AMF needs to be deployed at a higher position, so that the terminal needs to send all non-access stratum (NAS) messages to the AMF, which results in lower processing efficiency.
For example, when transmitting the 5G positioning function data between the terminal and the Location Management Function (LMF), the terminal and the short message function (SMSF) network element need to transmit the short message function data through the AMF (as shown in fig. 2), and when transmitting the IoT packet data between the terminal and the UPF, the terminal and the SMSF network element need to transmit the IoT packet data through the AMF (as shown in fig. 3).
It should be noted that the LMF network element mainly supports functions such as a positioning process, a positioning method, and positioning calculation related to positioning, and the SMSF network element mainly supports functions such as parsing and forwarding of a short message service.
Fig. 5 shows a schematic block diagram of a system 500 for non-access stratum messaging in an embodiment of the application.
The system 500 includes a terminal 510, an access network device 520, a proxy server 530, an AMF540, and a first network element 550.
It should be understood that the proxy server 530 may be an "AMF proxy server (proxy)" in the embodiment of the present application. The AMF may be a centralized non-access layer data processing network element and the first network element may be a distributed non-access layer data processing network element. For example, the first network element may be a distributed NAS-based service function (NSFd) network element, and for convenience of description, the following embodiments may use the NSFd as an example for illustration, but the application is not limited thereto.
The access network device 520 is configured to receive a first NAS message from the terminal and send the first NAS message to the proxy server;
the proxy server 530 is configured to send a second centralized NAS message to the AMF when the first NAS message includes the first centralized NAS message, and/or send a second distributed NAS message to the first network element when the first NAS message includes the first distributed NAS message.
Specifically, the proxy server receives a first NAS message from the access network device and determines whether the first NAS message includes a centralized NAS message or a distributed NAS message. If the first NAS message comprises a first centralized NAS message, the proxy server sends a second centralized NAS message to the AMF; if the first NAS message comprises a first distributed NAS message, the proxy server sends a second distributed NAS message to the NSFd. That is to say, compared with the conventional scheme, the embodiment of the present application deploys the proxy server and the NSFd, and the proxy server can send the distributed NAS message and the centralized NAS message to different processing network elements for processing, that is, the NAS message is subjected to offloading processing, thereby improving the processing efficiency.
It should be noted that the number of the proxy servers in the embodiment of the present application may be 1, or may be multiple; the number of the distributed non-access layer data processing units in the embodiment of the application can also be 1 or more; the number of the centralized non-access layer data processing units in the embodiment of the present application may also be 1 or more, which is not limited in the present application.
It should be understood that the interface between the access network device 520 and the proxy server 530 may be referred to as an "N2" interface. The interface between the proxy server 530 and the AMF540 may be referred to as the "N2 x" interface, i.e. the proxy server forwards NAS messages on the N2 interface between the access network equipment and the AMF.
It will also be appreciated that in downstream transmission, information sent by the AMF to the proxy server over the N2 × interface needs to be sent over the N2 interface between the proxy server and the access network equipment. That is, the proxy server and the AMF need to have the function of the original N2 interface, and also need to have the function of the N2 × interface. The access network device may only function as an N2 interface.
It can be understood that the centralized NAS message and the distributed NAS message may be two types of messages with different requirements on transmission delay, or may be messages managed by different operators, which is not limited in this application.
Optionally, the NSFd 550 is deployed at a location where a delay of transmission of the distributed NAS message with the access network device is smaller than or equal to a preset time threshold. Thus, for the distributed NAS message, compared with the conventional scheme that the message needs to be forwarded through the AMF, transmission of the distributed NAS message according to the embodiment of the present application can reduce transmission delay.
Optionally, for an NAS message of a certain terminal, the access network device and the AMF may be transmitted through a Transport Network Layer Association (TNLA), and the access network device and the proxy server may also be transmitted through the TNLA, so that the access network device performs switching between different proxy servers, that is, performs switching of the TNLA, instead of switching between different AMFs. That is, the connections of N2 and N1 are not changed for the terminal and the access network device, so that the terminal does not need to switch the signaling connection, thereby reducing the signaling overhead or service interruption.
It should be noted that the AMF may communicate with the access network device through the TNLA, and the access network device may communicate with the proxy server through the TNLA, so that the access network device only performs TNLA handover and does not need to switch the AMF, and also does not need to perform related signaling handover, thereby reducing signaling overhead.
Optionally, the system 500 further includes a Network Storage Function (NSF) 560.
Specifically, the NSF may be directly connected to the NSF 550, and may also be directly connected to the AMF 540.
It should be understood that the NSF may be the LMF shown in fig. 2, or the SMSF shown in fig. 3, or the UPF shown in fig. 4, or may also be any other newly added functional module that uses the NAS as a transport bearer in the future, which is not limited in this application.
Optionally, the system 500 further comprises a central non-access layer data processing network element 570.
Specifically, the central non-access layer data processing network element may be a centralized central NSF (NSFc), and the NSFc may be deployed independently or may be built in the AMF as a component, which is not limited in this application. The NSFc may manage the NSFd, e.g., create, update, or delete the NSFd, etc.
Fig. 6 shows a schematic flow chart of a NAS message transmission method according to an embodiment of the present application. The method may be applied in the communication system shown in fig. 5.
It should be noted that, unless otherwise specified, the same terms in the embodiment shown in fig. 6 as those in the previous embodiment have the same meanings, and are not repeated herein to avoid redundancy.
The proxy server receives a first NAS message of the terminal from the access network device 601. Accordingly, the access network device sends the first NAS message to the proxy server.
Specifically, in the embodiment of the present application, a proxy server is inserted between the access network device and the AMF, so that the access network device sends the first NAS message to the proxy server after receiving the first NAS message from the terminal.
It should be understood that the proxy server may be an "AMF proxy".
Optionally, before step 601, the AMF sends second configuration information to the access network device, where the second configuration information is used to indicate a transport network association (TNLA) connection for the terminal between the access network device and the AMF and/or between the access network device and at least one proxy server. Accordingly, the access network device receives the second configuration information.
Specifically, the access network equipment receives the second configuration information, and establishes a TNLA connection for the terminal with the AMF according to the second configuration information, and/or establishes a TNLA connection for the terminal with each proxy server in at least one proxy server. In this way, the access network device can switch the TNLA connection during the movement of the terminal, but the connections of N1 and N2 are not changed for the access network device and the terminal, that is, no signaling connection needs to be switched, thereby avoiding unnecessary signaling overhead.
It should be noted that, the configuration information for configuring the TNLA connection between the first access network device and the AMF for the terminal and the configuration information for configuring the TNLA connection between the access network device and the proxy server for the terminal may be configured in a unified manner through one configuration information or may be configured separately through different configuration information, which is not limited in this application.
It should be noted that, after the TNLA connection for the terminal between the proxy server and the access network device is established, the TNLA connection may also be activated by a downlink signal sent by the proxy server to the access network device.
Optionally, the second configuration information may include TNLA information of the proxy server and/or TNLA information of the AMF; the TNLA information of the proxy server includes at least one of address information of the proxy server, identification information of a distributed core network corresponding to the proxy server, slice information that can be used by the proxy server, information of a geographical area to which the proxy server belongs, list information of a tracking area to which the proxy server belongs, an NSFd type supported by the distributed core network corresponding to the proxy server, and a capacity supported by the distributed core network corresponding to the proxy server; the TNLA information of the AMF includes at least one of address information of the AMF, identification information of a distributed core network corresponding to the AMF, slice information that the AMF can use, information of a geographical area to which the AMF belongs, list information of a tracking area to which the AMF belongs, an NSFd type supported by the distributed core network corresponding to the AMF, and a capacity supported by the distributed core network corresponding to the AMF.
Specifically, the TNLA information of the proxy server may specifically include address information of the proxy server, identification information of the distributed core network to which the proxy server is connected, network slice information that the proxy server can use, information of an address area to which the proxy server belongs, list information of a tracking area to which the proxy server belongs, an NSFd type supported by the distributed core network to which the proxy server is connected, and a capacity supported by the distributed core network to which the proxy server is connected. The TNLA information of the AMF may specifically include address information of the AMF, identification information of a distributed core network corresponding to the AMF, network slice information that the AMF can use, information of an address area to which the AMF belongs, list information of a tracking area to which the AMF belongs, an NSFd type supported by the distributed core network corresponding to the AMF, and a capacity supported by the distributed core network corresponding to the AMF.
It is understood that the distributed core network corresponding to the AMF may be a distributed core network element (e.g., NSFd1) capable of implementing data offloading with the AMF. For example, the proxy server may determine whether the NAS message is a distributed NAS message or a centralized NAS message, and send the distributed NAS message to the NSFd1 and the centralized NAS message to the AMF.
It is understood that the address information of the proxy server may specifically be an Internet Protocol (IP) address of the proxy server.
Alternatively, the AMF may send the second configuration information to the access network device in a case where the proxy server requests configuration of the TNLA connection for the terminal between the access network device and the proxy server. That is to say, the proxy server may actively send the request message to the AMF, and the AMF sends the second configuration information after receiving the request message, so as to avoid that the TNLA is still established under the condition that the TNLA does not need to be established between the proxy server and the access network device, thereby saving signaling and resource overhead.
Optionally, the request message includes at least one of address information, identification information of the corresponding core network, slice information, geographical area information, tracking area list information, an NSFd type supported by the corresponding core network, and a capacity supported by the corresponding core network.
Specifically, the proxy server may first collect relevant information of the distributed non-access layer data processing network element, for example, at least one of address information, identification information of a corresponding core network, slice information, geographical area information, tracking area list information, an NSFd type supported by the corresponding core network, and a capacity supported by the corresponding core network. The proxy server carries the related information when sending the request message to the AMF, so that the AMF can refer to the information carried in the request message when configuring the configuration information of the TNLA connection between the access network equipment and the proxy server for the terminal to the access network equipment, thereby being beneficial to configuring more proper TNLA between the access network equipment and the proxy server and improving the communication quality.
Optionally, the TNLA information may further include a message type.
Specifically, the TNLA information item may be a Transport Network Layer (TNL) association usage (association usage) by which a corresponding message type is indicated. For example, the message type may be an (NG application protocol, NGAP) message of terminal-associated (UE-associated). That is, the access network device will only adopt the TNLA connection between the access network device and the proxy server for the terminal if receiving the NGAP message related to the terminal. Specifically, the access network device may further determine whether to use a TNLA connection for the terminal between the access network device and the proxy server by setting a weight (TNL association weight factor). For example, when the TNL association weight factor is 0, the access network device cannot automatically transmit the NAS message of the terminal through the TNLA and the proxy server; when the TNL association weight factor is non-zero, the access network device may transmit the NAS message of the terminal through the TNLA and the proxy server. In this way, the access network device can be controlled to transmit the NAS message of the terminal with the proxy server, that is, the access network device can flexibly select the proxy server or the AMF for communication, thereby improving the communication efficiency.
It should be noted that, in addition to using the currently defined TNL association usage, the access network device may also use other information to indicate the corresponding message type. For example, the other information may be newly defined signaling or a source identification (flag) carried in the signaling.
Optionally, after completing the establishment of the TNLA connection, the access network device may be further configured to send a response message to the AMF, where the response message includes a list of TNLAs that have been successfully established and TNLAs that have failed to be established.
Optionally, an operation and maintenance (OAM) network management system sends the second configuration information to the AMF. Accordingly, the AMF receives the second configuration information from the OAM network management system.
Specifically, the second configuration information is actively sent to the AMF by the OAM network management system. One or more AMFs (e.g., sets of AMFs) can typically serve an area under which there may be multiple data centers deploying distributed core networks for deploying different types of nsfds, each data center having one or more proxy servers to serve and responsible for forwarding NAS messages. The OAM network management system may send the second configuration information to one or more AMFs.
Optionally, the NSFc may also send the second configuration information to the AMF.
The proxy server sends 602 a second distributed NAS message to the NSFd. Accordingly, the NSFd receives the distributed NAS message.
Specifically, the proxy server receives the first NAS message and determines whether the first NAS message includes the first distributed NAS message or the first centralized NAS message. And if the NAS message comprises a first distributed NAS message, the proxy server processes the first distributed NAS message to obtain a second distributed NAS message and sends the second NAS message to the first network element.
It should be noted that, in the embodiment of the present application, the communication system may include a plurality of nsfds, and the distance between each NSFd and the access network device may be different. The proxy server may select an appropriate NSFd according to the transmission delay requirement.
Optionally, the proxy server NSFd parses the first NAS message according to the security parameters, and after parsing, the content included in the first NAS message may be known, for example, the content may include only the first centralized NAS message, only the first distributed NAS message, or both the first centralized NAS message and the first distributed NAS message.
603, the proxy server sends a second centralized NAS message to the AMF. Accordingly, the AMF receives the second centralized NAS message.
Specifically, if the NAS message includes the first centralized NAS message, the proxy server processes the first centralized NAS message to obtain a second centralized NAS message, and sends the second centralized NAS message to the AMF.
It should be noted that, in the embodiment of the present application, both step 602 and step 603 may be executed, or only one of them may be executed, which is not limited in the present application. In addition, when both step 602 and step 603 are executed, the two steps may be executed simultaneously or separately, and the order of the two steps is not limited.
Alternatively, the proxy server may replace the NSFd. For example, according to the time delay of the service requirement, other NSFd is selected to be replaced. For example, the NSFd currently connected to the proxy server is the first network element (alternatively referred to as "old NSFd"), and the NSFd to be replaced is selected as the third network element (alternatively referred to as "new NSFd"). After the third network element is selected as the new NSFd, the AMF may send notification information of completion of connection establishment between the third network element and the proxy server to the first network element. The first network element may further send fourth configuration information to a third network element, where the fourth configuration information is used for connection between the third network element and the NSF.
It should be noted that the fourth configuration information may include NSF context information, that is, NSF uplink information in the third configuration information may be carried in the fourth configuration information and sent to the third network element.
Optionally, the processing, by the proxy server, of the first distributed NAS message to obtain the second distributed NAS message may specifically be to decrypt the first distributed NAS message according to a secret key and a NAS message COUNT value (NAS COUNT), and encrypt the decrypted message to obtain the second distributed NAS message. Or, the processing of the first centralized NAS message by the proxy server to obtain the second centralized NAS message may specifically be to decrypt the first centralized NAS message according to a key and a NAS message COUNT value (NAS COUNT), and encrypt the first centralized NAS message to obtain the second centralized NAS message.
It should be understood that the key may be represented by KNASenc.
Optionally, the proxy server may also parse and encrypt the first distributed NAS message or the first centralized NAS message according to the security parameter and the NAS message count value to obtain the second distributed NAS message or the second centralized NAS message.
It should be understood that the security parameters may include a key and an integrity protection parameter, wherein the integrity protection parameter may be represented by KNASint.
Optionally, the AMF receives the service request, and determines a proxy server for processing the service request according to the service request.
Specifically, the communication system may include a plurality of proxy servers, and the AMF receives the service request and selects an appropriate proxy server from the plurality of proxy servers according to a service type requested by the service request. Specifically, the service request includes a service type, and the low delay may be classified under the condition that the service type of the service request is a low delay service. The AMF can select different proxy servers for service requests with different delay levels, thereby improving the service processing performance of the system.
It should be noted that the service request may be a service requesting low latency, or may be a service requesting ordinary latency. The length of the delay may be represented by a quality of service (QoS) indicator of the delay.
It should also be noted that different ones of the plurality of proxy servers may have different latencies required to forward traffic.
It should be appreciated that the service request may also include at least one of positioning accuracy requirements, terminal capabilities, and policies. The policy may be an access priority, an access capacity upper limit, and the like.
It should also be understood that the embodiment of the present application may be applied to a scenario in which the AMF selects a proxy server for the terminal for the first time, and may also be applied to a scenario in which the proxy server updates, which is not limited in the present application.
Optionally, the service request may include at least one of a delay requirement, a current location of the terminal, whether the distributed core network corresponding to each proxy server can deploy the requested service function of the NAS bearer, a load of each proxy server, a resource state of the distributed core network, PLMN ID information, slicing information (e.g., S-NSSAI, NSI-ID), or a local selection policy.
Optionally, the service request may be sent by the external network element to the nsf, and the nsf forwards the service request to the AMF. For example, it may be that a Network Function (NF) sends the service request to the NSFc.
It should be understood that if the NSFc is built into the AMF, the AMF may receive the service request directly.
Optionally, the AMF sends first configuration information to the proxy server, where the first configuration information is used to configure a connection between the proxy server and the AMF.
Specifically, after the AMF selects a proxy server, the AMF may configure parameters for establishing a connection between the proxy server and the AMF for the selected proxy server, thereby implementing communication between the AMF and the proxy server.
It should be understood that the connection between the proxy server and the AMF may be the N2 interface in fig. 5.
Optionally, the first configuration information may further include N1N2 context information of the terminal.
Specifically, the AMF may carry N1N2 context information of the terminal in the first configuration information, that is, N1N2 context information corresponding to the synchronization-specified terminal, so that the proxy server can determine to forward to the corresponding AMF or the distributed non-access layer data processing network element after receiving and parsing the NAS message sent by the access network device.
It should be noted that the N1 context information of the terminal may include security key information of the terminal, and the security key information of the terminal may be used to decode and generate the NAS message protected by the security mechanism. For example, the security key information may be a key KAMF of the AMF, or may be a KNASint for integrity protection and a KNASenc for encryption and decryption corresponding to the NAS message generated by the proxy server, or may also be a NAS message COUNT value (NAS COUNT) of up and down links.
The N2 context information of the terminal may be used to enable the AMF to be sent by NAS messages received by the proxy server from the corresponding access network device. Specifically, the N2 context information of the terminal may include the following information elements: the AMF-side corresponding NGAP ID (AMF UE NGAP ID), the access network-side corresponding NGAP ID (RAN UE NGAP ID), the access network-corresponding N2 interface address information (e.g. N2 IP address of RAN), etc.
Optionally, the AMF may also send update information to the proxy server, the update information indicating that the N1N2 context information of the terminal is updated.
Specifically, the AMF may renegotiate the context information (e.g., encrypt and decrypt a key) upon detecting the non-synchronization with the terminal, and transmit the renegotiated context information to the proxy server. Accordingly, the proxy server may also send response information to the AMF after updating the context information of the terminal to indicate whether the update is successful.
Optionally, after the proxy server completes the connection with the AMF, sending response information of the first configuration information to the AMF, where the response information of the first configuration information is used to notify that the connection establishment between the proxy server and the AMF is completed.
Optionally, the response information of the first configuration information may carry information for establishing a connection between the proxy server and the first network element.
Specifically, the first network element may be an NSFd, and the following embodiments are described by taking the NSFd as an example for convenience of description, but the present application does not limit this. The interface connected between the proxy server and the NSFd may be an NL-2 interface. That is, the response information of the first configuration information carries NL-2 interface information, and the NL-2 interface information may include: at least one of an IP address and/or port number of the proxy server, an ID of the proxy server, a Uniform Resource Locator (URL) of the proxy server, a PLMN ID, a slice ID (S-NSSAI, NS-ID) and/or an NL-2 UE ID corresponding to the UE, and an ID of an NSFd corresponding to the proxy server.
Alternatively, the AMF may send response information of the service request to the NSFc after determining that the connection establishment between the proxy server and the AMF is completed. And the NSFc determines that the connection between the proxy server and the AMF is established and completed according to the response information of the service request.
It should be noted that the response information of the service request may also carry an identifier of the proxy server and/or an identifier of the distributed non-access layer data processing network element. Wherein the identification of the proxy server may be at least one of an IP address, a URL address or ID information of the proxy server. The identity of the distributed non-access layer data processing network element may be ID information of the distributed non-access layer data processing network element.
Optionally, the NSFc or the AMF may send third configuration information to the NSFd, the third configuration information being used to configure the connection between the NSF and the NSF.
In particular, the NSFd may establish a connection with the NSF according to the third configuration information. The third configuration information may comprise at least one of a traffic type, traffic requirements, terminal capabilities, policies, or NL-2 interface configuration information.
It should be understood that the third configuration information may specifically be that the NSF context information is included.
Alternatively, the NSFd may send a response message of the third configuration information to the NSF or the AMF after completing the establishment of the connection with the NSF. The response information of the third configuration information is used to indicate whether the connection between the NSFd and the NSF is successfully established.
Optionally, the AMF may further send first routing configuration information to the proxy server, where the first routing configuration information is used to indicate a mapping relationship, and the mapping relationship includes a correspondence relationship between a service type and the AMF and/or a correspondence relationship between a service type and the NSFd. Accordingly, after the proxy server completes the route configuration, it may also send a response message of the route configuration information to the AMF, for indicating whether the route configuration is successful.
Specifically, the proxy server may determine whether to send the service to the AMF or to the NSFd according to the service type of the received service and the mapping relationship. For example, the service type with short delay may correspond to NSFd, and the service type with long delay may correspond to AMF, so that when the proxy server receives the service, it may determine to send the service to AMF or NSFd according to the service type of the service.
It should be noted that the long delay and the short delay in the embodiment of the present application may be obtained by comparing with a preset delay threshold, and the present application is not limited.
It should be understood that the traffic type may also be a type of location or an SMS type.
Optionally, the NSFd may further send a routing request to the proxy server, where the routing request includes the terminal ID, and the proxy server may establish an association according to the terminal ID and the context of the corresponding N1N2 terminal, so that the access network device may select different proxy servers for forwarding the services of different service types, thereby facilitating to further improve the communication quality.
Accordingly, the proxy server may also feed back to the NSFd whether the association with the context of the N1N2 terminal was successfully established.
In one embodiment, the AMF sends a release request to the proxy server, the release request requesting the proxy server to stop service.
Specifically, the proxy server may release the connection with the access network device, the connection with the AMF, and the connection with the NSFd according to the release request. For example, the N1N2 session with the AMF is deleted, stopping the forwarding of the distributed NAS message.
It should be understood that the release request may be referred to as an "N1N 2 UE context release request (N1N2 UE context release request)".
Alternatively, the AMF may determine whether a proxy server is required to stop providing services. For example, the AMF may determine that the proxy server needs to stop providing service according to the end of service, interruption or other reasons.
Optionally, the NSFd informs the AMF of the need for the proxy server to stop the service through the NSFc in case it is determined that the proxy server does not need to provide the service.
Optionally, the external network element or the NSFc may also directly notify the AMF that the proxy server needs to stop providing the service when the proxy server does not need to provide the service.
Optionally, the proxy server may send a release confirmation message to the AMF after completing the out-of-service to inform the AMF that the proxy server completed the out-of-service.
It should be noted that the external network element, the NSFc or the NSFd may be referred to as a "second network element" for sending the release request.
It should be understood that the release confirmation information may be referred to as "N1N 2 UE context release confirmation information (N1N2 UE context release ack)".
It should be noted that the release confirmation message may also carry a NAS count, and the AMF may perform encryption/decryption and integrity protection processing on a subsequent NAS message according to the NAS count, that is, the NAS count may be an input parameter for performing encryption/decryption and integrity protection processing on the NAS message. The release confirmation message may also carry an end identifier of the last downlink NAS message, so that the AMF may notify the terminal that the service transmission is completed, that is, the flow is ended.
Optionally, after receiving the release confirmation information, the AMF may further send indication information to the access device, where the indication information may be used to instruct the access device to forward the message through the AMF.
In particular, the indication information may include a TNLA switch for instructing the access network device to perform a TNLA switch, i.e., to switch from a TNLA connection with the proxy server for the terminal to a TNLA connection with the AMF for the terminal. And then, the access network equipment forwards the message through the converted TNLA.
It will be appreciated that the access network device may bind to the TNLA after switching to the TNLA connection with the AMF for the terminal, such that subsequent messages for the access network device are all transmitted over the bound TNLA.
Fig. 7 shows a schematic flow diagram of a session connection setup of a proxy server.
It should be noted that, in the embodiments of the present application, the same terms as those in the above embodiments have the same meanings, and are not repeated herein to avoid repetition.
701, the external network element sends a service request to the NSFc, where the service request is used to request to send a low-latency service. Accordingly, the NSFc receives the service request from the external network element.
The NSFc sends the service request to the AMF 702. Accordingly, the AMF receives the service request from the NSFc.
It should be noted that, if the NSFc is a component deployed in the AMF, the external network element is equivalent to directly sending the service request to the AMF.
And 703, the AMF selects the AMF proxy according to the service request.
Specifically, a plurality of AMF proxy may be set in the communication system, and the AMF may select a suitable AMF proxy according to the delay of the service requested by the service request.
The AMF sends 704 first configuration information to the selected AMF proxy, the first configuration information being used to configure a connection between the AMF proxy and the AMF.
705, the AMF proxy sends a response message of the first configuration message to the AMF.
The AMF sends 706 a response message of the service request to the NSFc. I.e., the response information of step 702.
707, the NSFc sends third configuration information to the NSFd, the third configuration information being used to configure a connection between the NSF and the NSF.
Optionally, the request message may carry context information of the NSFd.
708, the NSFd sends response information of the third configuration information to the NSFc.
709, the NSFd sends a routing request to the AMF proxy, the routing request including the terminal ID.
At 710, the AMF proxy sends a response message of the route request to the NSFd.
711, the AMF proxy sends a TNLA handover request to the terminal through the access network device, where the TNLA handover request may carry a new TNLA.
Specifically, after the terminal and the access network device receive the TNLA handover request, the terminal may trigger the access network device to perform TNLA handover, or may actively perform TNLA handover by the access network device.
The access network device binds the new TNLA 712.
713, the access network equipment receives or sends the first NAS message through the new TNLA and the AMF proxy.
Fig. 8 is a schematic flow chart of a NAS message transmission method according to a specific embodiment of the present application.
It should be noted that, in the embodiments of the present application, the same terms as those in the above embodiments have the same meanings, and are not repeated herein to avoid repetition.
801, the NSFd sends downlink NSF information to the AMF proxy.
The AMF proxy encrypts the NSF information to generate NAS information 802.
803, the AMF proxy sends the NAS information to the terminal through the access network device.
It should be noted that the access network device may transparently transmit the NAS information.
And 804, the terminal decrypts the NAS information and carries out corresponding processing. For example, the processing may be to perform measurements, positioning or calculations, etc.
805, the terminal sends the result generated after the processing to the AMF proxy.
806, the AMF proxy decrypts the NAS message to generate the NSF message.
807, the AMF proxy sends the decrypted NSF information to the NSFd.
Fig. 9 is a schematic flow chart diagram illustrating a NAS message transmission method according to another embodiment of the present application.
It should be noted that, in the embodiments of the present application, the same terms as those in the above embodiments have the same meanings, and are not repeated herein to avoid repetition.
901, the AMF sends downlink NSF information to the AMF proxy.
And 902, the AMF proxy encrypts the NSF information to obtain N2 information.
The AMF proxy sends 903 the N2 message to the (R) AN.
904, the AMF proxy decrypts the N2 message to generate the upstream NSF message.
905, the AMF proxy sends the uplink NSF information to the AMF.
Fig. 10 shows a schematic flow chart of a method of session release according to a specific embodiment of the present application.
It should be noted that, in the embodiments of the present application, the same terms as those in the above embodiments have the same meanings, and are not repeated herein to avoid repetition.
1001, the NSFd sends first release information to the NSFc, the first release information being used for requesting to release the TNLA connection of the AMF proxy for the terminal.
Specifically, the NSFd sends the first release information to the AMF through the NSFc when it is determined that the AMF proxy is not required to provide the service.
The NSFc sends 1002 the first release information to the AMF.
1003, the external network element (e.g. other NF) may also detect that the AMF proxy is not needed to provide the service, and send the second release information to the AMF.
The AMF may also determine 1004 if the AMF proxy is required to stop providing services.
That is, steps 1001 and 1002, step 1003, and step 1004 are three schemes in parallel. After steps 1001 and 1002 have been performed, step 1005 may be performed directly. Or step 1005 may be performed directly after step 1003 is performed. Or step 1005 may be performed directly after step 1004 is performed.
The AMF sends a release request to the AMF proxy 1005, the release request requesting the AMF proxy to stop providing the service.
It should be noted that, if step 1005 is executed after steps 1001 and 1002 are executed, the release request may be the same as the first release information. If step 1005 is performed after step 1003 is performed, the release request may be the same as the second release information.
At 1006, the AMF proxy sends a release acknowledgement to the AMF, the release acknowledgement informing the AMF that the proxy server is finished stopping the service.
1007, the AMF sends indication information to the RAN, the indication information is used to instruct the access device to forward the message through the AMF.
Specifically, the AMF may indicate to the RAN that all messages are forwarded by the AMF. In other words, the TNLA connection of the access network device to the AMF proxy needs to be converted to the TNLA connection of the access network device to the AMF.
The access network equipment makes a TNLA connection to the terminal with the AMF 1008.
1009 the access network device and the AMF communicate over a TNLA connection between them for the terminal.
FIG. 11 shows a schematic flow chart of a method of proxy server replacement according to an embodiment of the present application.
1101, the AMF reselects an AMF proxy (hereinafter referred to as "new AMF proxy").
1102, AMF performs N1N2 context establishment of the terminal with the new AMF proxy. For example, the AMF sends the first configuration information to the new AMF proxy, and the new AMF proxy feeds back response information of the first configuration information.
1103, the AMF sends notification information to the NSFc, where the notification information is used to notify that the connection establishment between the new AMF proxy and the AMF is completed.
And 1104, establishing the context of the NSF by the NSFd and the NSFc, namely establishing the connection between the NSFd and the NSF.
That is, the proxy server is replaced and the NSFd does not need to be replaced.
1105, the NSFd sends the proxy handover information to the new AMF proxy.
1106, the new AMF proxy sends TNLA handover information to the access network device.
1107, the access network device performs binding of the new TNLA.
The AMF may send a release message to the old AMF proxy 1108 after determining that the connection of the new AMF proxy was successful. The old AMF proxy may release the relevant TNLA connection.
Fig. 12 is a schematic flow chart diagram illustrating a method for proxy server replacement according to another embodiment of the present application.
1201, the AMF reselects an AMF proxy (hereinafter referred to as "new AMF proxy").
1202, AMF and new AMF proxy carry out the N1N2 context establishment of the terminal. For example, the AMF sends the first configuration information to the new AMF proxy, and the new AMF proxy feeds back response information of the first configuration information.
1203, the AMF sends notification information to the old NSFd, the notification information being used for notifying that the connection establishment between the new AMF proxy and the AMF is completed.
The new NSFd performs NSF context switching with the old NSFd 1204 to enable the new NSF to connect with the NSF.
That is, the proxy server is replaced, as is the NSFd.
1205, the new NSFd sends the proxy server's handover information to the new AMF proxy.
1206, the new AMF proxy sends TNLA handover information to the access network device.
1207, the access network equipment performs binding of the new TNLA.
1208, the AMF may send a release message to the old AMF proxy after determining that the connection of the new AMF proxy is successful. The old AMF proxy may release the relevant TNLA connection.
Fig. 13 illustrates a schematic block diagram of a system 1300 for NAS message transport in an embodiment of the present application. The system 1300 includes a RAN 1320, an AMF1340, and a first network element 1330. Optionally, the system 1300 may further include a UE 1310 and a second network element 1350.
It should be noted that the system 1300 may include a plurality of first network elements, and the first network element 1330 may be a network element selected by the second network element from the plurality of first network elements.
It is to be understood that the first network element may be an NSFd.
It should also be understood that the interface between the terminal 1310 and the AMF1340 may be referred to as an "N1" interface, the interface between the access network device 1320 and the AMF1340 may be referred to as an "N2" interface, the interface between the access network device 1320 and the first network element 1330 may be referred to as an "NL-2" interface, and the interface between the first network element 1330 and the second network element 1350 may be referred to as an "NL-1" interface.
The access network device 1320 may be configured to send the second centralized NAS message to the access management function AMF when the NAS message includes the first centralized NAS message, and/or send the second distributed NAS message to the first network element when the NAS message includes the first distributed NAS message.
Specifically, the access network device may divide the NAS messages, that is, after the centralized NAS message and the distributed NAS message in the first NAS message are respectively processed, the NAS messages are sent to different network elements for processing. For example, the first centralized NAS message in the NAS messages is processed to obtain a second centralized NAS message, and the second centralized NAS message is sent to the AMF. And processing the first distributed NAS message in the NAS messages to obtain a second distributed NAS message, and sending the second distributed NAS message to the first network element for processing.
It should be noted that the NAS message may include only the first centralized NAS message, only the first distributed NAS message, or both the first centralized NAS message and the first distributed NAS message, which is not limited in this application.
Optionally, a non-access stratum tunnel is provided between the access network device and the first network element.
Furthermore, the connection between the access network device and the AMF may be the same as in the conventional scheme, and the non-access stratum tunnel between the access network device and the first network element may be specifically established. That is, the access network device may process different messages in the NAS messages in advance, so as to improve the processing efficiency.
It should be understood that this non-access stratum tunnel may be denoted as "NAS x pipe".
It should also be understood that the direct non-access stratum channel of the two devices may be one channel or multiple channels, which is not limited in this application.
Optionally, a transmission delay of the distributed NAS message between the first network element and the access network device is less than or equal to a preset threshold.
Specifically, the first network element may be a location deployed at a distance from the access network device, where a transmission delay for transmitting the distributed NAS message is less than or equal to a preset threshold. Therefore, the access network equipment sends the distributed NAS message to the first network element for processing, and transmission delay is saved.
It should be noted that the preset threshold may be factory configuration, or may be understood that only the first network element meeting the preset threshold may be selected to offload NAS messages in the access network device.
Optionally, the system 1300 may further include a second network element 1350, the second network element 1350 may be configured to send configuration information to the AMF, the configuration information being used to configure a NAS message between the access network device and the first network element, and/or the second network element 1350 may be configured to send a release request to the AMF, the release request being used to request the access network device to release the connection of the non-access stratum tunnel with the first network element.
Specifically, the second network element may be configured to manage a connection relationship between the first network element and the access network device, so as to improve flexibility of the connection relationship between the first network element and the access network device.
It should be noted that the second network element 1350 may be an "NSFc".
Alternatively, the second network element 1350 may be disposed inside the AMF.
Specifically, the second network element may be a module or an element inside the AMF, and may be understood as controlling a connection relationship between the first network element and the access network device through the AMF, so as to avoid adding more network elements and save power consumption overhead.
It should be noted that the second network element may also be disposed outside the AMF, for example, the second network element may be separately disposed, which is not limited in this application.
Fig. 14 is a schematic flow chart of a NAS message transmission method according to an embodiment of the present application.
It should be noted that the embodiment shown in fig. 14 can be applied to the system shown in fig. 13, and the same terms in the embodiment shown in fig. 14 and the embodiment shown in fig. 13 have the same meanings, and in order to avoid repetition, the following embodiments are not repeated.
1401, the access network device sends a second centralized NAS message to the AMF when the NAS message comprises the first centralized NAS message.
Specifically, the access network device may receive the NAS message from the terminal, and process the centralized NAS message and the distributed NAS message in the NAS message respectively. If the NAS message includes the first centralized NAS message, the access network device processes the first centralized NAS message to obtain a second centralized NAS message, and sends the second centralized NAS message to the AMF.
1402, the access network device sends the second distributed NAS message to the first network element when determining that the NAS message includes the first distributed NAS message.
Specifically, if the NAS message includes a first distributed NAS message, the access network device processes the first distributed NAS message to obtain a second distributed NAS message, and sends the second NAS message to the first network element. That is, the access network device may perform offloading processing on the NAS message, thereby improving processing efficiency.
It should be noted that the NAS message may only include the first centralized NAS message, that is, the access network device may only perform step 1401. Or the NAS message may comprise only the first distributed NAS message, i.e. the access network device may perform only step 1402. Or the NAS message may include both the first centralized NAS message and the first distributed NAS message, i.e. the access network device performs steps 1401 and 1402.
In an embodiment, the access network device may process the NAS message according to the first key to determine that the NAS message includes the first centralized NAS message, and may process the NAS message according to the second key to determine that the NAS message includes the first distributed NAS message.
Specifically, the first centralized NAS message and the first distributed NAS message in the NAS messages may be respectively subjected to security processing by using different security parameters, so that the access network device may respectively analyze the messages included in the NAS messages by using the different security parameters, thereby further improving the security performance of NAS message transmission.
For example, the access network device parses the first centralized NAS message through the first security parameter, and parses the first distributed NAS message through the second security parameter.
It should be noted that the first security parameter may be the same as the key in the conventional scheme, and the second security parameter may be generated by the AMF and sent to the access network device.
For example, the first safety parameter is KNASintAnd KNASencThe second security parameter may be KNAS*intAnd KNAS*enc
Alternatively, the first key in the first security parameter and the second key in the second security parameter may be different keys derived by different algorithms through the same root key. Among them, an algorithm for deriving the key may be as shown in table 1 below.
TABLE 1
Algorithm type (algorithm distingguicher) Identification value (value)
N-NAS-enc-alg 0x01
N-NAS-int-alg 0x02
N-RRC-enc-alg 0x03
N-RRC-int-alg 0x04
N-UP-enc-alg 0x05
N-UP-int-alg 0x06
N-NAS*-enc-alg 0x07
N-NAS*-int-alg 0x08
For example, as shown in FIG. 15, KAMFThe security parameter of the AMF (i.e., K) can be derivedNASintAnd KNASenc) The security parameter (K) of the first network element may also be derivedNAS*intAnd KNAS*enc) Security parameters (i.e., K) for access network devices may also be derivedgNB,NH). Wherein, KgNB,NHsA Radio Resource Control (RRC) security parameter (i.e., K) may be further derivedRRCintAnd KRRCenc) Or security parameters (i.e., K) for Uplink (UP) transmissionsUPintAnd KUPenc)。
It should be noted that the root key is generated by the AMF and sent to other network elements. Or the AMF generates a root key, derives a plurality of keys from the root key, and respectively sends the keys to the access network equipment, the first network element or the second network element.
In another embodiment, the access network device determines whether the NAS message includes the first centralized NAS message and the first distributed NAS message, and may also determine according to a value of an EPD field in the message.
Specifically, the structure of the message included in the NAS message may be as shown in fig. 16, that is, the message may include an extended protocol identifier (EPD) field, a Protocol Data Unit (PDU) session identification field, a program transaction identification field, a message type field, and other fields of necessary information elements. The EPD field may not be encrypted, and the EPD field may occupy 8 bits, and values of the 8 bits may be as shown in table 2 below. If the value of the 8 bits is "00111110" or "01001110", it indicates that the NAS message includes the first distributed NAS message. If other values of the 8 bits can indicate that the NAS message includes the first centralized NAS message.
TABLE 2
Figure BDA0002216565680000301
In yet another embodiment, the access network device determining whether the NAS message includes the first localized NAS message and the first distributed NAS message may also be determined from a newly added information element in the message.
For example, if a new cell, such as a NAS cell or a dedicated NAS (dedicatedannas-message) cell, is included in the message, the message in the NAS message is considered as the first distributed NAS message.
The first distributed NAS message may be a downlink direct transfer (DLinformationtransfer) message or an uplink direct transfer (uliformationtransfer).
Optionally, the access network device receives the configuration information, and establishes a non-access stratum channel between the access network device and the first network element according to the configuration information.
Specifically, the configuration information may be directly sent by the AMF to the access network device, or may be forwarded by the second network element to the access network device through the first network element, which is not limited in this application.
It should be noted that, after the access network device successfully establishes the non-access stratum tunnel with the first network element, the access network device may send a response message to the first network element, and the response message may also be sent to the second network element by the first network element.
Optionally, the first network element may receive a security parameter update message, the security parameter update message including the new security parameters.
Specifically, the terminal may update the security parameter, and send a security parameter update message to the AMF after the update, the AMF forwards the security parameter update message to the second network element, and the second network element may send the security parameter update message to the first network element. Thus, the first network element can process the message according to the new security parameter in the security parameter update message.
It should be noted that, the second network element may send a subscription message to the AMF, where the subscription message is used to instruct the AMF to send the security parameter update message to the second network element after detecting that the terminal performs security parameter update.
It should be further noted that, after the security parameter is updated, the first network element may retransmit the message that has been sent, through the new security parameter.
Optionally, the first network element may further receive a release message, where the release message is used to request the first network element to release the non-access stratum tunnel with the access network device.
Specifically, the first network element may request the second network element to stop releasing the resource after finishing the message processing. Or the external network element or the second network element actively requests the first network element to release the resource. And the first network element receives the release message and releases the non-access layer channel between the first network element and the access network equipment according to the release message, thereby saving the power consumption expense of the first network element.
Optionally, the access network device may also receive the release message, and release the non-access stratum tunnel with the first network element according to the release message.
In one embodiment, the access network device may send an update request to the AMF for requesting an update to the access network device, and receive an update response message sent by the AMF, where the update response message includes configuration information for configuring a non-access stratum tunnel between the access network device and the first network element.
Specifically, during the moving process of the terminal, the handover of the access network device may need to be performed. The terminal can complete the switching of the access network equipment through two phases of a switching preparation phase and a switching execution phase. The switching preparation stage is used for transferring the context information of the terminal to the new access network equipment, and the switching execution stage is used for disconnecting the terminal from the old access network equipment and accessing the new access network equipment. After accessing to a new access network device, the terminal may send an update request to the AMF, where the update request is used to request the AMF to switch to the new access network device, the AMF sends the update request to the second network element, the second network element sends an update response message to the AMF according to the update request, the AMF sends the update response message to the new access network device, and the update response message includes configuration information used to configure a non-access stratum channel between the new access network device and the first network element. Therefore, the new access network equipment establishes a non-access layer channel with the first network element according to the configuration information, and further realizes the shunting processing of the NAS message in the scene of the replacement of the access network equipment, thereby improving the processing efficiency.
It should be noted that the update request may carry an NL-2 related configuration of the new access network device, where the NL-2 related configuration includes an NL-2 transport address, a terminal ID corresponding to the NL-2 interface, and the like.
It should be understood that this embodiment may be understood that the NSFd is not changed when the access network device sends a change.
In another embodiment, the access network device may send a handover request to the AMF for requesting handover to the access network device, and receive a handover response message sent by the AMF, where the update response message includes configuration information for configuring a non-access stratum tunnel between the access network device and a third network element.
Specifically, in the embodiment of the present application, when the access network device is changed, the NSFd is changed. That is to say, the second network element determines that the NSFd needs to be replaced according to the handover request for requesting handover to the new access network device sent by the AMF, and the configuration information included in the handover response message sent by the second network element to the AMF is used for configuring a non-access stratum channel between the new access device and the new first network element (i.e., the third network element).
Fig. 17 illustrates a system 1700 for message transmission according to one embodiment of the present application. The system 1700 includes an access network device 1710, a first network element 1720, and a third network element 1730. Optionally, the system 1700 may further include at least one of a second network element 1740, a UE1750, a SMF1760, and a nsf 1770.
An access network device 1710 for sending a second non-terminal related message to the first network element 1720 if the first message comprises a first non-terminal related message, and/or sending a second terminal related message to a third network element 1730 if the first message comprises a first terminal related message.
Specifically, the access network device can divide the message into a non-terminal related message and a terminal related message by whether the message is related to the terminal, and then send the non-terminal related message and the terminal related message to different network elements for processing respectively, thereby improving the processing efficiency.
The first message may be a non-NAS message or a NAS message.
It is to be appreciated that the second network element 1740 can be an nsf.
It should also be appreciated that the interface between the first network element 1720 and the access network device 1710 may be "N2-non UE" and the interface between the access network device 1710 and the third network element 1730 may be N2-UE.
Optionally, the SMF1760 is configured to be responsible for session management, when the UE1750 initiates registration or PDU session establishment, the first network element may select an SMF (for example, SMF1760) from multiple SMFs, and establish a connection with the SMF1760, and session information in a subsequent terminal-related message is sent to the SMF for processing.
Optionally, the third network element 1730 may further include a fifth network element, and the fifth network element is configured to perform registration management and mobility management. The fifth network element may be an "AMF".
Optionally, the system 1700 includes a fifth network element configured to perform registration management and mobility management.
In particular, the fifth network element may be independent, that is, the function of the original third network element is split, a part of which is executed by the new third network element, and a part of which is executed by the fifth network element. Or the fifth network element is a part of the third network element, that is, the fifth network element is configured to perform a part of the functions of the third network element 1730, which is not limited in this application.
Optionally, a TNLA connection exists between the access network device and the first network element, and a TNLA connection also exists between the access network device and the third network element.
Specifically, the access network device performs switching between different first network elements or performs switching between different third network elements, which may be understood as performing TNLA switching, and for the terminal and the access network device, power consumption overhead for performing TNLA switching is lower than that for performing signaling connection switching, and time delay is shorter, so that signaling overhead or service interruption is reduced.
Optionally, the first network element and the third network element are deployed within an AMF.
Specifically, the first network element 1720 and the third network element 1730 may be regarded as having partial functions of the AMF in the conventional scheme, or the conventional scheme divides the AMF function to be performed by the first network element 1720 and the third network element 1730, respectively. For example, the first network element 1720 may be an AMF-N2-common, which AMF-N2-common is used to handle management of the N2 interface and non-terminal related signaling processing. The third network element 1730 may be AMF-N1N2, which AMF-N1N2 is responsible for terminal related N2 signaling.
Optionally, the first network element is within the AMF and the third network element may be outside the AMF.
Specifically, the distance between the third network element and the access network device is that the transmission delay of the terminal-related message between the third network element and the access network device is less than or equal to a preset threshold, so that the transmission delay of the terminal-related message can be reduced.
Optionally, the system 1700 may include a plurality of third network elements, and the first network element may be configured to select one of the plurality of third network elements as the target third network element (e.g., the third network element 1730 may be the target third network element).
Fig. 18 shows a schematic flow chart of a method of message transmission of an embodiment of the present application.
It should be noted that the same terms in the embodiment shown in fig. 18 and the embodiment shown in fig. 17 have the same meanings, and are not repeated herein to avoid repetition.
1801, the access network device sends a second non-terminal related message to the first network element when the first message includes the first non-terminal related message.
Specifically, the access network device may determine whether the first message includes a first non-terminal message, and if the first message includes the first non-terminal message, parse and repackage the first non-terminal message to obtain a second non-terminal message, and send the second non-terminal related message to the first network element.
The access network device sends 1802 a second terminal-related message to the second network element when the first message comprises the first terminal-related message.
Specifically, when the first message includes a first terminal related message, the access network device parses and repackages the first terminal related message to obtain a second terminal related message, and sends the second terminal related message to the second network element. That is, the access network device can divide the message into a non-terminal related message and a terminal related message by whether the message is related to the terminal, and then send the non-terminal related message and the terminal related message to different network elements for processing respectively, thereby improving the processing efficiency.
It should be noted that the access network device may perform only step 1801, only step 1802, or may perform both step 1801 and step 1802.
Optionally, before step 1801, the access network device receives the first configuration information, and establishes a TNLA connection for the terminal between the access network device and the first network element according to the first configuration information.
Specifically, the first configuration information may be used to configure a TNLA connection for the terminal between the first network element and the access network device, so that for the terminal and the access network device, power consumption overhead for performing a TNLA handover is lower than that for performing a signaling connection handover, and a time delay is shorter, thereby reducing signaling overhead or service interruption.
Optionally, the first configuration information includes TNLA information of the first network element, where the TNLA information of the first network element includes at least one of address information of the first network element, identification information of a distributed core network corresponding to the first network element, slice information that can be used by the first network element, information of a geographic area to which the first network element belongs, list information of a tracking area to which the first network element belongs, an NSFd type supported by the distributed core network corresponding to the first network element, and a capacity supported by the distributed core network corresponding to the first network element; .
Specifically, the second configuration information may be used to configure a TNLA connection for the terminal between the third network element and the access network device, so that for the terminal and the access network device, power consumption overhead for performing a TNLA handover is lower than that for performing a signaling connection handover, and a time delay is shorter, thereby reducing signaling overhead or service interruption.
It should be noted that the first configuration information and the second configuration information may be the same configuration information, or may be carried in the same message, or may be independent, which is not limited in this application.
Optionally, the second configuration information includes TNLA information of the third network element, where the TNLA information of the third network element includes at least one of address information of the third network element, identification information of a distributed core network corresponding to the third network element, slice information that can be used by the third network element, information of a geographic area to which the third network element belongs, list information of a tracking area to which the third network element belongs, an NSFd type supported by the distributed core network corresponding to the third network element, and a capacity supported by the distributed core network corresponding to the third network element.
Optionally, before step 1801, the first network element may also send a registration request to the NSF or a service messaging framework (frame), where the registration request is used to request access to the network.
Specifically, the first network element may send a registration request to the NRF or the service communication framework to request to access the network, and may be configured to process a message sent by the access network device. In addition, after completing the access of the first network element to the network, the NRF or the service communication framework may further send a response message to the first network element, where the response message may include an identifier of the second network element.
It should be noted that the registration request may include a geographical location of the first network element, a Tracking Area (TA), an area ID, a subnet ID, a URL constructed according to a location, and the like.
Optionally, before step 1802, the third network element may also send a registration request to the NRF or the service communication framework, where the registration request is used to request access to the network.
It should be appreciated that the second network element 1740 and NSFd1770 may also access the network by sending a registration request to the NRF or the serving correspondent framework.
Optionally, the third network element may be a target third network element selected by the first network element from a plurality of network elements.
Specifically, the first network element may select the target third network element from the plurality of network elements according to the slice selection information of the terminal, a Public Land Mobile Network (PLMN) ID, an initial NAS request, and the like. Such that the first network element may communicate with the target third network element via the NSF or the serving communication framework.
It should be noted that an interface, for example, an NF discovery interface, may also exist between the first network element and the third network element.
Optionally, the third network element may obtain security information from the AUSF, where the security information may include security parameters and subscription information of the terminal.
Specifically, after the target third network element is selected by the first network element, the third network element may invoke an AUSF service initiation terminal authentication and security process, and obtain security parameters from the AUSF, so as to improve the security performance of the third network element in processing messages.
Optionally, the third network element may further establish a relationship with multiple NFs, and different NFs may have different processing functions, so that the third network element may send the terminal-related information sent by the access network device to the corresponding NFs for processing, thereby improving processing efficiency.
It should be understood that the third network element may maintain routing relationships with the respective NFs, as well as the processing functions of the respective NFs.
Optionally, a fifth network element may also be included in the third network element, that is, part of the functions of the third network element are performed by the fifth network element. For example, the fifth network element may be used for registration management and mobility management, i.e. the fifth network element may be used for processing registration information and mobility information.
Optionally, the third network element may send update information to a fourth network element, where the update information includes context information of the terminal, and the fourth network element is configured to process the terminal-related message.
Specifically, the third network element and the fourth network element may be different network elements of the same type, for example, the third network element is an old (old) AMF-N1N2, and the fourth network element is a new (new) AMF-N1N 2. The terminal can perform the switching of the AMF-N1N2 due to movement or service difference. In particular, old AMF-N1N2 may select an appropriate AMF-N1N2 (i.e., newAMF-N1N2) in conjunction with the cause of the current AMF-N1N2 change and synchronize the context information of the terminal to newAMF-N1N 2.
Optionally, the third network element may further receive a release message from the fourth network element, where the release message is used to instruct the third network element to release the TNLA connection for the terminal with the access network device.
Specifically, the fourth network element confirms that the terminal completes the handover from the third network element to the fourth network element, and sends a release message to the third network element, and the third network element releases the TNLA connection between the third network element and the access network device for the terminal according to the release message.
The various embodiments described herein may be implemented as stand-alone solutions or combined in accordance with inherent logic and are intended to fall within the scope of the present application.
It is to be understood that, in the above embodiments of the method, the method and the operation implemented by the terminal may also be implemented by a component (e.g., a chip or a circuit) available for the terminal, and the method and the operation implemented by the access network device may also be implemented by a component (e.g., a chip or a circuit) available for the access network device. In addition, the above embodiments of the method are described from the perspective of interaction of each network element, and from these descriptions, the method steps executed by a single network element and related descriptions can be directly obtained without any doubt, and are not described herein again for brevity.
The above description mainly introduces the scheme provided by the embodiments of the present application from various interaction perspectives. It is understood that each network element, for example, the transmitting end device or the receiving end device, includes a corresponding hardware structure and/or software module for performing each function in order to implement the above functions. Those of skill in the art would appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the functional modules may be divided according to the above method example for the transmitting end device or the receiving end device, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a form of hardware or a form of a software functional module. It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation. The following description will be given by taking an example in which each functional module is divided by using a corresponding function.
It should be understood that the specific examples in the embodiments of the present application are for the purpose of promoting a better understanding of the embodiments of the present application and are not intended to limit the scope of the embodiments of the present application.
It should be understood that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
The method provided by the embodiment of the present application is described in detail above with reference to fig. 6 to 12. Hereinafter, the apparatus provided in the embodiment of the present application will be described in detail with reference to fig. 13 to 25. It should be understood that the description of the apparatus embodiments corresponds to the description of the method embodiments, and therefore, for brevity, details are not repeated here, since the details that are not described in detail may be referred to the above method embodiments.
Fig. 19 shows a schematic block diagram of a communication apparatus 1900 according to an embodiment of the present application.
It should be understood that the apparatus 1900 may correspond to the proxy server or the chip in the proxy server in the embodiment shown in fig. 6 or fig. 12, and may have any function of the proxy server in the method. The apparatus 1900 includes a transceiver module 1910. Optionally, the apparatus 1900 further comprises a processing module 1920.
The transceiver module 1910 is configured to receive a first non-access stratum NAS message of a terminal from an access network device;
the transceiver module 1910 is further configured to send a second centralized NAS message to an access and mobility management function, AMF, when the first NAS message includes a centralized NAS message, and/or send a second distributed NAS message to a distributed non-access stratum service function, NSFd, when the first NAS message includes a distributed NAS message.
Optionally, the transceiver module 1910 is further configured to receive first configuration information from the AMF, where the first configuration information is used to configure a transport layer network association, TNLA, connection between the proxy server and the AMF for the terminal; the processing module 1920 is configured to establish a TNLA connection between the proxy server and the AMF for the terminal according to the first configuration information.
Optionally, the processing module 1920 is configured to decrypt the first NAS message according to the security parameter.
Optionally, the transceiver module 1910 is further configured to send a request message to the AMF, where the request message is used to request to establish a TNLA connection for the terminal between the proxy server and the access network device.
Optionally, the transceiver module 1910 is further configured to receive a release message from the AMF, where the release message is used to release the TNLA connection; the processing module 1920 is configured to release the TNLA connection for the terminal according to the release message.
Fig. 20 illustrates a communication device 2000 provided in an embodiment of the present application, where the communication device 2000 may be a proxy server in the embodiment shown in fig. 6 or fig. 12. The apparatus may employ a hardware architecture as shown in fig. 20. The apparatus may include a processor 2010 and a transceiver 2020, and optionally, the apparatus may further include a memory 2030, the processor 2010, the transceiver 2020, and the memory 2030 being in communication with each other via an internal connection path. The related functions implemented by the processing module 1920 in fig. 19 may be implemented by the processor 2010, and the related functions implemented by the transceiver module 1910 may be implemented by the processor 2010 controlling the transceiver 2020.
Alternatively, the processor 2010 may be a general processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), a special-purpose processor, or one or more ics for executing the embodiments of the present disclosure. Alternatively, a processor may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions). For example, a baseband processor, or a central processor. The baseband processor may be used to process communication protocols and communication data, and the central processor may be used to control a communication device (e.g., a base station, a terminal device, or a chip, etc.), execute a software program, and process data of the software program.
Optionally, the processor 2010 may include one or more processors, for example, one or more Central Processing Units (CPUs), and in the case that the processor is one CPU, the CPU may be a single-core CPU or a multi-core CPU.
The transceiver 2020 is used for transmitting and receiving data and/or signals, as well as for receiving data and/or signals. The transceiver may include a transmitter for transmitting data and/or signals and a receiver for receiving data and/or signals.
The memory 2030 includes, but is not limited to, a Random Access Memory (RAM), a read-only memory (ROM), an Erasable Programmable Read Only Memory (EPROM), and a compact disc read-only memory (CD-ROM), and the memory 2040 is used for storing related instructions and data.
The memory 2030 is used for storing program codes and data of the terminal device, and may be a separate device or integrated in the processor 2010.
Specifically, the processor 2010 is configured to control the transceiver to perform information transmission with the terminal device. Specifically, reference may be made to the description of the method embodiment, which is not repeated herein.
In one implementation, the apparatus 2000 may further include an output device and an input device. An output device is in communication with processor 2010 and may display information in a variety of ways. For example, the output device may be a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display device, a Cathode Ray Tube (CRT) display device, a projector (projector), or the like. The input device is in communication with the processor and may receive user input in a variety of ways. For example, the input device may be a mouse, a keyboard, a touch screen device, or a sensing device, among others.
It will be appreciated that fig. 20 only shows a simplified design of the communication device. In practical applications, the apparatus may also include other necessary elements respectively, including but not limited to any number of transceivers, processors, controllers, memories, etc., and all terminal devices that can implement the present application are within the protection scope of the present application.
In one possible design, the apparatus 2000 may be a chip, such as a communication chip that may be used in a terminal device, and is configured to implement the relevant functions of the processor 2010 in the terminal device. The chip can be a field programmable gate array, a special integrated chip, a system chip, a central processing unit, a network processor, a digital signal processing circuit and a microcontroller which realize related functions, and can also adopt a programmable controller or other integrated chips. The chip may optionally include one or more memories for storing program code that, when executed, causes the processor to implement corresponding functions.
The embodiment of the application also provides a device which can be terminal equipment or a circuit. The apparatus may be configured to perform the actions performed by the terminal device in the above method embodiments.
Fig. 21 shows a schematic block diagram of a communication apparatus 2100 according to an embodiment of the present application.
It should be understood that the apparatus 1200 may correspond to the access network device or a chip in the access network device in the embodiments shown in fig. 6 or fig. 12, and may have any function of the access network device in the method. The apparatus 2100 includes a transceiver module 2110. Optionally, the apparatus 2100 further comprises a processing module 2120.
The transceiver module 2110 is configured to receive a first NAS message from a terminal;
the transceiver module 2110 is further configured to send the first NAS message to a proxy server, so that the proxy server sends the second centralized NAS message to the AMF when the first NAS message includes the first centralized NAS message, and/or sends the second distributed NAS message to the distributed non-access stratum service function NSFd when the first NAS message includes the first distributed NAS message.
Optionally, the transceiver module 2110 is further configured to receive second configuration information from the AMF, where the second configuration information is used to configure a TNLA connection for the terminal between an access network device and the proxy server; the processing module is configured to establish a TNLA for the terminal between the access network device and the proxy server according to the second configuration information.
Optionally, the transceiver module 2110 is further configured to receive second configuration information from the AMF, where the second configuration information is used to configure a TNLA connection for the terminal between an access network device and the AMF;
the processing module 2120 is configured to establish a TNLA for the terminal between the access network device and the AMF according to the second configuration information.
Optionally, the second configuration information includes TNLA information of the proxy server and/or TNLA information of the AMF; the TNLA information of the proxy server comprises at least one of address information of the proxy server, identification information of a distributed core network corresponding to the proxy server, slice information which can be used by the proxy server, information of a geographical area to which the proxy server belongs, list information of a tracking area to which the proxy server belongs, NSFd types supported by the distributed core network corresponding to the proxy server and capacities supported by the distributed core network corresponding to the proxy server; the TNLA information of the AMF includes at least one of address information of the AMF, identification information of a distributed core network corresponding to the AMF, slice information that the AMF can use, information of a geographical area to which the AMF belongs, list information of a tracking area to which the AMF belongs, an NSFd type supported by the distributed core network corresponding to the AMF, and a capacity supported by the distributed core network corresponding to the AMF.
Fig. 22 illustrates a communication apparatus 2200 provided in an embodiment of the present application, where the apparatus 2200 may be an access network device or a chip in an access network device in the embodiment shown in fig. 6 or fig. 12. The apparatus may employ a hardware architecture as shown in fig. 22. The apparatus may include a processor 2210 and a transceiver 2220, and optionally, a memory 2230, the processor 2210, the transceiver 2220, and the memory 2230 being in communication with each other via an internal connection path. Related functions implemented by the processing module 2120 in fig. 22 may be implemented by the processor 2210, and related functions implemented by the transceiver module 2110 may be implemented by the processor 2210 controlling the transceiver 2220.
Alternatively, processor 2210 may be a general-purpose Central Processing Unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), a special-purpose processor, or one or more ics for performing the embodiments of the present application. Alternatively, a processor may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions). For example, a baseband processor, or a central processor. The baseband processor may be used to process communication protocols and communication data, and the central processor may be used to control a communication device (e.g., a base station, a terminal device, or a chip, etc.), execute a software program, and process data of the software program.
Optionally, the processor 2210 may include one or more processors, for example, one or more Central Processing Units (CPUs), and in the case of one CPU, the CPU may be a single-core CPU or a multi-core CPU.
The transceiver 2220 is used for transmitting and receiving data and/or signals, and receiving data and/or signals. The transceiver may include a transmitter for transmitting data and/or signals and a receiver for receiving data and/or signals.
The memory 2230 includes, but is not limited to, a Random Access Memory (RAM), a read-only memory (ROM), an Erasable Programmable Read Only Memory (EPROM), and a compact disc read-only memory (CD-ROM), and the memory 2230 is used for storing related instructions and data.
The memory 2230 is used for storing program codes and data of the terminal device, and may be a separate device or integrated in the processor 2210.
Specifically, the processor 2210 is configured to control the transceiver to perform information transmission with the terminal device. Specifically, reference may be made to the description of the method embodiment, which is not repeated herein.
In particular implementations, apparatus 2200 may also include, as an embodiment, an output device and an input device. An output device, which is in communication with processor 2210, may display information in a variety of ways. For example, the output device may be a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display device, a Cathode Ray Tube (CRT) display device, a projector (projector), or the like. The input device is in communication with the processor and may receive user input in a variety of ways. For example, the input device may be a mouse, a keyboard, a touch screen device, or a sensing device, among others.
It will be appreciated that fig. 22 only shows a simplified design of the communication device. In practical applications, the apparatus may also include other necessary elements respectively, including but not limited to any number of transceivers, processors, controllers, memories, etc., and all terminal devices that can implement the present application are within the protection scope of the present application.
In one possible design, the apparatus 2200 may be a chip, such as a communication chip that may be used in a terminal device, for implementing the related functions of the processor 2210 in the terminal device. The chip can be a field programmable gate array, a special integrated chip, a system chip, a central processing unit, a network processor, a digital signal processing circuit and a microcontroller which realize related functions, and can also adopt a programmable controller or other integrated chips. The chip may optionally include one or more memories for storing program code that, when executed, causes the processor to implement corresponding functions.
The embodiment of the application also provides a device which can be terminal equipment or a circuit. The apparatus may be configured to perform the actions performed by the terminal device in the above method embodiments.
Fig. 23 shows a schematic block diagram of a communication device 2300 of an embodiment of the application.
It is understood that the device 2300 may correspond to the AMF or a chip within the AMF in the embodiment shown in fig. 6 or 12, and may have any of the functions of the AMF in the embodiment shown in fig. 6 or 12. The apparatus 2300 includes a processing module 2310 and a transceiver module 2320.
The processing module 2310 is configured to obtain second configuration information, where the second configuration information is used to configure a transport layer network association, TNLA, for the terminal between the access network device and the AMF, and/or is used to configure a TNLA for the terminal between the access network device and the proxy server;
the transceiver 2320 is configured to send the second configuration information to the access network device.
Optionally, the transceiver module 2320 is further configured to receive the second configuration information from the operation and maintenance OAM network management system; or the transceiver 2320, is further configured to receive the second configuration information from the second network element.
Optionally, the second configuration information includes TNLA information of the proxy server and/or TNLA information of the AMF; the TNLA information of the proxy server comprises at least one of address information of the proxy server, identification information of a distributed core network corresponding to the proxy server, slice information which can be used by the proxy server, information of a geographical area to which the proxy server belongs, list information of a tracking area to which the proxy server belongs, NSFd types supported by the distributed core network corresponding to the proxy server and capacities supported by the distributed core network corresponding to the proxy server; the TNLA information of the AMF includes at least one of address information of the AMF, identification information of a distributed core network corresponding to the AMF, slice information that the AMF can use, information of a geographical area to which the AMF belongs, list information of a tracking area to which the AMF belongs, an NSFd type supported by the distributed core network corresponding to the AMF, and a capacity supported by the distributed core network corresponding to the AMF.
Optionally, the transceiving module 2320 is further configured to send first configuration information to the proxy server, where the first configuration information is used to configure a TNLA connection for the terminal between the proxy server and the AMF.
Optionally, the transceiver module 2320 is further configured to receive a service request, where the service request includes a delay requirement of a service;
the processing module 2310 is further configured to determine the proxy server according to the latency requirement.
Optionally, the transceiving module 2320 is further configured to receive a request message from the proxy server, where the request message is used to request to establish a TNLA connection for the terminal between the proxy server and the access network device; the transceiver module 2320 is specifically configured to: and sending the second configuration information according to the request message.
Optionally, the transceiving module 2320 is further configured to send a release message to the proxy server, where the release message is used to instruct the proxy server to release the TNLA connection for the terminal.
Optionally, the transceiving module 2320 is further configured to receive a release request from the second network element, where the release request is used to request to release the TNLA connection for the terminal.
Fig. 24 shows a communication apparatus 2400 provided in an embodiment of the present application, where the apparatus 2400 may be the terminal device described in fig. 5 or fig. 8. The apparatus may employ a hardware architecture as shown in fig. 24. The apparatus may include a processor 2410 and a transceiver 2420, and optionally a memory 2430, the processor 2410, transceiver 2420 and memory 2430 being in communication with each other via an internal connection path. The related functions performed by the processing module 2310 in fig. 23 may be implemented by the processor 2410, and the related functions performed by the transceiving module 2320 may be implemented by the processor 2410 controlling the transceiver 2420.
Alternatively, the processor 2410 can be a general processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), a special purpose processor, or one or more ics for performing the processes of the embodiments of the present application. Alternatively, a processor may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions). For example, a baseband processor, or a central processor. The baseband processor may be used to process communication protocols and communication data, and the central processor may be used to control a communication device (e.g., a base station, a terminal device, or a chip, etc.), execute a software program, and process data of the software program.
Optionally, the processor 2410 may include one or more processors, for example, one or more Central Processing Units (CPUs), and in the case of one CPU, the CPU may be a single-core CPU or a multi-core CPU.
The transceiver 2420 is used for transmitting and receiving data and/or signals, as well as receiving data and/or signals. The transceiver may include a transmitter for transmitting data and/or signals and a receiver for receiving data and/or signals.
The memory 2430 includes, but is not limited to, a Random Access Memory (RAM), a read-only memory (ROM), an Erasable Programmable Read Only Memory (EPROM), and a compact disc read-only memory (CD-ROM), and the memory 2430 is used for storing relevant instructions and data.
The memory 2430 is used for storing program codes and data of the terminal device, and may be a separate device or integrated in the processor 2410.
Specifically, the processor 2410 is configured to control the transceiver to perform information transmission with the terminal device. Specifically, reference may be made to the description of the method embodiment, which is not repeated herein.
In a specific implementation, the apparatus 2400 may further include an output device and an input device, as an embodiment. An output device is in communication with the processor 2410 and can display information in a variety of ways. For example, the output device may be a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display device, a Cathode Ray Tube (CRT) display device, a projector (projector), or the like. An input device is in communication with the processor 601 and may receive user input in a variety of ways. For example, the input device may be a mouse, a keyboard, a touch screen device, or a sensing device, among others.
It will be appreciated that fig. 24 only shows a simplified design of the communication device. In practical applications, the apparatus may also include other necessary elements respectively, including but not limited to any number of transceivers, processors, controllers, memories, etc., and all terminal devices that can implement the present application are within the protection scope of the present application.
In one possible design, the apparatus 2400 may be a chip, for example, a communication chip that can be used in a terminal device, and is used to implement the relevant functions of the processor 2410 in the terminal device. The chip can be a field programmable gate array, a special integrated chip, a system chip, a central processing unit, a network processor, a digital signal processing circuit and a microcontroller which realize related functions, and can also adopt a programmable controller or other integrated chips. The chip may optionally include one or more memories for storing program code that, when executed, causes the processor to implement corresponding functions.
The embodiment of the application also provides a device which can be terminal equipment or a circuit. The apparatus may be configured to perform the actions performed by the terminal device in the above method embodiments.
When the apparatus in this embodiment is an access network device, the access network device may be as shown in fig. 25, for example, the apparatus 250 is a base station. The base station can be applied to the system as shown in fig. 1, and performs the functions of (R) AN in the above-mentioned method embodiment. Base station 250 may include one or more DUs 2501 and one or more CUs 2502. CU2502 may communicate with a next generation core (NC) network. The DU2501 may include at least one antenna 25011, at least one radio frequency unit 25012, at least one processor 25013, and at least one memory 25014. The DU2501 is mainly used for transceiving radio frequency signals, converting radio frequency signals and baseband signals, and partially processing baseband. The CU2502 can include at least one processor 25022 and at least one memory 25021. The CU2502 and the DU2501 can communicate with each other through an interface, wherein a control plane (control plane) interface can be Fs-C, such as F1-C, and a user plane (user plane) interface can be Fs-U, such as F1-U.
The CU2502 is mainly used for performing baseband processing, controlling a base station, and the like. The DU2501 and the CU2502 may be physically disposed together or physically disposed separately, that is, distributed base stations. The CU2502 is a control center of the base station, and may also be referred to as a processing unit, and is mainly used for performing a baseband processing function. For example, the CU2502 may be configured to control the base station to perform the operation procedure related to the access network device in the above method embodiment.
Specifically, the baseband processing on the CU and the DU may be divided according to protocol layers of the wireless network, for example, functions of a Packet Data Convergence Protocol (PDCP) layer and protocol layers above the PDCP layer are set in the CU, and functions of protocol layers below the PDCP layer, for example, functions of a Radio Link Control (RLC) layer and a Medium Access Control (MAC) layer, are set in the DU. For another example, a CU implements Radio Resource Control (RRC) and Packet Data Convergence Protocol (PDCP) functions, and a DU implements Radio Link Control (RLC), MAC and Physical (PHY) functions.
Further, optionally, the base station 250 may include one or more radio frequency units (RUs), one or more DUs, and one or more CUs. Wherein a DU may include at least one processor 25013 and at least one memory 25014, an RU may include at least one antenna 25011 and at least one radio frequency unit 25012, and a CU may include at least one processor 25022 and at least one memory 25021.
In an example, the CU2502 may be formed by one or more boards, and the multiple boards may jointly support a radio access network with a single access indication (e.g., a 5G network), or may respectively support radio access networks with different access schemes (e.g., an LTE network, a 5G network, or other networks). The memory 25021 and processor 25022 may serve one or more boards. That is, the memory and processor may be provided separately on each board. Multiple boards may share the same memory and processor. In addition, each single board can be provided with necessary circuits. The DU2501 may be formed by one or more boards, and the boards may jointly support a radio access network with a single access instruction (e.g., a 5G network), or may respectively support radio access networks with different access schemes (e.g., an LTE network, a 5G network, or other networks). The memory 25014 and processor 25013 may serve one or more boards. That is, the memory and processor may be provided separately on each board. Multiple boards may share the same memory and processor. In addition, each single board can be provided with necessary circuits.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a Digital Video Disk (DVD)), or a semiconductor medium (e.g., a Solid State Disk (SSD)), among others.
It should be understood that the processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method embodiments may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The processor may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, or discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
It will be appreciated that the memory in the embodiments of the subject application can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The non-volatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. By way of example, but not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), double data rate SDRAM, enhanced SDRAM, SLDRAM, Synchronous Link DRAM (SLDRAM), and direct bus RAM (DR RAM).
In the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone, wherein A and B can be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or multiple.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. It should be understood that, in various embodiments of the present invention, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation on the implementation process of the embodiments of the present invention.
As used in this specification, the terms "component," "module," "system," and the like are intended to refer to a computer-related entity, either hardware, firmware, a combination of hardware and software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computing device and the computing device can be a component. One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between 2 or more computers. In addition, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from two components interacting with another component in a local system, distributed system, and/or across a network such as the internet with other systems by way of the signal).
It should also be understood that the reference herein to first, second, and various numerical designations is merely a convenient division to describe and is not intended to limit the scope of the embodiments of the present application.
It should be understood that the term "and/or" herein is merely one type of association relationship that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. Wherein A or B is present alone, and the number of A or B is not limited. Taking the case of a being present alone, it is understood to have one or more a.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (26)

1. A system for non-access stratum, NAS, message transport, comprising:
the access network equipment is used for receiving a first NAS message from a terminal and sending the first NAS message to a proxy server;
the proxy server is configured to send a second centralized NAS message to an access and mobility management function AMF when the first NAS message includes the first centralized NAS message, and/or send a second distributed NAS message to a distributed non-access stratum service function NSFd when the first NAS message includes the first distributed NAS message.
2. The system of claim 1, wherein a Transport Network Layer Associated (TNLA) connection exists between the access network device and the proxy server for the terminal.
3. The system according to claim 1 or 2, wherein the NSFd is arranged at a position where a transmission delay of the distributed NAS message with the access network device is less than or equal to a preset threshold.
4. The system according to any of claims 1 to 3, characterized in that the system further comprises a central non-access layer data processing network element, NSFc;
the NSFc is configured to send configuration information to the AMF, where the configuration information is used to configure a TNLA connection for the terminal between the access network device and the AMF; and/or the presence of a gas in the gas,
the NSFc is used for configuring TNLA connection between the access network equipment and the proxy server for the terminal; and/or
The NSFc is configured to send a release request to the AMF, where the release request is used to request the proxy server to release the TNLA connection for the terminal.
5. The system of claim 4, wherein the NSFc is disposed within the AMF.
6. A method for non-access stratum (NAS) message transmission is characterized by comprising the following steps:
the method comprises the steps that a proxy server receives a first non-access stratum (NAS) message of a terminal from access network equipment;
the proxy server sends a second centralized NAS message to an access and mobility management function (AMF) when the first NAS message comprises a centralized NAS message, and/or sends a second distributed NAS message to a distributed non-access stratum service function (NSFd) when the first NAS message comprises a distributed NAS message.
7. The method of claim 6, further comprising:
the proxy server receiving first configuration information from the AMF, the first configuration information being used for configuring a transport layer network association (TNLA) connection between the proxy server and the AMF for the terminal;
and the proxy server establishes a TNLA connection between the proxy server and the AMF for the terminal according to the first configuration information.
8. The method according to claim 6 or 7, characterized in that the method further comprises:
and the proxy server decrypts the first NAS message according to the security parameters.
9. The method of any of claims 6 to 8, wherein prior to the proxy server receiving the first NAS message from the access network device, the method further comprises:
the proxy server sends a request message to the AMF, wherein the request message is used for requesting to establish TNLA connection between the proxy server and the access network equipment and aiming at the terminal.
10. The method according to any one of claims 6 to 9, further comprising:
the proxy server receiving a release message from the AMF, the release message being used for releasing the TNLA connection for the terminal;
and the proxy server releases the TNLA connection aiming at the terminal according to the release message.
11. A method for non-access stratum (NAS) message transmission is characterized by comprising the following steps:
the access network equipment receives a first NAS message from a terminal;
the access network device sends the first NAS message to a proxy server, so that the proxy server sends the second centralized NAS message to an AMF when the first NAS message comprises a first centralized NAS message, and/or sends a second distributed NAS message to an NSFd when the first NAS message comprises a first distributed NAS message.
12. The method of claim 11, further comprising:
the access network equipment receives second configuration information from the AMF, wherein the second configuration information is used for configuring TNLA connection between the access network equipment and the proxy server for the terminal;
and the access network equipment establishes TNLA connection aiming at the terminal between the access network equipment and the proxy server according to the second configuration information.
13. The method of claim 11, further comprising:
the access network equipment receives second configuration information from the AMF, wherein the second configuration information is used for configuring a TNLA connection between the access network equipment and the AMF and aiming at the terminal;
and the access network equipment establishes TNLA connection aiming at the terminal between the access network equipment and the AMF according to the second configuration information.
14. The method according to claim 12 or 13, wherein the second configuration information comprises TNLA information of the proxy server and/or TNLA information of the AMF;
the TNLA information of the proxy server comprises at least one of address information of the proxy server, identification information of a distributed core network corresponding to the proxy server, slice information which can be used by the proxy server, information of a geographical area to which the proxy server belongs, list information of a tracking area to which the proxy server belongs, NSFd types supported by the distributed core network corresponding to the proxy server and capacities supported by the distributed core network corresponding to the proxy server;
the TNLA information of the AMF includes at least one of address information of the AMF, identification information of a distributed core network corresponding to the AMF, slice information that the AMF can use, information of a geographical area to which the AMF belongs, list information of a tracking area to which the AMF belongs, an NSFd type supported by the distributed core network corresponding to the AMF, and a capacity supported by the distributed core network corresponding to the AMF.
15. A method for non-access stratum (NAS) message transmission is characterized by comprising the following steps:
an access and mobility management function (AMF) acquires second configuration information, wherein the second configuration information is used for configuring transport layer network association (TNLA) connection aiming at a terminal between access network equipment and the AMF and/or is used for configuring TNLA connection aiming at the terminal between the access network equipment and a proxy server;
and the AMF sends the second configuration information to the access network equipment.
16. The method of claim 15, wherein the AMF obtaining second configuration information comprises:
the AMF receives the second configuration information from an operation maintenance OAM network management system; or
The AMF receives the second configuration information from a central non-access layer data processing network element, NSFc.
17. The method according to claim 15 or 16, wherein the second configuration information comprises TNLA information of the proxy server and/or TNLA information of the AMF;
the TNLA information of the proxy server comprises at least one of address information of the proxy server, identification information of a distributed core network corresponding to the proxy server, slice information which can be used by the proxy server, information of a geographical area to which the proxy server belongs, list information of a tracking area to which the proxy server belongs, NSFd types supported by the distributed core network corresponding to the proxy server and capacities supported by the distributed core network corresponding to the proxy server;
the TNLA information of the AMF includes at least one of address information of the AMF, identification information of a distributed core network corresponding to the AMF, slice information that the AMF can use, information of a geographical area to which the AMF belongs, list information of a tracking area to which the AMF belongs, an NSFd type supported by the distributed core network corresponding to the AMF, and a capacity supported by the distributed core network corresponding to the AMF.
18. The method according to any one of claims 15 to 17, further comprising:
the AMF sends first configuration information to the proxy server, wherein the first configuration information is used for configuring TNLA connection between the proxy server and the AMF and aiming at the terminal.
19. The method of claim 18, further comprising:
the AMF receives a service request, wherein the service request comprises the time delay requirement of the service;
and the AMF determines the proxy server according to the time delay requirement.
20. The method of any one of claims 15 to 19, further comprising:
the AMF receives a request message from the proxy server, wherein the request message is used for requesting to establish TNLA connection between the proxy server and the access network equipment and aiming at the terminal;
wherein the sending, by the AMF, the second configuration information to the access network device includes:
and the AMF sends the second configuration information according to the request message.
21. The method according to any one of claims 15 to 20, further comprising:
and the AMF sends a release message to the proxy server, wherein the release message is used for instructing the proxy server to release the TNLA connection aiming at the terminal.
22. The method according to claim 21, wherein before the AMF sends a release message to the proxy server, the method further comprises:
the AMF receives a release request from the NSFc, wherein the release request is used for requesting to release the TNLA connection aiming at the terminal.
23. An apparatus of non-access stratum (NAS) message transport, comprising: a processor coupled with a memory for storing a program or instructions that, when executed by the processor, cause the apparatus to perform the method of any of claims 6 to 10, any of claims 11 to 14, or any of claims 15 to 22.
24. A computer-readable storage medium comprising instructions that, when executed on a computer, cause the computer to perform the method of any of claims 6-10, any of claims 11-14, or any of claims 15-22.
25. A computer program product which, when run on a computer, causes the computer to perform the method of any one of claims 6 to 10, 11 to 14, or 15 to 22.
26. A chip comprising a processor and a communication interface, the processor being configured to perform the method of any of claims 6 to 10, 11 to 14, or 15 to 22.
CN201910917615.3A 2019-09-26 2019-09-26 Method, device and system for transmitting non-access stratum message Active CN112565324B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910917615.3A CN112565324B (en) 2019-09-26 2019-09-26 Method, device and system for transmitting non-access stratum message
PCT/CN2020/116675 WO2021057692A1 (en) 2019-09-26 2020-09-22 Non-access stratum message transmission method, device, and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910917615.3A CN112565324B (en) 2019-09-26 2019-09-26 Method, device and system for transmitting non-access stratum message

Publications (2)

Publication Number Publication Date
CN112565324A true CN112565324A (en) 2021-03-26
CN112565324B CN112565324B (en) 2022-04-05

Family

ID=75029793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910917615.3A Active CN112565324B (en) 2019-09-26 2019-09-26 Method, device and system for transmitting non-access stratum message

Country Status (2)

Country Link
CN (1) CN112565324B (en)
WO (1) WO2021057692A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023087328A1 (en) * 2021-11-22 2023-05-25 Oppo广东移动通信有限公司 Handover method and apparatus, device, and storage medium
WO2024001950A1 (en) * 2022-06-30 2024-01-04 华为技术有限公司 Data transmission method and apparatus

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11765618B2 (en) * 2020-03-20 2023-09-19 Nokia Technologies Oy Wireless communication system
CN117098195A (en) * 2022-05-12 2023-11-21 华为技术有限公司 Communication method and device
WO2023224915A1 (en) * 2022-05-16 2023-11-23 Intel Corporation Security for distributed non-access stratum protocol in a mobile system

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335924A (en) * 2008-08-05 2008-12-31 中兴通讯股份有限公司 Non-access layer message transmission method, apparatus and system
CN101364934A (en) * 2007-08-10 2009-02-11 华为技术有限公司 Method and apparatus for non-access message processing in switching
US20110216718A1 (en) * 2010-03-03 2011-09-08 Rene Faurie Methods and apparatus to signal access-stratum capabilities of mobile stations for data transfer sessions
US20130157700A1 (en) * 2011-12-20 2013-06-20 Verizon Patent And Licensing, Inc. Non-access stratum (nas) transparent messaging
CN105933914A (en) * 2016-04-19 2016-09-07 国网浙江省电力公司信息通信分公司 Distributed LTE network architecture system
CN108541032A (en) * 2017-09-22 2018-09-14 中兴通讯股份有限公司 Communication means, functional entity under wireless base station separation architecture and wireless base station
CN108616995A (en) * 2016-12-30 2018-10-02 中国电信股份有限公司 Mobile network service adaptation method, equipment, terminal, base station and mobile communication system
CN108738077A (en) * 2017-04-25 2018-11-02 华为技术有限公司 A kind of methods, devices and systems of load migration
EP3461058A1 (en) * 2006-06-23 2019-03-27 Huawei Technologies Co., Ltd. Method and system for key distribution in a wireless communication network
WO2019128666A1 (en) * 2017-12-25 2019-07-04 电信科学技术研究院有限公司 Method and device for establishing session
CN109996346A (en) * 2017-12-29 2019-07-09 华为技术有限公司 Session establishing method, equipment and system
US20190215781A1 (en) * 2018-01-10 2019-07-11 Comcast Cable Communications, Llc Power Control for Channel State Information

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924882A (en) * 2017-03-24 2018-11-30 北京三星通信技术研究有限公司 Method and apparatus about data transfer state control
CN109246835B (en) * 2017-05-05 2022-08-19 华为技术有限公司 Communication method and device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3461058A1 (en) * 2006-06-23 2019-03-27 Huawei Technologies Co., Ltd. Method and system for key distribution in a wireless communication network
CN101364934A (en) * 2007-08-10 2009-02-11 华为技术有限公司 Method and apparatus for non-access message processing in switching
CN101335924A (en) * 2008-08-05 2008-12-31 中兴通讯股份有限公司 Non-access layer message transmission method, apparatus and system
US20110216718A1 (en) * 2010-03-03 2011-09-08 Rene Faurie Methods and apparatus to signal access-stratum capabilities of mobile stations for data transfer sessions
US20130157700A1 (en) * 2011-12-20 2013-06-20 Verizon Patent And Licensing, Inc. Non-access stratum (nas) transparent messaging
CN105933914A (en) * 2016-04-19 2016-09-07 国网浙江省电力公司信息通信分公司 Distributed LTE network architecture system
CN108616995A (en) * 2016-12-30 2018-10-02 中国电信股份有限公司 Mobile network service adaptation method, equipment, terminal, base station and mobile communication system
CN108738077A (en) * 2017-04-25 2018-11-02 华为技术有限公司 A kind of methods, devices and systems of load migration
CN108541032A (en) * 2017-09-22 2018-09-14 中兴通讯股份有限公司 Communication means, functional entity under wireless base station separation architecture and wireless base station
WO2019128666A1 (en) * 2017-12-25 2019-07-04 电信科学技术研究院有限公司 Method and device for establishing session
CN109996346A (en) * 2017-12-29 2019-07-09 华为技术有限公司 Session establishing method, equipment and system
US20190215781A1 (en) * 2018-01-10 2019-07-11 Comcast Cable Communications, Llc Power Control for Channel State Information

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023087328A1 (en) * 2021-11-22 2023-05-25 Oppo广东移动通信有限公司 Handover method and apparatus, device, and storage medium
WO2024001950A1 (en) * 2022-06-30 2024-01-04 华为技术有限公司 Data transmission method and apparatus

Also Published As

Publication number Publication date
WO2021057692A1 (en) 2021-04-01
CN112565324B (en) 2022-04-05

Similar Documents

Publication Publication Date Title
CN112565324B (en) Method, device and system for transmitting non-access stratum message
US11184886B2 (en) Method, base station, and user equipment for implementing carrier aggregation
US11425683B2 (en) Information transmission method and network device
US11272568B2 (en) Command reception method and apparatus and communication system
KR101836021B1 (en) Apparatus, system and method of securing communications of a user equipment (ue) in a wireless local area network
US20200374050A1 (en) Inter-Radio Access Technology Carrier Aggregation
CN114600378B (en) Terminal, base station and communication method
KR20150090121A (en) Apparatus, system and method of communicating non-cellular access network information over a cellular network
US11770692B2 (en) Enhancements for radio access capability signaling (RACS)
US20190357105A1 (en) Method and apparatus for reducing interruption delay, and user device
WO2018137716A1 (en) Method and device for keeping continuity of udc function
WO2016091185A1 (en) Method for data transmission, base station and user equipment
US10123204B2 (en) Splitting method, base station, and user equipment
WO2021226967A1 (en) Handover method and device
CN112399503B (en) Method and device for transmitting link failure report
US11729604B2 (en) Apparatus, method and computer program
CN114503649A (en) Communication method and communication device
KR20240060670A (en) Communication methods and devices
JP7449959B2 (en) Methods, devices and systems for transmitting system information requests
CN111918302B (en) Method and apparatus for network slice update
WO2024000191A1 (en) Network Architecture and Stateless Design for a Cellular Network
US20230413039A1 (en) Communication method and communication apparatus
CN114071799A (en) Method and device for managing session connection
CN113543157A (en) Method and equipment for controlling network resources

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant