CN113556742B - Network architecture and distribution strategy configuration method - Google Patents

Network architecture and distribution strategy configuration method Download PDF

Info

Publication number
CN113556742B
CN113556742B CN202010328919.9A CN202010328919A CN113556742B CN 113556742 B CN113556742 B CN 113556742B CN 202010328919 A CN202010328919 A CN 202010328919A CN 113556742 B CN113556742 B CN 113556742B
Authority
CN
China
Prior art keywords
network element
shunting
request
policy
smf
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010328919.9A
Other languages
Chinese (zh)
Other versions
CN113556742A (en
Inventor
李海民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Datang Mobile Communications Equipment Co Ltd
Original Assignee
Datang Mobile Communications Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Datang Mobile Communications Equipment Co Ltd filed Critical Datang Mobile Communications Equipment Co Ltd
Priority to CN202010328919.9A priority Critical patent/CN113556742B/en
Publication of CN113556742A publication Critical patent/CN113556742A/en
Application granted granted Critical
Publication of CN113556742B publication Critical patent/CN113556742B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints

Abstract

The embodiment of the invention provides a network architecture and a distribution strategy configuration method. The network architecture comprises: the system comprises a session management function SMF network element, a policy control function PCF network element, at least two first user plane functions UPF network elements and a second UPF network element; the first UPF network element is configured to receive a offloading policy request of an AF through a first interface, and send the offloading policy request to the SMF network element through the second interface; the PCF network element is used for receiving the shunting policy request, carrying the access token in a verification request, sending the verification request to an Operation Support System (OSS) corresponding to the AF-ID, and receiving a verification result of the OSS aiming at the verification request; and sending the shunting policy configuration response to the AF through the SMF network element. The embodiment of the invention solves the potential safety problem of the distribution strategy configuration mode of the AF in the prior art, and increases the complexity of transmission networking and the maintenance cost.

Description

Network architecture and distribution strategy configuration method
Technical Field
The present invention relates to the field of mobile communications technologies, and in particular, to a network architecture and a offloading policy configuration method.
Background
With the continuous development of mobile communication networks, more and more communication connections need to be analyzed, processed and stored at the network edge side; meanwhile, with the continuous improvement Of the terminal capability and the further reduction Of the flow rate charge, the large-flow service will generate a direct pulling effect on the monthly average flow rate consumption (DOU) Of the user; it is expected that during the business of 5th Generation Mobile Networks (5G), the average traffic bandwidth per user will reach 5 to 10 times that of the 4th Generation Mobile Networks (4G), which generates a huge pressure on the backhaul network. However, the current network architecture and mobile technology are not sufficient for network optimization, the distance between a base station and a core network is often hundreds of kilometers, multiple convergence and forwarding devices are used, and unpredictable congestion and jitter are added, so that some industrial customer scenes with high requirements on time delay and reliability are difficult to guarantee. Therefore, edge computing techniques have come to work.
Edge computing is an important Function of 5G, and implements early shunting of services by deploying Application Function (AF) network elements of services at the edge of a network. Specifically, edge computing is a method for processing data physically close to a data source, and is a distributed computing architecture. Edge computing as a 5G native function will help enable application localization, content distribution, and computation marginalization.
When a service application is deployed at the edge of a network, a 5G core network needs to support a service offloading Function, add a User Plane Function (UPF) node network element having an Uplink Classifier (UL CL) Function on a transmission path of a service Plane, and configure an offloading policy of UL CL through a Session Management Function (SMF) network element. When the terminal user accesses the service, if the shunting strategy is met, the service message is shunted to the service application AF deployed at the edge by UL CL.
According to the 3GPP protocol, the configuration of the offloading policy is implemented in two ways: the first is a static configuration mode, which is directly configured to an SMF network element or a Policy Control Function (PCF) network element, if configured to a PCF, the PCF transmits a Policy to the SMF when a Packet Data Protocol (PDP) is established; the second is a dynamic configuration method, in which the AF sends a request to a Network capability open Function (NEF) Network element through a capability open interface, and the NEF transfers a offloading policy to the PCF.
The first method does not need to add extra functions to the AF, and when the functions realized by the AF are not changed frequently, the method can be adopted to configure the offloading policy, and the offloading policy is configured to the SMF or PCF by an operator through a network manager. When the function realized by the AF is frequently changed, for example, the content cache application needs to frequently modify the offloading policy, the implementation is difficult by adopting a static configuration method, the AF needs to dynamically interact with the core network, and the policy is configured to the SMF through the capability open interface, so that the second method needs to be adopted.
In the above two configuration modes of the offloading policy, the AF may configure the offloading policy by using a network capability interface opened by the NEF. At this time, the AF and the NEF are required to establish a transmission channel, but the AF may be an application developed by a non-operator, and although the capability open interface supports the functions of authentication and transport layer encryption transmission on the protocol, the AF can directly access the control plane of the core network, which may cause a potential security problem. Especially, when the AF is deployed at the edge of the network, not only the security problem exists, but also the transmission channels of the AF and the control plane need to be planned, which increases the complexity of the transmission networking and the maintenance cost.
Disclosure of Invention
The embodiment of the invention provides a network architecture and a distribution strategy configuration method, aiming at solving the problems that potential safety problems exist in an AF distribution strategy configuration mode in the prior art, and the complexity and maintenance cost of transmission networking are increased.
In one aspect, an embodiment of the present invention provides a network architecture, where the network architecture includes:
the system comprises a session management function SMF network element, a policy control function PCF network element, at least two first user plane functions UPF network elements and a second UPF network element;
the first UPF network element is in communication connection with an Application Function (AF) through a first interface and is in communication connection with the SMF network element through a second interface;
the first UPF network element is configured to receive a offloading policy request of an AF through a first interface, and send the offloading policy request to the SMF network element through the second interface;
the SMF network element is used for forwarding the shunting policy request to the PCF network element; the shunting policy request carries an identification number AF-ID of the AF, an access token and shunting information;
the PCF network element is used for receiving the shunting policy request, carrying the access token in a verification request, sending the verification request to an Operation Support System (OSS) corresponding to the AF-ID, and receiving a verification result of the OSS aiming at the verification request;
if the verification result is that the verification is passed, carrying the shunting information in a shunting strategy configuration response;
and sending the shunting policy configuration response to the AF through the SMF network element.
On the other hand, an embodiment of the present invention further provides a method for configuring a offloading policy, which is applied to the network architecture, and the method includes:
controlling a first User Plane Function (UPF) network element to receive a shunting strategy request of AF through a first interface and sending the shunting strategy request to a Session Management Function (SMF) network element through a second interface;
controlling the SMF network element to forward the shunting strategy request to a strategy control function PCF network element; wherein, the shunting strategy request carries the identification number AF-ID of the AF, the access token and shunting information;
controlling the PCF network element to receive the shunting policy request, carrying the access token in a verification request, sending the verification request to an Operation Support System (OSS) corresponding to the AF-ID, and receiving a verification result of the OSS aiming at the verification request;
if the verification result is that the verification is passed, controlling the PCF network element to carry the shunting information in a shunting strategy configuration response;
and sending the shunting policy configuration response to the AF through the SMF network element.
In still another aspect, an embodiment of the present invention further provides an electronic device, where the electronic device includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor, when executing the computer program, implements the steps in the offloading policy configuration method described above.
In still another aspect, an embodiment of the present invention further provides a readable storage medium, where the readable storage medium stores a computer program, and the computer program, when executed by a processor, implements the steps in the offloading policy configuration method described above.
In the embodiment of the invention, a first interface is arranged between a first UPF network element and an AF, and a second interface is arranged between the first UPF network element and an SMF network element; receiving a shunting strategy configuration request of the edge AF through a first interface, and forwarding the shunting strategy configuration request to an OSS system through an SMF network element and a PCF network element to realize shunting strategy configuration of the AF; in the configuration process, the AF transmits a shunting policy request to the SMF network element through the first interface C1, and cannot access the control plane of the core network; the method is applied as a non-operator, so that potential safety problems brought by AF are avoided, and the safety of the network is improved; the network architecture provided by the embodiment of the invention has simple networking and lower maintenance cost, is compatible with the network element of the core network of the existing standard, and does not change the functions of the network element and the interface in the existing 3GPP protocol.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
Fig. 1 is a schematic diagram of a network architecture according to an embodiment of the present invention;
FIG. 2 is a flow chart of a second example of an embodiment of the present invention;
FIG. 3 is a flow chart of a third example of an embodiment of the present invention;
fig. 4 is a message format diagram of a PFCP according to a fourth example of the embodiment of the present invention;
fig. 5 is a flowchart illustrating steps of a offloading policy configuration method according to an embodiment of the present invention;
fig. 6 is a block diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
In various embodiments of the present invention, it should be understood that the sequence numbers of the following processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
In the embodiments provided herein, it should be understood that "B corresponding to A" means that B is associated with A from which B can be determined. It should also be understood that determining B from a does not mean determining B from a alone, but may be determined from a and/or other information.
An embodiment of the present invention provides a network architecture, as shown in fig. 1, where the network architecture includes:
a Session Management Function (SMF) network element, a Policy Control Function (PCF) network element, at least two first User Plane Function (UPF) network elements and a second UPF network element; as shown in fig. 1, the first UPF network element may be a UPF1 or a UPF 2; the second UPF network element is UPF 0; a User Equipment (UE) accesses the UPF0 and/or the AMF through AN Access Network (AN).
The first UPF network element is in communication connection with an Application Function (AF) through a first interface and is in communication connection with the SMF network element through a second interface; as shown in fig. 1, the AF1 is communicatively coupled to the UPF1 via a first interface C1, and the AF2 is communicatively coupled to the UPF2 via a first interface C1.
The UPF1 and the UPF2 are respectively connected with the SMF network element through a second interface N4.
The first interface adopts a service interface, and the Protocol of interface messages and formats uses hypertext Transfer Protocol (HTTP) and restful State Transfer. The first interface is used for identity authentication of the AF and receiving a shunting strategy request of the AF; optionally, the identity authentication method of the AF may adopt oauth2.0 protocol;
specifically, the first UPF network element is configured to receive a offloading policy request of an AF through a first interface, and send the offloading policy request to the SMF network element through the second interface; thus, the AF transmits the offloading policy request to the SMF network element through the first interface C1, does not establish a transmission channel with the NEF, and cannot access the control plane of the core network; as a non-operator application, potential safety problems are avoided.
The SMF network element is used for forwarding the shunting policy request to the PCF network element; the shunting policy request carries an identification number AF-ID of the AF, an access token and shunting information; the access token is generated for the AF by the PCF network element when the AF carries out identity authentication in advance; the shunting information comprises an Internet Protocol (IP) address for accessing a service application corresponding to the AF, so that for the AF deployed at the edge of the network, the terminal service data for accessing the AF is shunted to the IP address as soon as possible according to the shunting information, transmission delay is reduced, network operation efficiency is improved, service distribution and transmission capacity is improved, terminal user experience is improved, and key requirements of industrial users on service real-time, intelligence, data aggregation and interoperation, safety, privacy protection and the like in the digital transformation process are met.
The PCF network element is used for receiving the shunting policy request, carrying the access token in a verification request, sending the verification request to an Operation Support System (OSS) corresponding to the AF-ID, verifying the shunting policy request by the OSS system, verifying whether the access token is consistent with a pre-recorded access token of the AF-ID, if so, if not, then the OSS feeds back a verification result to the PCF network element; and the PCF network element receives the verification result of the OSS aiming at the verification request.
If the verification result is that the verification is passed, carrying the shunting information in a shunting strategy configuration response; the shunting policy configuration response also comprises an execution result, a failure reason and the like of the configuration request;
and sending the shunting strategy configuration response to the AF through the SMF network element, and storing the configuration information of each AF at a second UPF network element side to complete the shunting strategy configuration of the AF.
As a first example, the offloading policy configuration includes a destination IP address and a port of a service packet, or a resource descriptor URL, as shown in table 1 below, and includes 4 parameters:
table 1:
Figure BDA0002464246670000061
as a second example, as shown in fig. 2, the process of offloading policy configuration mainly includes the following steps:
the method comprises the steps that 1, an AF sends a shunting strategy request to a UPF (first UPF);
2, the UPF forwards the shunting strategy request to the SMF;
SMF forwards the shunting strategy request to PCF;
PCF forwards the shunting strategy request to OSS;
5, the OSS verifies the access token of the flow policy request;
the OSS feeds back a verification result to the PCF;
7. if the verification result is that the AF is passed, the PCF generates a shunting strategy configuration response of the AF;
8, PCF transmits the distribution strategy configuration response to SMF;
9, the SMF forwards the shunting strategy configuration response to the UPF;
and 10, forwarding the shunting strategy configuration response to the AF by the UPF, and finishing the shunting strategy configuration by the AF.
In the above embodiment of the present invention, a first interface is set between the first UPF network element and the AF, and a second interface is set between the first UPF network element and the SMF network element; receiving a shunting strategy configuration request of the edge AF through a first interface, and forwarding the shunting strategy configuration request to a PCF network element through an SMF network element to realize shunting strategy configuration of the AF; in the configuration process, the AF transmits a shunting policy request to the SMF network element through the first interface C1, and cannot access the control plane of the core network; the method is applied as a non-operator, so that potential safety problems brought by AF are avoided, and the safety of the network is improved; the network architecture provided by the embodiment of the invention has simple networking and lower maintenance cost, is compatible with the network elements of the core network of the existing standard, and does not change the functions of the network elements and the interfaces in the existing 3GPP protocol; the embodiment of the invention solves the potential safety problem of the distribution strategy configuration mode of the AF in the prior art, and increases the complexity of transmission networking and the maintenance cost.
Optionally, in the embodiment of the present invention, before the AF requests offloading policy configuration, identity authentication needs to be performed on the AF; specifically, the method further comprises:
controlling the first UPF network element to receive an identity authentication request of AF through a first interface, and forwarding the identity authentication request to the OSS through the SMF network element and the PCF network element in sequence;
the identity authentication request carries the AF-ID and the identity token of the AF; the OSS system verifies the identity token, verifies whether the identity token is consistent with the identity token of the AF-ID recorded in advance, and if so, the OSS generates the access token according to the identity token, and then the OSS feeds the access token back to the PCF network element;
and controlling the PCF network element to receive the access token generated by the OSS according to the identity token, and sending the access token to the AF through the SMF network element and the first UPF network element in sequence.
As a third example, as shown in fig. 3, the process of offloading policy configuration mainly includes the following steps:
the AF sends an identity authentication request to a UPF (first UPF);
the UPF forwards the identity authentication request to the SMF;
SMF forwards the identity authentication request to PCF;
PCF forwards the identity authentication request to OSS;
the OSS verifies the identity token;
6. if the verification result is that the AF passes, the OSS generates an access token of the AF and sends the access token to the PCF;
PCF forwards the access token to SMF;
SMF forwards the access token to UPF;
the UPF forwards the access token to the AF, at which point the AF gets the access token.
Optionally, in the embodiment of the present invention, the offloading information carries an internet protocol IP address and a port of the AF;
as shown in the UPF0 in fig. 1, the second UPF network element is a branching point of the forking, and the second UPF network element is used for receiving the service data of the terminal,
the second UPF network element is used for receiving the service data of the terminal and acquiring the target identification number of the target AF carried in the service data;
determining target distribution information corresponding to the target identification number according to distribution strategy information pre-configured by the PCF network element;
and distributing the service data to a first UPF network element connected with the target AF according to the target distribution information, so that for the AF deployed at the network edge, the terminal service data accessing the AF is distributed to the IP address according to the distribution information as soon as possible, thereby reducing transmission delay, improving network operation efficiency, improving service distribution and transmission capacity and improving terminal user experience.
Optionally, in the embodiment of the present invention, a message relay function is added to the SMF, and the AF identity authentication message and the offload policy request message received from the second interface N4 are sent to the PCF through the serving interface between the SMF and the PCF.
Optionally, in the embodiment of the present invention, the first UPF network element encapsulates the offloading policy request in a Packet Forwarding Control Protocol (PFCP) message, and sends the Packet Forwarding Control Protocol (PFCP) message to the SMF network element through the second interface; the second interface is a point-to-point interface and is used for controlling the establishment, modification and release of the service plane session; the second interface uses the PFCF protocol. In order to support transparent transmission of the shunting policy management message, the PFCP message needs to be extended, and the transmission process of the shunting policy management message needs to be increased.
Optionally, as a fourth example, a message format of the PFCP is shown in fig. 4, where the message types 100 and 255 are currently reserved, and in order to support offload policy transmission, a new type may be allocated from the reserved message types, as shown in table 2 below:
table 2:
Figure BDA0002464246670000091
according to the above table 2, the UPF and the SMF encapsulate the offload policy management message in the message body of the PFCF for transmission.
Optionally, in the embodiment of the present invention, the SMF network element is in communication connection with the PCF network element through a third interface (Npcf interface); and the SMF network element encapsulates the shunting policy request in a hypertext transfer protocol Http message and forwards the shunting policy request to the PCF network element through the third interface.
An interface Npcf between the SMF and the PCF is a service interface, is used for policies related to SMF request and subscription session, and needs to extend functions of the Npcf interface to support transmission of offload policy management messages, as shown in table 3 below:
table 3:
Figure BDA0002464246670000101
the SMF sends the received AF shunting policy management request to the PCF through the Npcf _ ULCLPolicy service, receives the execution result of the PCF on the shunting policy in the service response message, and sends the execution result to the AF through the UPF.
The Npcf _ ULCLPolicy service provides a transparent transmission function for shunting the policy management message, and the Npcf _ ULCLPolicy _ Create encapsulates the received policy management message in an Http message body by using an Http Post method and transmits the Http message to the PCF. After the PCF analyzes and executes, the execution result is sent to the SMF as a response to the Http Post.
In the above embodiment of the present invention, a first interface is set between the first UPF network element and the AF, and a second interface is set between the first UPF network element and the SMF network element; receiving a shunting strategy configuration request of the edge AF through a first interface, and forwarding the shunting strategy configuration request to an OSS system through an SMF network element and a PCF network element to realize shunting strategy configuration of the AF; in the configuration process, the AF transmits a shunting policy request to the SMF network element through the first interface C1, and cannot access the control plane of the core network; the method is applied as a non-operator, so that potential safety problems brought by AF are avoided, and the safety of the network is improved; the network architecture provided by the embodiment of the invention has simple networking and lower maintenance cost, is compatible with the network element of the core network of the existing standard, and does not change the functions of the network element and the interface in the existing 3GPP protocol.
With the above description of the network architecture provided in the embodiment of the present invention, a offloading policy configuration method provided in the embodiment of the present invention will be described below with reference to the accompanying drawings.
Referring to fig. 5, an embodiment of the present invention provides a method for configuring a offloading policy, which is applied to the network architecture, and the method includes:
step 501, controlling a first user plane function UPF network element to receive a offloading policy request of an AF through a first interface, and sending the offloading policy request to a session management function SMF network element through a second interface.
Referring to fig. 1, controlling to receive a offloading policy request of an AF through a first interface by a first UPF network element, and sending the offloading policy request to the SMF network element through the second interface; thus, the AF transmits the offloading policy request to the SMF network element through the first interface C1, does not establish a transmission channel with the NEF, and cannot access the control plane of the core network; as a non-operator application, potential safety problems are avoided.
Step 502, controlling the SMF network element to forward the offloading policy request to a policy control function PCF network element; wherein, the offloading policy request carries the identification number AF-ID of the AF, the access token and offloading information.
The access token is generated for the AF by the PCF network element when the AF carries out identity authentication in advance; the distribution information comprises an IP address for accessing the service application corresponding to the AF, therefore, for the AF deployed at the edge of the network, the terminal service data for accessing the AF is distributed to the IP address as soon as possible according to the distribution information, the transmission delay is reduced, the network operation efficiency is improved, the service distribution and transmission capacity is improved, the terminal user experience is improved, and the key requirements of industrial users on the aspects of real-time, intelligence, data aggregation and interoperation, safety, privacy protection and the like of the service in the digital revolution process are met.
Step 503, controlling the PCF network element to receive the offloading policy request, carry the access token in a verification request, send the verification request to an operation support system OSS corresponding to the AF-ID, and receive a verification result of the OSS for the verification request.
The OSS system verifies the shunting policy request, verifies whether the access token is consistent with the access token of the AF-ID recorded in advance, if the access token is consistent with the access token of the AF-ID, the verification is passed, otherwise, the verification is not passed, and then the OSS feeds back a verification result to the PCF network element; and the PCF network element receives the verification result of the OSS aiming at the verification request.
Step 504, if the verification result is that the verification is passed, controlling the PCF network element to carry the offloading information in an offloading policy configuration response.
The offloading policy configuration response includes an execution result for configuring the offloading information, and the like.
Step 505, sending the offloading policy configuration response to the second UPF network element AF through the SMF network element.
Optionally, in the embodiment of the present invention, the offloading information carries an internet protocol IP address and a port of the AF;
the network architecture further comprises: a second UPF network element;
the method further comprises the following steps:
controlling the second UPF network element to receive the service data of the terminal; acquiring a target identification number of a target AF carried in the service data;
determining target distribution information corresponding to the target identification number according to distribution strategy information pre-configured by the PCF network element;
and shunting the service data to a first UPF network element connected with the target AF according to the target shunting information.
Optionally, in this embodiment of the present invention, the sending, by the SMF network element, the offload policy configuration response to the AF includes:
sending a session policy change notification carrying the offloading policy configuration response to the SMF network element;
and controlling the SMF network element to receive the session policy change notification and send the offloading policy configuration response to the AF.
In the above embodiment of the present invention, a shunting policy configuration request of an edge AF is received through a first interface, and forwarded to an OSS system through an SMF network element and a PCF network element, so as to implement shunting policy configuration for the AF; in the configuration process, the AF transmits a shunting policy request to the SMF network element through the first interface C1, and cannot access the control plane of the core network; the method is applied as a non-operator, so that potential safety problems brought by AF are avoided, and the safety of the network is improved; the network architecture provided by the embodiment of the invention has simple networking and lower maintenance cost, is compatible with the network elements of the core network of the existing standard, and does not change the functions of the network elements and the interfaces in the existing 3GPP protocol; the embodiment of the invention solves the potential safety problem of the distribution strategy configuration mode of the AF in the prior art, and increases the complexity of transmission networking and the maintenance cost. On the other hand, an embodiment of the present invention further provides an electronic device, which includes a memory, a processor, a bus, and a computer program that is stored in the memory and is executable on the processor, where the processor implements the steps in the foregoing shunting policy configuration method when executing the program.
For example, fig. 6 shows a schematic physical structure diagram of an electronic device.
As shown in fig. 6, the electronic device may include: a processor (processor)610, a communication Interface (Communications Interface)620, a memory (memory)630 and a communication bus 640, wherein the processor 610, the communication Interface 620 and the memory 630 communicate with each other via the communication bus 640. The processor 610 may call logic instructions in the memory 630 to perform the following method:
controlling a first User Plane Function (UPF) network element to receive a shunting strategy request of AF through a first interface and sending the shunting strategy request to a Session Management Function (SMF) network element through a second interface;
controlling the SMF network element to forward the shunting strategy request to a strategy control function PCF network element; wherein, the shunting strategy request carries the identification number AF-ID of the AF, the access token and shunting information;
controlling the PCF network element to receive the shunting policy request, carrying the access token in a verification request, sending the verification request to an Operation Support System (OSS) corresponding to the AF-ID, and receiving a verification result of the OSS aiming at the verification request;
if the verification result is that the verification is passed, controlling the PCF network element to carry the shunting information in a shunting strategy configuration response;
and sending the shunting policy configuration response to the AF through the SMF network element.
In addition, the logic instructions in the memory 630 may be implemented in software functional units and stored in a computer readable storage medium when the logic instructions are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In another aspect, an embodiment of the present invention further provides a readable storage medium, which may be a computer-readable storage medium, and a computer program is stored on the readable storage medium, and when executed by a processor, the computer program is implemented to perform the offloading policy configuration method provided in the foregoing embodiments, for example, including:
controlling a first User Plane Function (UPF) network element to receive a shunting strategy request of AF through a first interface and sending the shunting strategy request to a Session Management Function (SMF) network element through a second interface;
controlling the SMF network element to forward the shunting strategy request to a strategy control function PCF network element; wherein, the shunting strategy request carries the identification number AF-ID of the AF, the access token and shunting information;
controlling the PCF network element to receive the shunting policy request, carrying the access token in a verification request, sending the verification request to an Operation Support System (OSS) corresponding to the AF-ID, and receiving a verification result of the OSS aiming at the verification request;
if the verification result is that the verification is passed, controlling the PCF network element to carry the shunting information in a shunting strategy configuration response;
and sending the shunting policy configuration response to the AF through the SMF network element.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding, the above technical solutions may be embodied in the form of a software product, which may be stored in a readable storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (12)

1.A network architecture, the network architecture comprising:
the system comprises a session management function SMF network element, a policy control function PCF network element, at least two first user plane functions UPF network elements and a second UPF network element;
the first UPF network element is in communication connection with an Application Function (AF) through a first interface and is in communication connection with the SMF network element through a second interface;
the first UPF network element is configured to receive a offloading policy request of an AF through a first interface, and send the offloading policy request to the SMF network element through the second interface;
the SMF network element is used for forwarding the shunting policy request to the PCF network element; the shunting policy request carries an identification number AF-ID of the AF, an access token and shunting information;
the PCF network element is used for receiving the shunting policy request, carrying the access token in a verification request, sending the verification request to an Operation Support System (OSS) corresponding to the AF-ID, and receiving a verification result of the OSS aiming at the verification request;
if the verification result is that the verification is passed, carrying the shunting information in a shunting strategy configuration response;
and sending the shunting policy configuration response to the AF through the SMF network element.
2. The network architecture of claim 1, wherein the first UPF network element is further configured to receive an identity authentication request of an AF through a first interface, and forward the identity authentication request to the OSS through the SMF network element and the PCF network element in sequence;
the identity authentication request carries the AF-ID and the identity token of the AF;
and the PCF network element is further configured to receive the access token generated by the OSS according to the identity token, and send the access token to the AF sequentially through the SMF network element and the first UPF network element.
3. The network architecture according to claim 1, wherein said offload information carries an internet protocol, IP, address and port of said AF;
the second UPF network element is used for receiving the service data of the terminal and acquiring the target identification number of the target AF carried in the service data;
determining target distribution information corresponding to the target identification number according to distribution strategy information pre-configured by the PCF network element;
and shunting the service data to a first UPF network element connected with the target AF according to the target shunting information.
4. The network architecture of claim 1, wherein the sending, by the SMF network element, the offload policy configuration response to the AF comprises:
sending a session policy change notification carrying the offloading policy configuration response to the SMF network element;
and controlling the SMF network element to receive the session policy change notification and send the offloading policy configuration response to the AF.
5. The network architecture of claim 1, wherein the first UPF network element encapsulates the offload policy request in a Packet Forwarding Control Protocol (PFCP) message, and sends the offload policy request to the SMF network element through the second interface.
6. The network architecture of claim 1, wherein the SMF network element is communicatively coupled to the PCF network element via a third interface;
and the SMF network element encapsulates the shunting policy request in a hypertext transfer protocol Http message and forwards the shunting policy request to the PCF network element through the third interface.
7. A method for configuring a offload policy, applied to a network architecture according to any of claims 1 to 6, the method comprising:
controlling a first User Plane Function (UPF) network element to receive a shunting strategy request of AF through a first interface and sending the shunting strategy request to a Session Management Function (SMF) network element through a second interface;
controlling the SMF network element to forward the shunting strategy request to a strategy control function PCF network element; wherein, the shunting strategy request carries the identification number AF-ID of the AF, the access token and shunting information;
controlling the PCF network element to receive the shunting policy request, carrying the access token in a verification request, sending the verification request to an Operation Support System (OSS) corresponding to the AF-ID, and receiving a verification result of the OSS aiming at the verification request;
if the verification result is that the verification is passed, controlling the PCF network element to carry the shunting information in a shunting strategy configuration response;
and sending the shunting policy configuration response to the AF through the SMF network element.
8. The offloading policy configuration method of claim 7, wherein the method further comprises:
controlling the first UPF network element to receive an identity authentication request of AF through a first interface, and forwarding the identity authentication request to the OSS through the SMF network element and the PCF network element in sequence;
the identity authentication request carries the AF-ID and the identity token of the AF;
and controlling the PCF network element to receive the access token generated by the OSS according to the identity token, and sending the access token to the AF through the SMF network element and the first UPF network element in sequence.
9. The offloading policy configuration method according to claim 7, wherein the offloading information carries an internet protocol, IP, address and port of the AF;
the method further comprises the following steps:
controlling the second UPF network element to receive the service data of the terminal; acquiring a target identification number of a target AF carried in the service data;
determining target distribution information corresponding to the target identification number according to distribution strategy information pre-configured by the PCF network element;
and shunting the service data to a first UPF network element connected with the target AF according to the target shunting information.
10. The offloading policy configuration method of claim 7, wherein the sending the offloading policy configuration response to the AF through the SMF network element comprises:
sending a session policy change notification carrying the offloading policy configuration response to the SMF network element;
and controlling the SMF network element to receive the session policy change notification and send the offloading policy configuration response to the AF.
11. An electronic device comprising a processor, a memory and a computer program stored on the memory and executable on the processor, wherein the computer program, when executed by the processor, implements the steps of the offloading policy configuration method according to any of claims 7-10.
12. A readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the offloading policy configuration method according to any of claims 7 to 10.
CN202010328919.9A 2020-04-23 2020-04-23 Network architecture and distribution strategy configuration method Active CN113556742B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010328919.9A CN113556742B (en) 2020-04-23 2020-04-23 Network architecture and distribution strategy configuration method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010328919.9A CN113556742B (en) 2020-04-23 2020-04-23 Network architecture and distribution strategy configuration method

Publications (2)

Publication Number Publication Date
CN113556742A CN113556742A (en) 2021-10-26
CN113556742B true CN113556742B (en) 2022-04-05

Family

ID=78101156

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010328919.9A Active CN113556742B (en) 2020-04-23 2020-04-23 Network architecture and distribution strategy configuration method

Country Status (1)

Country Link
CN (1) CN113556742B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110234112A (en) * 2018-03-05 2019-09-13 华为技术有限公司 Message treatment method, system and user plane functions equipment
CN110730487A (en) * 2018-07-17 2020-01-24 华为技术有限公司 Method, device and system for selecting session management function network element

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10904947B2 (en) * 2018-05-16 2021-01-26 Huawei Technologies Co., Ltd. Message and system for application function influence on traffic routing

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110234112A (en) * 2018-03-05 2019-09-13 华为技术有限公司 Message treatment method, system and user plane functions equipment
CN110730487A (en) * 2018-07-17 2020-01-24 华为技术有限公司 Method, device and system for selecting session management function network element

Also Published As

Publication number Publication date
CN113556742A (en) 2021-10-26

Similar Documents

Publication Publication Date Title
WO2023000935A1 (en) Data processing method, network element device, and readable storage medium
RU2583723C2 (en) Method and apparatus for controlling transmission of service
WO2021082715A1 (en) Direct communication processing method, device, relay terminal, and remote terminal
US11533610B2 (en) Key generation method and related apparatus
JP2022093339A (en) QoS control method and device
US20170034820A1 (en) Bandwidth control method and bandwidth control device
CN108833181A (en) NG-CN network slice systems and network are sliced selection method
CN106789527B (en) Private network access method and system
WO2022048261A1 (en) Edge application discovery method and apparatus, and edge application service support method and apparatus
CN112566164B (en) Communication system and service quality control method
WO2023000936A1 (en) Data processing method, function device and readable storage medium
EP4184988A1 (en) Network slicing management system, application server and terminal device
CN108964961A (en) A kind of method, apparatus and system of management transmission network slice
CN110870256B (en) Method, system and computer readable medium for operating a telecommunication network
CN113993118A (en) Data distribution method, device, equipment, functional entity and storage medium
CN103987091B (en) A kind of service bandwidth variation, controller and system
CN116633934A (en) Load balancing method, device, node and storage medium
KR102397750B1 (en) GTP tunnels to support anchorless backhaul
WO2022105807A1 (en) Service instance deployment method, cross-domain mutual access channel establishment method and related apparatus
CN112312481B (en) Communication method and system for MEC and multi-operator core network
CN113556742B (en) Network architecture and distribution strategy configuration method
JP7382429B2 (en) Intelligent edge routing system and method
CN103200620B (en) The method of core network access and device in a kind of LTE system
CN107046568B (en) Authentication method and device
JP2018537872A (en) Communication network and method for establishing a non-access layer connection in a communication network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant