CN115334034A - Multi-access edge computing node access method, device, electronic equipment and medium - Google Patents

Multi-access edge computing node access method, device, electronic equipment and medium Download PDF

Info

Publication number
CN115334034A
CN115334034A CN202110510597.4A CN202110510597A CN115334034A CN 115334034 A CN115334034 A CN 115334034A CN 202110510597 A CN202110510597 A CN 202110510597A CN 115334034 A CN115334034 A CN 115334034A
Authority
CN
China
Prior art keywords
identifier
dynamic
target node
access
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110510597.4A
Other languages
Chinese (zh)
Inventor
王意军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN202110510597.4A priority Critical patent/CN115334034A/en
Publication of CN115334034A publication Critical patent/CN115334034A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/10Mapping addresses of different types
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer And Data Communications (AREA)

Abstract

The utility model provides a multi-access edge computing node access method, which comprises the steps that when a first access request message sent by an access initiating node is received, a corresponding dynamic identifier is determined according to a first mapping relation between an MEC node identifier and the dynamic identifier and an MEC node identifier of a target node carried in the first access request message, and a second access request message carrying the dynamic identifier is sent to the target node; and when receiving the second access response message, determining a corresponding MEC node identifier according to the dynamic identifier of the target node carried in the second access response message and the first mapping relation, and sending the first access response message carrying the MEC node identifier to the access initiating node. The embodiment of the disclosure can determine the current dynamic identifier of the target node based on the first mapping relation, so that the target node can be accurately found, and the access of the access initiating node to the target node is realized. The present disclosure also provides a multi-access edge computing device, a computer apparatus, and a readable medium.

Description

Multi-access edge computing node access method, device, electronic equipment and medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method, an apparatus, an electronic device, and a medium for accessing a multi-access edge computing node.
Background
With the development of 5G (5 th generation mobile communication technology) networks and multi-access edge computing scale, more and more user terminals access the 5G network through a 5G module (a module integrating a 5G baseband chip) or a 5G CPE (Customer Premise Equipment). In the 5G multi-access edge computing industry application scenario, a core network allocates a dynamic address to a user terminal or a CPE, and the dynamic address changes after the user terminal is powered on each time, which may cause an edge application server in a multi-access edge computing network to fail to find the user terminal. In addition, in some specific scenarios, mutual access between the user terminals (or between CPEs of the user terminals) is required, and since the core network allocates a dynamic address to the user terminal or the CPE, the user terminal cannot find the user terminal at the opposite end, or the CPE cannot find the CPE at the opposite end, and the mutual access between the user terminals or between the CPEs cannot be realized.
Disclosure of Invention
The disclosure provides a multi-access edge computing node access method, apparatus, electronic device and medium.
In a first aspect, an embodiment of the present disclosure provides a multi-access edge computing node access method, including:
receiving a first access request message sent by an access initiating node, and acquiring a multi-edge computing MEC node identifier of a target node carried in the first access request message;
determining a dynamic identifier corresponding to the MEC node identifier of the target node according to a first mapping relation between the MEC node identifier and the dynamic identifier, and sending a second access request message carrying the dynamic identifier of the target node to the target node;
receiving a second access response message, acquiring the dynamic identifier of the target node carried in the second access response message, wherein the second access response message is generated by the target node after receiving the second access request message;
and determining an MEC node identifier corresponding to the dynamic identifier of the target node according to the first mapping relation, and sending a first access response message carrying the MEC node identifier to the access initiating node.
In some embodiments, the method further comprises establishing the first mapping relationship, the establishing the first mapping relationship comprising:
acquiring a dynamic identifier of the target node according to the static identifier of the target node, wherein the static identifier of the target node is used for representing the inherent attribute of the target node;
distributing MEC node identification to the target node;
and establishing a first mapping relation of the target node according to the dynamic identifier and the MEC node identifier.
In some embodiments, the method further comprises:
and in response to determining that the dynamic identifier of the target node is updated, updating the first mapping relation of the target node according to the updated dynamic identifier.
In some embodiments, the obtaining the dynamic identifier of the target node according to the static identifier of the target node includes: and acquiring the dynamic identifier of the user terminal from the user plane equipment of the user terminal according to the static identifier of the user terminal.
In some embodiments, the obtaining, according to the static identifier of the user terminal, the dynamic identifier of the user terminal from the user plane device of the user terminal includes:
sending a first subscription message carrying a static identifier of the user terminal to user plane equipment of the user terminal;
receiving a first publishing message sent by the user plane equipment, and acquiring a dynamic identifier of the user terminal carried in the first publishing message; and the dynamic identifier of the user terminal is obtained by the user plane equipment according to the static identifier of the user terminal and a second mapping relation between the static identifier and the dynamic identifier of the user terminal, wherein the second mapping relation is established after the user plane equipment receives a Protocol Data Unit (PDU) session request sent by the user terminal.
In some embodiments, the determining that the dynamic identifier of the target node is updated includes:
receiving a second release message sent by user plane equipment of the user terminal, and acquiring a dynamic identifier of the user terminal carried in the second release message;
and determining that the dynamic identifier of the user terminal is updated in response to the fact that the obtained dynamic identifier of the user terminal is different from the obtained dynamic identifier of the user terminal in the previous time.
In some embodiments, the sending the second access request message carrying the dynamic identifier to the target node includes: sending a second access request message carrying the dynamic identifier to the user terminal through user plane equipment of the user terminal;
the receiving a second access response message includes: and receiving a second access response message sent by the user terminal through the user plane equipment.
In some embodiments, the obtaining the dynamic identifier of the target node according to the static identifier of the target node includes: and acquiring the dynamic identification of the CPE from the CPE according to the static identification of the CPE.
In some embodiments, obtaining the dynamic identifier of the CPE from the CPE according to the static identifier of the CPE includes:
sending a second subscription message carrying the static identifier of the CPE to the CPE;
receiving a third release message sent by the CPE, and acquiring a dynamic identifier of the CPE carried in the third release message; and the dynamic identification of the CPE is obtained by the CPE according to the static identification of the CPE and a third mapping relation between the static identification and the dynamic identification of the CPE, wherein the third mapping relation is established after the CPE registers in a core network and obtains the dynamic identification.
In some embodiments, the determining that the dynamic identity of the target node is updated includes:
receiving a fourth release message sent by the CPE, and acquiring a dynamic identifier of the CPE carried in the fourth release message;
and determining that the dynamic identifier of the CPE is updated in response to the fact that the obtained dynamic identifier of the CPE is different from the obtained dynamic identifier of the CPE at the previous time.
In some embodiments, one or any combination of the following messages are transmitted in an encrypted manner:
the first subscription message and the first publish message, the second subscription message and the third publish message, the fourth publish message.
In yet another aspect, embodiments of the present disclosure also provide a multi-access edge computing device, including a receiving module, a first processing module, and a sending module,
the receiving module is used for receiving a first access request message sent by an access initiating node and acquiring a multi-edge computing MEC node identifier of a target node carried in the first access request message; receiving a second access response message, acquiring the dynamic identifier of the target node carried in the second access response message, wherein the second access response message is generated by the target node after receiving the second access request message;
the first processing module is used for determining a dynamic identifier corresponding to the MEC node identifier of the target node according to a first mapping relation between the MEC node identifier and the dynamic identifier; determining an MEC node identifier corresponding to the dynamic identifier of the target node according to the first mapping relation;
the sending module is used for sending a second access request message carrying the dynamic identifier of the target node to the target node; and sending a first access response message carrying the MEC node identifier to the access initiating node.
In another aspect, an embodiment of the present disclosure further provides an electronic device, including:
one or more processors;
a storage device having one or more programs stored thereon;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the multiple access edge compute node access method as previously described.
In yet another aspect, the disclosed embodiments also provide a computer readable medium, on which a computer program is stored, wherein the program, when executed, implements the multiple access edge computing node access method as described above.
The embodiment of the disclosure provides a multi-access edge computing node access method, when receiving a first access request message sent by an access initiating node, determining a corresponding dynamic identifier according to a first mapping relation between an MEC node identifier and the dynamic identifier and an MEC node identifier of a target node carried in the first access request message, and sending a second access request message carrying the dynamic identifier to the target node; and when receiving the second access response message, determining a corresponding MEC node identifier according to the dynamic identifier of the target node carried in the second access response message and the first mapping relation, and sending the first access response message carrying the MEC node identifier to the access initiating node. According to the method and the device, the first mapping relation between the MEC node identification and the dynamic identification is established, the first mapping relation changes along with the change of the dynamic identification of the target node, the access initiating node can be an edge application server of an enterprise or a CPE of a user terminal, the target node can be the user terminal or the CPE of the user terminal, and when the access initiating node initiates an access request to the target node, the current dynamic identification of the target node can be determined based on the first mapping relation, so that the target node can be accurately found, and the access of the access initiating node to the target node is realized.
Drawings
Fig. 1 is a signaling flow diagram of a node access method of multi-access edge computing according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of establishing a first mapping relationship according to an embodiment of the present disclosure;
fig. 3 is a signaling flow diagram for acquiring UE-DI provided by an embodiment of the present disclosure;
fig. 4 is a signaling flow diagram for updating UE-DI provided by an embodiment of the present disclosure;
fig. 5 is a signaling flow diagram for acquiring CPE-DI provided by an embodiment of the present disclosure;
fig. 6 is a signaling flow diagram for updating CPE-DI provided by an embodiment of the present disclosure;
fig. 7 is a first schematic structural diagram of a multi-access edge computing device according to an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of a multi-access edge computing device according to an embodiment of the present disclosure;
fig. 9 is a schematic structural diagram three of a multi-access edge computing device according to an embodiment of the present disclosure.
Detailed Description
Example embodiments will be described more fully hereinafter with reference to the accompanying drawings, but which may be embodied in different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," 8230; \8230 "; when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Embodiments described herein may be described with reference to plan and/or cross-sectional views in idealized representations of the present disclosure. Accordingly, the example illustrations can be modified in accordance with manufacturing techniques and/or tolerances. Accordingly, the embodiments are not limited to the embodiments shown in the drawings, but include modifications of configurations formed based on a manufacturing process. Thus, the regions illustrated in the figures have schematic properties, and the shapes of the regions shown in the figures illustrate specific shapes of regions of elements, but are not intended to be limiting.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and the present disclosure, and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The embodiment of the present disclosure provides a node access method for multi-access edge computing, as shown in fig. 1, the node access method for multi-access edge computing includes the following steps:
and step 11, receiving a first access request message sent by an access initiating node, and acquiring the MEC node identifier of the target node carried in the first access request message.
In the embodiment of the present disclosure, the access initiating node may be an edge application server or a CPE (i.e., CPE-B) of one user terminal (e.g., user terminal B), the target node may be another user terminal (e.g., user terminal a, i.e., UE-a) or a CPE (e.g., CPE-a) of another user terminal, in a scenario that the edge application accesses the user terminal application, the access initiating node is an edge application server, and the target node is UE-a or CPE-a; in the scene of mutual access between user terminals or between CPEs, the access initiating node is CPE-B, and the target node is UE-A or CPE-A.
In this step, the multi-access edge computing device receives a first access request message sent by an access initiating node, and obtains an MEC node identifier carried in the first access request message, where the MEC node identifier is a fixed identifier, that is, the MEC node identifiers of the same target node do not change.
And step 12, determining the dynamic identifier corresponding to the MEC node identifier of the target node according to the first mapping relation between the MEC node identifier and the dynamic identifier.
In the embodiment of the present disclosure, a first mapping relationship between an MEC node identifier and a dynamic identifier is stored in a multi-access edge computing device, the MEC node identifier is allocated to a node by the multi-access edge computing device, and the Dynamic Identifier (DI) is allocated by a core Network according to subscription information of the node in the core Network after the node is accessed to the multi-access edge computing Network, where the dynamic identifier at the same stage may be changed, and the dynamic identifier may be an IP address or a VPN (Virtual Private Network) tunnel identifier. Taking an IP address as an example, the core network defines an address pool according to attributes such as subscription information of the mobile terminal and a network area, and each time the user terminal restarts or reattaches the network, the core network dynamically selects an address from the address pool to allocate to the user terminal.
In this step, the multi-access edge computing device queries the first mapping relationship according to the MEC node identifier of the target node obtained in step 11, and obtains a dynamic identifier of the corresponding target node.
And step 13, sending a second access request message carrying the dynamic identifier of the target node to the target node.
In this step, the multi-access edge computing device sends a second access request message to the target node, where the second access request message carries the dynamic identifier obtained in step 12.
And step 14, receiving the second access response message, and acquiring the dynamic identifier of the target node carried in the second access response message.
The second access response message is generated by the target node after receiving the second access request message. It should be noted that the target node may directly interact with the multi-edge computing device, or may interact with the multi-edge computing device through other devices.
And step 15, determining the MEC node identifier corresponding to the dynamic identifier of the target node according to the first mapping relation.
In this step, the multi-access edge computing device queries the first mapping relationship according to the dynamic identifier of the target node obtained in step 14, so as to obtain a corresponding MEC node identifier.
And step 16, sending a first access response message carrying the MEC node identifier to the access initiating node.
When a first access request message sent by an access initiating node is received, determining a corresponding dynamic identifier according to a first mapping relation between an MEC node identifier and the dynamic identifier and an MEC node identifier of a target node carried in the first access request message, and sending a second access request message carrying the dynamic identifier to the target node; and when receiving the second access response message, determining a corresponding MEC node identifier according to the dynamic identifier of the target node carried in the second access response message and the first mapping relation, and sending the first access response message carrying the MEC node identifier to the access initiating node. According to the method and the device, the first mapping relation between the MEC node identification and the dynamic identification is established, the first mapping relation changes along with the change of the dynamic identification of the target node, the access initiating node can be an edge application server of an enterprise or a CPE of a user terminal, the target node can be the user terminal or the CPE of the user terminal, and when the access initiating node initiates an access request to the target node, the current dynamic identification of the target node can be determined based on the first mapping relation, so that the target node can be accurately found, and the access of the access initiating node to the target node is realized.
In some embodiments, the node access method of multi-access edge computing further includes establishing a first mapping relationship, as shown in fig. 2, where the establishing the first mapping relationship includes the following steps:
and step 21, acquiring the dynamic identifier of the target node according to the static identifier of the target node.
The Static Identity (SI) of the target node is used to represent the inherent property of the target node, and the static identity is a fixed identity, that is, the static identity of the same target node does not change.
In some embodiments, the static identification may be an MSISDN (Mobile Subscriber International ISDN number), IMSI (International Mobile Subscriber Identity), or the like.
In this step, according to different types of the target node (the target node may be a user terminal or a CPE), the obtaining manner of the dynamic identifier of the target node is different, and the following descriptions are respectively provided.
And step 22, distributing MEC node identification to the target node. In this step, the multi-access edge computing device allocates an MEC node identifier to the target node.
And step 23, establishing a first mapping relation of the target node according to the dynamic identifier and the MEC node identifier.
In this step, the multi-access edge computing device establishes a first mapping relationship of the target node according to the dynamic identifier of the target node obtained in step 21 and the MEC node identifier allocated to the target node in step 22, and locally stores the first mapping relationship, so that the MEC node identifier is determined to be a correct dynamic identifier according to the first mapping relationship when the multi-access edge computing node is subsequently accessed, and the target node is accurately positioned.
It should be noted that, here, a process of establishing a first mapping relationship for a target node is described as an example, and for other nodes in the multi-access edge computing network, corresponding first mapping relationships need to be respectively established according to the above manner, so as to implement mutual access between nodes in the multi-access edge computing network.
Because the dynamic identifier is not fixed and unchangeable, when the dynamic identifier changes, the corresponding first mapping relation is also updated correspondingly so as to ensure the correctness of the access of the multi-access edge computing node. Therefore, in some embodiments, the node access method of multi-access edge computing further includes the following steps: and in response to the fact that the dynamic identification of the target node is determined to be updated, updating the first mapping relation of the target node according to the updated dynamic identification.
It should be noted that, when the target node is a user terminal, the multi-access edge computing device and the user terminal may interact with each other through the user plane device. That is to say, the sending the second access request message carrying the dynamic identifier to the target node (i.e. step 13) includes: and sending a second access request message carrying the dynamic identifier to the user terminal through the user plane equipment of the user terminal. Said receiving a second access response message (i.e. step 14) comprises: and receiving a second access response message sent by the user terminal through the user plane equipment.
The following describes the flow of acquiring the dynamic identifier and the flow of updating the dynamic identifier in detail, respectively, for two cases, that is, the target node is the user terminal and the CPE. Fig. 3 and 4 are scenarios in which the target node is a user terminal, and fig. 5 and 6 are scenarios in which the target node is a CPE.
When the target node is a user terminal, the obtaining a dynamic identifier of the target node according to the static identifier of the target node (i.e. step 21) includes: and acquiring the dynamic identification (UE-DI) of the user terminal from the user plane equipment of the user terminal according to the static identification (UE-SI) of the user terminal. In some embodiments, the User plane device may be a gateway device (GW-U) or a User Port Function (UPF).
In the embodiment of the present disclosure, the multi-access edge computing device obtains the dynamic identifier of the user terminal from the user plane device by establishing an interface with the user plane device.
Fig. 3 is a signaling flowchart for acquiring a dynamic identifier (UE-DI) of a user terminal according to an embodiment of the present disclosure, and as shown in fig. 3, when the user terminal registers in a core network, the core network allocates the dynamic identifier to the user terminal, the user terminal sends a PDU (Protocol Data Unit) session request to a user plane device, and the user plane device acquires the dynamic identifier (UE-DI) of the user terminal carried therein and establishes a second mapping relationship between a static identifier (UE-SI) of the user terminal and the dynamic identifier (UE-DI).
As shown in fig. 3, the obtaining the dynamic identifier of the user terminal from the user plane device of the user terminal according to the static identifier of the user terminal includes the following steps:
step 31, the multi-access edge computing device sends a first subscription message carrying the static identifier of the user terminal to the user plane device of the user terminal.
And step 32, the user plane equipment determines the dynamic identifier of the user terminal according to the static identifier of the user terminal and the second mapping relation between the static identifier and the dynamic identifier of the user terminal.
In this step, the user plane device locally queries the second mapping relationship according to the static identifier of the user terminal, and obtains the dynamic identifier of the corresponding user terminal.
And step 33, the multi-access edge computing device receives the first publishing message sent by the user plane device, and acquires the dynamic identifier of the user terminal carried in the first publishing message.
An interface is established between the multi-access edge computing device and the user plane device, and the dynamic identification of the user terminal is obtained by interacting the first subscription message and the first release message.
Fig. 4 is a signaling flowchart of updating a dynamic identifier (UE-DI) of a user equipment according to an embodiment of the present disclosure, and as shown in fig. 4, after a core network reallocates the dynamic identifier (UE-DI ') to the user equipment, the user equipment sends a PDU session request to a user plane device, and after the user plane device acquires the dynamic identifier (UE-DI ') of the reallocated user equipment carried therein, the user plane device actively triggers to send the reallocated dynamic identifier (UE-DI ') to a multi-access edge computing device. It should be noted that the user plane device also locally updates the second mapping relationship according to the dynamic identity (UE-DI') of the re-allocated UE.
As shown in fig. 4, the determining that the dynamic identifier of the target node is updated includes the following steps:
and step 41, receiving a second release message sent by the user plane device of the user terminal, and acquiring the dynamic identifier of the user terminal carried in the second release message.
The dynamic identifier of the UE obtained in this step is the dynamic identifier (UE-DI') of the reallocated UE obtained by the UE from the PDU session request.
And step 42, determining that the dynamic identifier of the user terminal is updated in response to that the dynamic identifier of the user terminal acquired this time is different from the dynamic identifier of the user terminal acquired last time.
It should be noted that, after it is determined that the dynamic identifier of the UE is updated, the first mapping relationship is also updated accordingly, that is, the dynamic identifier of the UE in the first mapping relationship is updated to the dynamic identifier (UE-DI') of the UE obtained in step 41.
When the multi-access edge computing device is deployed in a non-trusted network area, in order to protect data transmission security of a static identity (UE-SI) and a dynamic identity (UE-DI) of a user terminal transmitted between the user plane device and the multi-access edge computing device, in the embodiment of the present disclosure, a message for acquiring a dynamic identity of the user terminal transmitted between the user plane device and the multi-access edge computing device is transmitted in an encrypted manner. That is, the first subscription message and the first publish message are transmitted in an encrypted manner, or the second publish message is transmitted in an encrypted manner, or the first subscription message, the first publish message and the second publish message are transmitted in an encrypted manner.
In some embodiments, the interface between the user plane device and the multi-access edge computing device enables IPSec (Internet Protocol Security) or SSL (Secure Sockets Layer) encrypted transmissions.
When the target node is the CPE, in the scenario of the user plane device of the core network of a different manufacturer, it is difficult for the multi-access edge computing device to establish an interface with the user plane devices of different manufacturers, and an interface may be established between the CPE and the multi-access edge computing device, so that the multi-access edge computing device directly obtains the dynamic identifier of the CPE from the CPE.
When the target node is a CPE, the obtaining a dynamic identifier of the target node according to the static identifier of the target node (i.e., step 21) includes: a dynamic identification of the CPE (CPE-DI) is obtained from the CPE according to the CPE-SI.
Fig. 5 is a signaling flowchart for acquiring a dynamic identity (CPE-DI) of a CPE according to an embodiment of the present disclosure, where as shown in fig. 5, when the CPE registers with a core network, the core network allocates the dynamic identity to the CPE, and the CPE locally establishes a third mapping relationship between a static identity (CPE-SI) and the dynamic identity (CPE-DI) of the CPE.
As shown in fig. 5, the acquiring a dynamic identifier of a CPE from a CPE according to a static identifier of the CPE includes the following steps:
step 51, the multi-access edge computing device sends a second subscription message carrying the static identifier of the CPE to the CPE.
And step 52, the CPE determines the dynamic identification of the CPE according to the static identification of the CPE and a third mapping relation between the static identification and the dynamic identification of the CPE.
In this step, the CPE queries the third mapping relationship locally according to the static identifier of the CPE to obtain a dynamic identifier of the corresponding CPE.
And step 53, the multi-access edge computing device receives the third release message sent by the CPE, and acquires the dynamic identifier of the CPE carried in the third release message.
An interface is established between the multi-access edge computing device and the CPE, and the dynamic identification of the CPE is obtained by interacting the second subscription message and the third release message, so that the first mapping relation is established and stored in the multi-access edge computing device, and the problem that the edge application in the multi-access edge computing network accesses the CPE terminal through CPE-DI can be solved.
Fig. 6 is a signaling flow diagram for updating a dynamic identifier of a CPE (CPE-DI), according to an embodiment of the present disclosure, as shown in fig. 6, after a core network reassigns the dynamic identifier of the CPE (CPE-DI') to the CPE, the CPE actively triggers sending of the reassigned dynamic identifier to a multi-access edge computing device. It should be noted that the CPE also locally updates the third mapping relationship according to the dynamic identification of the reallocated CPE (CPE-DI').
As shown in fig. 6, the determining that the dynamic identifier of the target node is updated includes the following steps:
and step 61, receiving a fourth release message sent by the CPE, and acquiring the dynamic identifier of the CPE carried therein.
The dynamic identifier of the CPE obtained in this step is a dynamic identifier (CPE-DI') of the CPE reallocated to the CPE by the core network.
And step 62, determining that the dynamic identifier of the CPE is updated in response to that the dynamic identifier of the CPE obtained this time is different from the dynamic identifier of the CPE obtained last time.
It should be noted that, after it is determined that the dynamic identifier of the CPE is updated, the first mapping relationship is also updated correspondingly, that is, the dynamic identifier of the CPE in the first mapping relationship is updated to the dynamic identifier (CPE-DI') of the CPE obtained in step 61.
To secure data transmission between a CPE and a multi-access edge computing device that transmits a static identification (CPE-SI) and a dynamic identification (CPE-DI) of the CPE, in an embodiment of the disclosure, messages transmitted between the CPE and the multi-access edge computing device to obtain the dynamic identification of the CPE are transmitted in an encrypted manner. That is, the second subscription message and the third publish message are transmitted in an encrypted manner, or the fourth publish message is transmitted in an encrypted manner, or the second subscription message, the third publish message and the fourth publish message are transmitted in an encrypted manner.
In some embodiments, the interface between the CPE and the multi-access edge computing device enables IPSec (Internet Protocol Security) or SSL (Secure Sockets Layer) encrypted transmissions.
According to the method and the device for controlling the dynamic address of the target node, the first mapping relation between the MEC node identification and the dynamic identification is established, when the access initiating node initiates an access request to the target node, the current dynamic identification of the target node can be determined based on the first mapping relation, so that the target node is accurately found, the control problem of the dynamic address of an operator in a multi-access edge computing platform is solved, and a solution is provided for multi-access edge computing in industry application.
Based on the same technical concept, an embodiment of the present disclosure further provides a multi-access edge computing device, as shown in fig. 7, where the multi-access edge computing device includes a receiving module 101, a first processing module 102, and a sending module 103, and the receiving module 101 is configured to receive a first access request message sent by an access initiating node, and obtain a multi-edge computing MEC node identifier of a target node carried in the first access request message; and receiving a second access response message, acquiring the dynamic identifier of the target node carried in the second access response message, wherein the second access response message is generated by the target node after receiving the second access request message.
The first processing module 102 is configured to determine, according to a first mapping relationship between the MEC node identifier and the dynamic identifier, a dynamic identifier corresponding to the MEC node identifier of the target node; and determining the MEC node identifier corresponding to the dynamic identifier of the target node according to the first mapping relation.
The sending module 103 is configured to send a second access request message carrying the dynamic identifier to the target node; and sending a first access response message carrying the MEC node identifier to the access initiating node.
In some embodiments, as shown in fig. 8, the multi-access edge computing device further includes a second processing module 104, where the second processing module 104 is configured to obtain a dynamic identifier of the target node according to a static identifier of the target node, where the static identifier of the target node is used to represent an inherent attribute of the target node; distributing MEC node identification to the target node; and establishing a first mapping relation of the target node according to the dynamic identifier and the MEC node identifier.
In some embodiments, as shown in fig. 9, the multi-access edge computing device further includes an updating module 105, and the updating module 105 is configured to, in response to determining that the dynamic identifier of the target node is updated, update the first mapping relationship of the target node according to the updated dynamic identifier.
In some embodiments, the target node is a user terminal, and the second processing module 104 is configured to obtain a dynamic identifier of the user terminal from a user plane device of the user terminal according to the static identifier of the user terminal.
In some embodiments, the second processing module 104 is configured to send a first subscription message carrying a static identifier of the user terminal to a user plane device of the user terminal; receiving a first publishing message sent by the user plane equipment, and acquiring a dynamic identifier of the user terminal carried in the first publishing message; and the dynamic identifier of the user terminal is obtained by the user plane equipment according to the static identifier of the user terminal and a second mapping relation between the static identifier and the dynamic identifier of the user terminal, wherein the second mapping relation is established after the user plane equipment receives a Protocol Data Unit (PDU) session request sent by the user terminal.
In some embodiments, the updating module 105 is configured to receive a second release message sent by the user plane device of the user terminal, and acquire a dynamic identifier of the user terminal carried in the second release message; and determining that the dynamic identifier of the user terminal is updated in response to the fact that the obtained dynamic identifier of the user terminal is different from the obtained dynamic identifier of the user terminal in the previous time.
In some embodiments, the sending module 103 is configured to send, to the user terminal, a second access request message carrying the dynamic identifier through a user plane device of the user terminal.
The receiving module 101 is configured to receive a second access response message sent by the user terminal through the user plane device.
In some embodiments, the target node is a customer premises equipment CPE, and the second processing module 104 is configured to obtain a dynamic identifier of the CPE from the CPE according to a static identifier of the CPE.
In some embodiments, the second processing module 104 is configured to send a second subscription message carrying a static identifier of the CPE to the CPE; receiving a third release message sent by the CPE, and acquiring a dynamic identifier of the CPE carried in the third release message; and the dynamic identification of the CPE is obtained by the CPE according to the static identification of the CPE and a third mapping relation between the static identification and the dynamic identification of the CPE, wherein the third mapping relation is established after the CPE registers in a core network and obtains the dynamic identification.
In some embodiments, the updating module 105 is configured to receive a fourth release message sent by the CPE, and acquire a dynamic identifier of the CPE, where the dynamic identifier is carried in the fourth release message; and determining that the dynamic identifier of the CPE is updated in response to the fact that the obtained dynamic identifier of the CPE is different from the obtained dynamic identifier of the CPE at the previous time.
In some embodiments, one or any combination of the following messages are transmitted in an encrypted manner:
the first subscription message and the first publish message, the second subscription message and the third publish message, the fourth publish message.
An embodiment of the present disclosure further provides an electronic device, including: one or more processors and storage; the storage device stores one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors implement the PDU session binding relationship processing method provided in the foregoing embodiments.
The disclosed embodiment also provides a computer readable medium, on which a computer program is stored, where the computer program, when executed, implements the PDU session binding relationship processing method provided in the foregoing embodiments.
It will be understood by those of ordinary skill in the art that all or some of the steps of the methods, functional modules/units in the apparatus, disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as is well known to those skilled in the art.
Example embodiments have been disclosed herein, and although specific terms are employed, they are used and should be interpreted in a generic and descriptive sense only and not for purposes of limitation. In some instances, features, characteristics and/or elements described in connection with a particular embodiment may be used alone or in combination with features, characteristics and/or elements described in connection with other embodiments, unless expressly stated otherwise, as would be apparent to one skilled in the art. It will, therefore, be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the invention encompassed by the appended claims.

Claims (14)

1. A node access method for multi-access edge computing, the method comprising:
receiving a first access request message sent by an access initiating node, and acquiring a multi-edge computing MEC node identifier of a target node carried in the first access request message;
determining a dynamic identifier corresponding to the MEC node identifier of the target node according to a first mapping relation between the MEC node identifier and the dynamic identifier, and sending a second access request message carrying the dynamic identifier of the target node to the target node;
receiving a second access response message, acquiring the dynamic identifier of the target node carried in the second access response message, wherein the second access response message is generated by the target node after receiving the second access request message;
and determining an MEC node identifier corresponding to the dynamic identifier of the target node according to the first mapping relation, and sending a first access response message carrying the MEC node identifier to the access initiating node.
2. The method of claim 1, further comprising establishing the first mapping relationship, the establishing the first mapping relationship comprising:
acquiring a dynamic identifier of the target node according to the static identifier of the target node, wherein the static identifier of the target node is used for representing the inherent attribute of the target node;
distributing MEC node identification to the target node;
and establishing a first mapping relation of the target node according to the dynamic identifier and the MEC node identifier.
3. The method of claim 2, wherein the method further comprises:
and in response to the fact that the dynamic identification of the target node is determined to be updated, updating the first mapping relation of the target node according to the updated dynamic identification.
4. The method of claim 3, wherein the target node is a user terminal, and the obtaining the dynamic identifier of the target node according to the static identifier of the target node comprises: and acquiring the dynamic identifier of the user terminal from the user plane equipment of the user terminal according to the static identifier of the user terminal.
5. The method of claim 4, wherein the obtaining the dynamic identifier of the user terminal from the user plane device of the user terminal according to the static identifier of the user terminal comprises:
sending a first subscription message carrying a static identifier of the user terminal to user plane equipment of the user terminal;
receiving a first publishing message sent by the user plane equipment, and acquiring a dynamic identifier of the user terminal carried in the first publishing message; and the dynamic identifier of the user terminal is obtained by the user plane equipment according to the static identifier of the user terminal and a second mapping relation between the static identifier and the dynamic identifier of the user terminal, wherein the second mapping relation is established after the user plane equipment receives a Protocol Data Unit (PDU) session request sent by the user terminal.
6. The method of claim 5, wherein said determining that the dynamic identity of the target node is updated comprises:
receiving a second release message sent by user plane equipment of the user terminal, and acquiring a dynamic identifier of the user terminal carried in the second release message;
and determining that the dynamic identifier of the user terminal is updated in response to the fact that the obtained dynamic identifier of the user terminal is different from the obtained dynamic identifier of the user terminal in the previous time.
7. The method as claimed in claim 4, wherein said sending a second access request message carrying said dynamic identifier to said target node comprises: sending a second access request message carrying the dynamic identifier to the user terminal through user plane equipment of the user terminal;
the receiving a second access response message includes: and receiving a second access response message sent by the user terminal through the user plane equipment.
8. The method of claim 3, wherein the target node is a Customer Premises Equipment (CPE), and wherein the obtaining the dynamic identification of the target node based on the static identification of the target node comprises: and acquiring the dynamic identification of the CPE from the CPE according to the static identification of the CPE.
9. The method of claim 8, wherein obtaining the dynamic identification of the CPE to the CPE based on the static identification of the CPE comprises:
sending a second subscription message carrying the static identifier of the CPE to the CPE;
receiving a third release message sent by the CPE, and acquiring a dynamic identifier of the CPE carried in the third release message; and the dynamic identification of the CPE is obtained by the CPE according to the static identification of the CPE and a third mapping relation between the static identification and the dynamic identification of the CPE, wherein the third mapping relation is established after the CPE registers in a core network and obtains the dynamic identification.
10. The method of claim 9, wherein said determining that the dynamic identity of the target node is updated comprises:
receiving a fourth release message sent by the CPE, and acquiring a dynamic identifier of the CPE carried in the fourth release message;
and determining that the dynamic identification of the CPE is updated in response to the fact that the obtained dynamic identification of the CPE at this time is different from the obtained dynamic identification of the CPE at the previous time.
11. The method according to claim 6 or 10, characterized in that one or any combination of the following messages are transmitted in an encrypted manner:
the first subscription message and the first publish message, the second subscription message and the third publish message, the fourth publish message.
12. A multi-access edge computing device comprising a receiving module, a first processing module, and a sending module,
the receiving module is used for receiving a first access request message sent by an access initiating node and acquiring a multi-edge computing MEC node identifier of a target node carried in the first access request message; receiving a second access response message, acquiring the dynamic identifier of the target node carried in the second access response message, wherein the second access response message is generated by the target node after receiving the second access request message;
the first processing module is used for determining a dynamic identifier corresponding to the MEC node identifier of the target node according to a first mapping relation between the MEC node identifier and the dynamic identifier; determining an MEC node identifier corresponding to the dynamic identifier of the target node according to the first mapping relation;
the sending module is used for sending a second access request message carrying the dynamic identifier of the target node to the target node; and sending a first access response message carrying the MEC node identifier to the access initiating node.
13. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the multiple access edge computing node access method of any of claims 1-11.
14. A computer readable medium having stored thereon a computer program, wherein said program when executed implements a multiple access edge computing node access method according to any of claims 1-11.
CN202110510597.4A 2021-05-11 2021-05-11 Multi-access edge computing node access method, device, electronic equipment and medium Pending CN115334034A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110510597.4A CN115334034A (en) 2021-05-11 2021-05-11 Multi-access edge computing node access method, device, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110510597.4A CN115334034A (en) 2021-05-11 2021-05-11 Multi-access edge computing node access method, device, electronic equipment and medium

Publications (1)

Publication Number Publication Date
CN115334034A true CN115334034A (en) 2022-11-11

Family

ID=83912674

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110510597.4A Pending CN115334034A (en) 2021-05-11 2021-05-11 Multi-access edge computing node access method, device, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN115334034A (en)

Similar Documents

Publication Publication Date Title
CN109842906B (en) Communication method, device and system
CN109315004B (en) PDU type setting method and related entity
US8626921B2 (en) Device and service management based on layer 2 through layer 7 device attributes
CN115442423A (en) Method for discovering services provided by a network repository function
CN110602724B (en) Network configuration method and communication device
US11218956B2 (en) Network management method and system
US11310318B2 (en) Method and apparatus for zero-touch bulk identity assignment, provisioning and network slice orchestration for massive IoT (MIoT) deployments
CN114025021B (en) Communication method, system, medium and electronic equipment crossing Kubernetes cluster
JP2023535562A (en) Method, system and computer readable medium for providing network capability discovery service enhancement
CN112688814B (en) Equipment access method, device, equipment and machine readable storage medium
CN114157579A (en) Method and device for accessing gateway
CN114745724B (en) Access processing method and device, electronic equipment and computer readable medium
US20230336377A1 (en) Packet forwarding method and apparatus, and network system
CN113037761A (en) Login request verification method and device, storage medium and electronic equipment
JP2023526843A (en) PORT STATE SETTING METHOD, APPARATUS AND SYSTEM, AND STORAGE MEDIUM
CN110621051B (en) Routing method and device
WO2023229855A1 (en) Methods, systems, and computer readable media for utilizing network function (nf) service attributes associated with registered nf service producers in a hierarchical network
CN115334034A (en) Multi-access edge computing node access method, device, electronic equipment and medium
WO2017147840A1 (en) Message routing method and device, and diameter routing entity
JP2023541662A (en) Data steering method and device
CN113810900A (en) Network access method, electronic device and storage medium
US20230006998A1 (en) Management of private networks over multiple local networks
CN112565937A (en) Method, device and system for selecting BNG-UP device
WO2023116356A1 (en) Information configuration method and apparatus, and related devices and storage medium
US20230385139A1 (en) Network api credentials within a translation session

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination