![]() specific network slice access restriction for wireless networks
专利摘要:
One technique includes detecting, by a user device, a network slice associated with an attempted access by the user device to access a wireless network, and making, by the user device, a restriction decision for attempted access with based on the network slice associated with the access attempt. Another exemplary technique may include receiving, from a base station, one or more core network entities on a wireless network, specific network slice load information that indicates a load for each of one or more network slices, determining, by base station based on the received network slice specific load information, a restriction setting that indicates a set of restriction parameters for one or more access categories, and send, by the base station to a user device, the configuration of restriction to reduce a load on the wireless network. 公开号:BR112020002801A2 申请号:R112020002801-0 申请日:2018-08-02 公开日:2020-07-28 发明作者:Sung Hwan WON;Malgorzata Tomala;Betsy COVELL 申请人:Nokia Technologies Oy; IPC主号:
专利说明:
[001] [001] This description refers to communications. FUNDAMENTALS [002] [002] A communication system can be an installation that allows communication between two or more nodes or devices, such as fixed or mobile communication devices. The signals can be carried on wired or wireless carriers. [003] [003] An example of a cellular communication system is an architecture that is being standardized by the Third Generation Partnership Project (3GPP). A recent development in this field is often called the long-term evolution (LTE) of radio access technology in the Universal Mobile Telecommunications System (UMTS). E-UTRA (Enhanced UMTS Terrestrial Radio Access) is the aerial interface of the 3GPP LTE upgrade path for mobile networks. In LTE, base stations or access points (APs), called Enhanced Node APs (eNBs), provide wireless access in an area or coverage cell. In LTE, mobile devices or mobile stations are referred to as user equipment (UE). LTE included several improvements or developments. [004] [004] The lack of global bandwidth faced by wireless carriers motivated the consideration of the underutilized millimeter wave frequency spectrum (mm wave) for future broadband cellular communication networks, for example. The mm wave (or extremely high frequency) can, for example, include the frequency range between 30 and 300 gigahertz (GHz). The radio waves in this band can, for example, have wavelengths of ten to one millimeter, called a millimeter band or millimeter wave. The amount of wireless data is likely to increase significantly in the coming years. Several techniques have been used in an attempt to meet this challenge, including obtaining more spectrum, having smaller cell sizes, and using improved technologies that allow for more bits / s / Hz. An element that can be used to obtain more spectrum is to move to higher frequencies, for example, above 6 GHz. For fifth generation (5G) wireless systems, an access architecture for the deployment of radio equipment has been proposed using the mm wave radio spectrum. Other examples of spectra can also be used, such as the cm wave radio spectrum (for example, 3-30 GHz). [005] [005] In addition, 5G wireless networks can support network slicing, where a single physical network can be sliced across multiple virtual networks. Each network slice can include a set of logical network functions that can support the requirements of a particular use case. SUMMARY [006] [006] According to an implementation example, a method includes: detecting, by a user device, a network slice associated with an attempt by the user device to access a wireless network; and, by making, through the user device, a restriction decision for the access attempt based on the network slice associated with the access attempt. [007] [007] According to an implementation example, a device includes at least one processor and at least one memory including computer instructions that, when executed by at least one processor, make the device: detect, by a user device, a network slice associated with a user device access attempt to access a wireless network; and, make, by the user device, a restriction decision for the access attempt based on the network slice associated with the access attempt. [008] [008] According to an implementation example, a computer program product includes a computer-readable storage medium and storing executable code that, when executed by at least one data processing device, is configured to do at least a data processing apparatus performs a method including: detecting, by a user device, a network slice associated with an attempt by the user device to access a wireless network; and, by making, through the user device, a restriction decision for the access attempt based on the network slice associated with the access attempt. [009] [009] According to an implementation example, a method includes: receiving, by a base station from one or more core network entities in a wireless network, specific network slice load information that indicates a load for each of one or more slices of net; determine, by the base station based on the received network slice specific load information, a restriction setting that indicates a set of restriction parameters for one or more access categories; and send, through the base station to a user device, the restriction setting to reduce a load on the wireless network. [0010] [0010] According to an implementation example, a device includes at least one processor and at least one memory including computer instructions that, when executed by at least one processor, make the device: receive, by a base station from one or more core network entities within a wireless network, specific network slice charge information that indicates a charge for each of one or more network slices; determine, by the base station based on the received network slice specific load information, a restriction setting that indicates a set of restriction parameters for one or more access categories; and send, through the base station to a user device, the restriction setting to reduce a load on the wireless network. [0011] [0011] According to an implementation example, a computer program product includes a computer-readable storage medium and storing executable code that, when executed by at least one data processing device, is configured to do at least a data processing apparatus carrying out a method including: receiving, by a base station, from one or more core network entities within a wireless network, specific network slice charge information that indicates a charge for each of one or more network slices; determine, by the base station based on the received network slice specific load information, a restriction setting that indicates a set of restriction parameters for one or more access categories; and send, through the base station to a user device, the restriction setting to reduce a load on the wireless network. [0012] [0012] According to an implementation example, a method includes: determining, by a core network entity, specific network slice load information that indicates a load for each of one or more network slices; and sending, by the core network entity to a base station, the network slice-specific load information. [0013] [0013] According to an implementation example, a device includes at least one processor and at least one memory including computer instructions that, when executed by at least one processor, make the device: determine, by a core network entity, network slice specific load information that indicates a load for each of one or more network slices; and sending, by the core network entity to a base station, the network slice-specific load information. [0014] [0014] According to an implementation example, a computer program product includes a computer-readable storage medium and storing executable code that, when executed by at least one data processing device, is configured to do at least a data processing apparatus carrying out a method including: determining, by a core network entity, specific network slice load information that indicates a load for each of one or more network slices; and sending, by the core network entity to a base station, the network slice-specific load information. [0015] [0015] Details of one or more examples of implementations are set out in the attached drawings and in the description below. Other resources will be evident from the description, drawings and claims. BRIEF DESCRIPTION OF THE DRAWINGS [0016] [0016] Figure 1 is a block diagram of a wireless network according to an implementation example. [0017] [0017] Figure 2 is a diagram illustrating a specific network access restriction technique according to an implementation example. [0018] [0018] Figure 3 is a flow chart illustrating the operation of a user device according to an implementation example. [0019] [0019] Figure 4 is a flow chart illustrating the operation of a base station according to an implementation example. [0020] [0020] Figure 5 is a flow chart illustrating the operation of a core network entity according to an implementation example. [0021] [0021] Figure 6 is a diagram illustrating a network according to an implementation example. [0022] [0022] Figure 7 is a diagram illustrating a general procedure for restricting access for access attempts triggered by an upper layer according to an implementation example. [0023] [0023] Figure 8 is a diagram illustrating a general procedure for restricting access to access attempts triggered by the RRC layer according to an implementation example. [0024] [0024] Figure 9 is a diagram illustrating a procedure for a RAN node to define the restriction configuration to be broadcast according to an implementation example. [0025] [0025] Figure 10 diagram illustrating a specific network access restriction technique according to another implementation example. [0026] [0026] Figure 11 is a block diagram of a wireless node or station (for example, base station / access point, relay node or mobile station / user device) according to an implementation example. DETAILED DESCRIPTION [0027] [0027] Figure 1 is a block diagram of a wireless network 130 according to an implementation example. On the wireless network 130 in Figure 1, user devices 131, 132, 133 and 135, which can also be called mobile stations (MSs) or user equipment (UEs), can be connected (and in communication) to a base station (BS) 134, which can also be called an access point (AP), an enhanced B node (eNB), a gNB (which can be a 5G base station) or a network node. At least part of the functionality of an access point (AP), base station (BS) or (e) Node B (eNB) can also be performed by any node, server or host that can be operationally coupled to a transceiver, such as a remote radio header. BS (or AP) 134 provides wireless coverage within a cell 136, including user devices 131, 132, 133 and 135. Although only four user devices are shown as connected to or attached to BS 134, any number of devices user can be provided. BS 134 is also connected to a core network 150 through an interface 151. This is just a simple example of a wireless network, and others can be used. [0028] [0028] A user device (user terminal, user equipment (UE)) can refer to a portable computing device that includes wireless mobile communication devices operating with or without a subscriber identification module (SIM), including, but not limited to, the following types of devices: a mobile station (MS), a mobile phone, a cell phone, a smartphone, a personal digital assistant (PDA), a handset, a device using a wireless modem (wireless device) alarm or measurement, etc.), a laptop and / or computer with a touchscreen, a tablet, a phablet, a game console, a notebook and a multimedia device, as examples. It should be considered that a user device can also be an almost exclusive uplink only device, an example of which is a camera or video camera loading images or video clips over a network. [0029] [0029] In LTE (as an example), the core network 150 can be referred to as the Evolved Packet Core (EPC), which can include a mobility management entity (MME) that can manipulate or assist in the mobility / transfer of devices between BSs, one or more gateways that can forward data and control signals between BSs and packet data networks or the Internet, and other control functions or blocks. [0030] [0030] The various sample implementations can be applied to a wide variety of wireless technologies, wireless networks such as LTE, LTE-A, 5G (New Radio or NR) bandwidth, cm wave and / or mm wave or any other wireless network or use case. LTE bandwidth, 5G, cm wave and mm wave networks are provided as illustrative examples only and the various sample implementations can be applied to any wireless / wireless network technology. The various sample implementations can also be applied to a variety of different applications, services or use cases, such as low-latency, ultra-reliable communications (URLLC), Internet of Things (IoT), enhanced mobile broadband , mass machine type communications (MMTC), vehicle to vehicle (V2V), vehicle to device, etc. Each of these use cases or UE types can have its own set of requirements. [0031] [0031] In addition, 5G wireless networks can support network slicing, where a single physical network can be sliced across multiple virtual networks. Each network slice can include, for example, a set of logical network functions that can support the requirements of a particular use case. Network slicing can allow different treatment, depending on the requirements of different UEs or groups of UEs. With slicing (network slicing), an operator can create networks for optimized solutions based on different service requirements, QoS (quality of service), functionality, performance, etc. For example, a network slice may include, for example, a part of one or more network resources in one or more network entities, such as a part of, for example, one or more computational resources, memory resources, hardware resources, software or functional resources and / or other network resources in a BS and / or one or more core network entities, for example, which can support a group of UEs or support a particular use case. [0032] [0032] According to an implementation example, a UE and / or group of UEs, for example, with similar QoS requirements or running the same or similar application, providing a common feature or functionality, for a particular use case or another common aspect, they can support a network slice or can be allocated or assigned to a network slice, for example, where a network slice identifier (or slice identifier) can identify the network slice. However, different UEs (for example, different types of UEs) and / or each different group of UEs, which can be assigned to different network slices, may have different service requirements. According to an implementation example, different UEs and / or each of multiple groups of UEs can be assigned to a different network slice. [0033] [0033] In addition, a UE may have a number of different applications and / or data streams (e.g., protocol data unit sessions) that can generate and / or receive traffic or data. Therefore, a UE can be allocated to multiple network slices, for example, based on different types of traffic that can be transmitted to or from the UE, different applications running on a UE or different use cases that the UE can support. Therefore, a UE can be allocated or allowed to use a plurality of network slices. [0034] [0034] According to an implementation example, a slice can be identified by a slice identifier, which can include one or more of the following items: a type of slice / service (SST); a type of slice / service (SST) and slice differentiator (SD); and a single network slice selection assistance information (S-NSSAI). For example, an SST may indicate a type of service, such as a specific type of 5G wireless service, such as ultra-reliable low-latency communications (URLLC), Internet of Things (IoT), enhanced mobile broadband (eMBB), communications massive machine type (MMTC), etc. Thus, for example, a network slice can be allocated or associated with a specific type of service. A slice differentiator (SD) can further differentiate between different slices of the same type (for example, to allow differentiation between two URLLC network slices that can be assigned to different groups of URLLC UEs, for example). In addition, according to an implementation example, an S-NSSAI can be another type of slice identifier. According to an implementation example, an S-NSSAI = SST + [0035] [0035] As noted, each of the different types of wireless services (for example, URLLC, IoT, eMBB, mMTC) may have different requirements in terms of, for example, latency, QoS, minimum data rates, etc. As a result, in some cases, different wireless services / types of services (for example, URLLC, IoT, eMBB, mMTC) may be prioritized for services differently over a wireless network. Because each network slice may be associated with or allocated to a specific type of wireless service (for example, URLLC, IoT, eMBB, mMTC), this means that, at least in some cases, a wireless network may prioritize some slices network at the expense of other network slices. [0036] [0036] According to an implementation example, to acquire a radio connection, a user device (UE) can typically attempt to access the RAN (radio access network, which includes a BS). In the event that a BS and / or core network is overloaded (for example, many UEs that are using and / or trying to use network resources of the network and / or a threshold percentage (for example, 90% +) of the resources of network are being used and / or have been allocated), the access attempt by the UE may be restricted or prevented by the UE. If the access attempt by the UE is not restricted, the UE may, for example, send an RRC connection request (radio resource control) to a BS or radio access network entity, for example, to register and / or establish a connection (for example, RRC connection) to the network. [0037] [0037] Therefore, according to an implementation example, a network can impose access restrictions on UEs that are in Idle mode (for example, Idle RRC mode), for example, to prevent UEs from registering and / or establishing a RRC connection to the network. For example, a wireless network can broadcast (for example, through system information) a restriction configuration to one or more UEs. The restriction configuration can, for example, indicate whether the access restriction is being performed for one or more classes or categories of access. For example, each UE can receive an access class. In addition, each access attempt can be assigned an access category. The network (for example, BS) can broadcast a restriction configuration to one or more UEs that may include information indicating that access attempts associated with one or more access categories and / or access classes, for example, can be restricted and, if so, provide a set of restriction parameters for one or more of the classes and / or categories of access, for example. [0038] [0038] According to an implementation example, a set of restriction parameters can include, for example, a restriction rate (or restriction factor) and a restriction time (or restriction timer value). If access restriction is performed (for example, for an access class or access category), the UE can generate a random number. If the number is, for example, less than the restriction rate (also known as a restriction factor), the access attempt will not be restricted and the UE will be able to access the network by sending the RRC connection request. If, for example, the random number generated by the UE is greater than or equal to the restriction rate (or restriction factor), the access attempt will be restricted (at least temporarily), and the UE will not be able to send the RRC connection request on that moment, and the UE may again try to access the network again after the restriction timer expires (for example, the restriction timer can be initialized and start counting down when the random number of the UE is determined to be greater or equal to equal to the restriction rate, for example). Thus, after the restriction time, the UE can again try to access the network, generating another (one second) random number and determining whether that second random number is less than the restriction rate or the restriction factor. Obviously, the network can adjust a network load by adjusting one or more of the restriction parameters. For example, the network can adjust, for example, to increase or decrease the number or percentage of UEs successfully accessing the network by increasing the restriction rate / restriction factor or decreasing the restriction rate / restriction factor, for example. In addition, the network load can be adjusted by varying or adjusting the restriction time (for example, an increased restriction time can reduce the network load). [0039] [0039] However, the access restriction usually does not take into account different loads and / or priorities that can be applied or associated with different network slices (for example, associated with different types of service). Different network slices (or slice types) can have different loads. For example, a first network slice associated with or allocated to URLLC UEs may have a load of 90%, a second network slice associated with IoT UEs may have a load of 60%. According to an implementation example, it may be desirable to allow the network to decrease the overall load on the network by decreasing the load for the two network slices differently (for example, based on different sets of restriction parameters). Thus, for example, the network can set a restriction rate for IoT UEs (of the second slice of the network) at a restriction rate (or restriction factor) of 20% (for example, to restrict or prevent, on average, 80 % of IoT UEs access attempts), and set a restriction rate for URLLCLC UEs (from the first slice of the network) to 70% (for example, to restrict or prevent, on average, only 30% of URLLC access attempts ), for example, to prioritize attempts to access the URLLC instead of attempts to access IoT, reducing the network load, for example. [0040] [0040] Therefore, according to an implementation example, the network slice specific access restriction can be performed. For example, a UE can make a restriction decision for an access attempt based on a network slice associated with the access attempt. [0041] [0041] Figure 2 is a diagram illustrating a specific network access restriction technique according to an implementation example. At UE 132, BS 134 and a core network entity 150 are in communication, as shown. In 210, UE 132 detects a network slice associated with an access attempt by the UE. As noted, the UE can be assigned to or associated with one or more network slices, for example, a different network slice for each of the multiple 5G service types. UE 132 can detect which slice (s), for example, which application (s) or type (s) of service, is (are) generating the access attempt for the UE, for example. [0042] [0042] In 212, the core network entity 150 may send the UE 132 one or more access category filters that indicate an access category associated with one or more network slices. For example, access category filters can indicate: access category X for network slice # 1 (URLLC); and access category Y for network slice 2 (IoT). These are just a few illustrative examples of access category filters, which may allow the UE 132 to determine an access category for an access attempt based on the slice associated with the access attempt. As noted below, different access categories can be treated differently for restricting access, for example, in order to prioritize attempts to access certain slices over attempts to access other slices, for example. For example, access category X (for URLLC) can be prioritized (for example, a reduced amount of restriction for access category X) [0043] [0043] In 214, UE 132 can determine an access category for the access attempt based on the slice for the access attempt and the access category filters. [0044] [0044] At 216, the core network entity 150 may determine a specific slice network load (s) for each one or more network slices. The load can be measured or determined, for example, number of UEs, amount of traffic, percentage or amount of resources for the network slice that are used or allocated, etc. Thus, the core network entity 150 can separately determine a load for each of the one or more network slices. [0045] [0045] In 218, the core network entity 150 may send to BS 134 the slice specific load information for one or more network slices. [0046] [0046] In 220, BS 134 can determine, based on slice-specific load information, a restriction setting, for example, which can indicate for one or more access categories: whether the access category is subject to restriction and provide a set of restriction parameters for the access category (for example, a restriction rate or restriction factor and a restriction time, as described above). In addition, a constraint configuration can include a compensation factor to adjust (for example, reduce) a restriction on access attempts from inactive UEs. [0047] [0047] According to an implementation example, a UE can be Connected (and active); Idle (not connected) or Connected (connected to the core network entity), but Inactive (Idle Mode). In an example of Idle mode, the core network determines that the UE is connected and therefore does not radiolocate the Idle UE, but sends only any downlink data to the BS for delivery to the Idle UE. The BS can then radiolocate the UE Inactive to make the UE establish a connection (if it is not restricted to access) and receive the downlink data to the UE Inactive. According to an implementation example, a compensation factor can be used to adjust a restriction rate for inactive UEs. For example, the compensation factor can be provided and used by the UE in making a restriction decision that can provide fewer restricted access attempts for UEs in idle mode, compared to UEs in idle mode (for example, a lower rate restricting access attempts for UEs in idle mode, compared to a higher rate of restricting access attempts for UEs in idle mode, for example). [0048] [0048] In 222, the restriction configuration can be sent from BS 134 to UE 132. [0049] [0049] In 224, UE 132 may take a restriction decision for attempting to access the UE based on the network slice associated with the attempted access. For example, UE 132 can make a restriction decision based on the access category for the UE access category (which is based on the slice for the access attempt) and the restriction setting (for example, which can indicate whether the access restriction is being performed for that access category and / or provide a set of restriction parameters (for example, a restriction rate or restriction factor and a restriction time, and possibly a compensation factor for UEs in mode inactive to adjust the restriction decision making if the UE is in an inactive mode) for the access category that can provide parameters for the UE to make the access restriction decision for attempting access to the UE. [0050] [0050] For example, UE 132 can generate a random number and compare it with the received restriction rate or restriction factor. If the random number is less than (or alternatively, greater than) the restriction rate or the restriction factor, the access attempt is not restricted. If, on the other hand, the random number generated by the UE is greater than or equal to (or alternatively, less than or equal to) the restriction rate or the restriction factor, the attempt to access the UE will be (at least temporarily) restricted or prevented from occurring. [0051] [0051] In 226, if the UE access attempt is not restricted, then the UE can perform the access attempt (to access the network), for example, by sending an RRC connection request message to BS 134. If the access attempt is restricted, the UE can wait an amount of time based on the restriction time (a backoff time) and then can generate a second random number and compare it with the restriction rate or factor again to determine whether the second access attempt is also restricted. This process can continue, for example, with UE 132 repeatedly receiving an indication of an UE access attempt associated with a particular network slice and determining (for example, based on the slice associated with the access attempt and / or based on in the slice-specific restriction setting and / or slice-specific access category filters) whether the access attempt is restricted or not. [0052] [0052] Example 1: Figure 3 is a flow chart illustrating the operation of a user device according to an implementation example. Operation 310 includes the detection, by a user device, of a network slice or an application associated with an attempt by the user device to access a wireless network. Operation 320 includes determining, by the user device, an access category based on the detected network slice or the detected application. Operation 330 includes making, by the user device, a restriction decision for the access attempt based on the network slice associated with the access attempt. [0053] [0053] Example 2: According to an implementation example of example 1, in which the making of a restriction decision comprises: making, by the user device based on the network slice associated with the attempted access, that the access attempt is not restricted; and the method further comprises performing, by the user device based on the decision, the detected access attempt to the wireless network. [0054] [0054] Example 3: According to an example of implementation of any of examples 1-2, in which the performance of the detected access attempt comprises: sending, through the user's device, an RRC connection request message (RRC) to request a connection to the wireless network. [0055] [0055] Example 4: According to an example of implementation of any of examples 1-3, and further comprising: receiving, by the user device, one or more access category filters that indicate an access category associated with a or more slices or network applications; determine, by the user device, an access category for the access attempt based on the network or application slice associated with the access attempt and one or more access category filters; receive, by the user device, a restriction setting that indicates a set of restriction parameters for one or more of the access categories; and in which the making of a restriction decision comprises making, by the user device, a restriction decision for the access attempt based on the restriction configuration and the access category for the access attempt. [0056] [0056] Example 5: According to an implementation example of any of examples 1-4, in which the network slice associated with the access attempt comprises one or more of the following: a type of slice / service (SST); a type of slice / service (SST) and slice differentiator (SD); a single network slice selection assistance information (S-NSSAI). [0057] [0057] Example 6: According to an example of implementation of any of examples 1-5, in which the restriction configuration that indicates a set of restriction parameters for one or more of the access categories comprises a restriction configuration that indicates a set of restriction parameters for one or more of the access categories and one or more applications. [0058] [0058] Example 7: The method according to any of claims 1-6, wherein the application associated with the attempted access is identified by one or more of the following: operating system identity; and operating system application identity. [0059] [0059] Example 8: According to an implementation example of any of examples 1-7, where the restriction setting indicates a set of restriction parameters, including at least one restriction rate and a restriction timer, for a or more of the access categories. [0060] [0060] Example 9: According to an example of implementation of any of examples 1-8, and further comprising: receiving a compensation parameter for a user device in Idle mode; determine, by the user device, that the user device is in Idle mode; and where the making of a restriction decision comprises: applying, by the user device, the compensation parameter to the making of a restriction decision for the user device to adjust a restriction rate of the attempted access by the user device that is in Idle mode. [0061] [0061] Example 10: According to an implementation example of any of examples 1-9, in which the restriction configuration is based on a load information specific to the network slice that indicates a network load for each of one or more network slices. [0062] [0062] Example 11: According to an implementation example of any of examples 1-10, where the restriction setting that indicates a set of restriction parameters for one or more of the access categories provides or indicates a different prioritization than one or more access attempts based on the access categories of the access attempts. [0063] [0063] Example 12: Figure 4 is a flow chart illustrating the operation of a base station according to an implementation example. Operation 410 includes receiving, by a base station, from one or more core network entities within a wireless network, specific network slice charge information that indicates a charge for each of one or more network slices. Operation 420 includes determining, by the base station based on the received network slice specific load information, a restriction setting that indicates a set of restriction parameters for one or more access categories. Operation 430 includes sending, through the base station to a user device, the restriction configuration to reduce a load on the wireless network. [0064] [0064] Example 13: According to an example implementation of example 12, in which the sending comprises sending, by the base station to a user device, the restriction configuration, to allow the user device to make a restriction decision for an access attempt based on a network slice associated with the user device access attempt. [0065] [0065] Example 14: According to an example of implementation of any of examples 12-13, and further comprising: forwarding, through the base station to the user device, one or more access category filters that indicate an access category associated with one or more network slices. [0066] [0066] Example 15: According to an implementation example of any of examples 12-14, where the restriction setting indicates a set of restriction parameters, including at least one restriction rate and a restriction timer, for a or more of the access categories. [0067] [0067] Example 16: According to an implementation example of any of examples 12-15, in which one or more network slices are identified by or associated with one or more of the following: a type of slice / service ( SST); a type of slice / service (SST) and slice differentiator (SD); and a single network slice selection assistance information (S-NSSAI). [0068] [0068] Example 17: Figure 5 is a flow chart illustrating the operation of a core network entity according to an implementation example. Operation 510 includes determining, by a core network entity, network slice-specific load information that indicates a load for each of one or more network slices. Operation 520 includes sending, by the core network entity to a base station, the network slice-specific load information. [0069] [0069] Example 18: According to an example implementation of example 17, in which the core network entity comprises a first core network entity, and where the network slice specific load information is determined by the first network entity core network from one or more of the following: load information specific to the network slice determined or collected by the first entity in the core network; and network slice-specific load information received from a second core network entity. [0070] [0070] Example 19: According to an example of implementation of any of examples 17-18, and further comprising: sending, by the entity of the core network to a user device through a base station, one or more filters of access category indicating an access category associated with one or more network slices. [0071] [0071] Example 20: According to an example of implementation of any of examples 17-19, in which one or more network slices are identified by or associated with one or more of the following: a type of slice / service ( SST); a type of slice / service (SST) and slice differentiator (SD); and a single network slice selection assistance information (S-NSSAI). [0072] [0072] Example 21: An apparatus comprising means for performing a method of any of Examples 1-20. [0073] [0073] Example 22: An apparatus comprising at least one processor and at least one memory including computer instructions which, when executed by at least one processor, cause the apparatus to perform a method of any one of Examples 1-20. [0074] [0074] Example 23: A device comprising a computer program product including a non-transitory computer-readable storage medium and storing executable code which, when executed by at least one data processing device, is configured to do at least a data processing apparatus performs a method of any of examples 1-20. [0075] [0075] Additional example implementations and / or example details will now be provided. [0076] [0076] Figure 6 is a diagram illustrating a network according to an implementation example. The figure above shows a part of the 5GS architecture in the reference point representation. The UE is served by a RAN node (BS) in the RAN and by an AMF and an SMF in the core network. After the UE is registered on the network, the UE can communicate with a DN through a PDU session: a data path is established through RAN and UPF towards a DN. UE registration, mobility and sessions are managed by the core network control plan network functions: AMF and SMF. In addition, an UE signature is stored in the UDM and the UE policy (for example, mobility restriction) is controlled by the PCF. [0077] [0077] When the UE wants to be served by the network, it needs to acquire a radio connection and register with the core network. To acquire the radio connection, the UE makes an attempt to access the RAN (but first the UE must confirm that the access attempt is not restricted. If the RAN and / or the core network are overloaded, the access attempt can be restricted by the UE In an implementation example, the UE can restrict an access attempt according to the characteristics of the access attempt and the restriction configuration broadcast by the RAN node and possibly other information, however, a traditional access restriction does not take into account slices, slice-related information or slice-specific load information. [0078] [0078] Therefore, according to an implementation example, the network slice specific access restriction can be performed. For example, a UE can make a restriction decision for an access attempt based on a network slice associated with the access attempt. [0079] [0079] According to an implementation example, a load report can be sent from the core network (for example, AMF and / or SMF) to the RAN / BS; restriction configuration for RRC-inactive (and connected) UEs as opposed to active and connected, and idle UEs; UEs in connected mode are not normally restricted; Idle mode UEs should be restricted more, and inactive connected UEs should be restricted less than idle UEs, because the CN believes that these UEs are connected. Therefore, these inactive UEs receive some additional access restriction configuration parameters (for example, the compensation parameter). A constraint configuration can be determined by the BS based on the load information and sent to the UE. [0080] [0080] A 5GMM entity in the UE may collect one or more of the following information from other entities in the UE: start and stop of MMTel video services, MMTel voice, SMSoIP from the IMS entity; request for delivery of SMSoNAS from the SMS entity; and indication if the 5GSM request is related to the emergency PDU session from the 5GSM entity. Then, 5GMM of the UE entity decides the access category of an access attempt, using the information available to you, in addition to the information above, and sends the access category to the RRC layer of the UE. [0081] [0081] The RRC layer makes a restriction decision for the access attempt, taking into account the following factors: restriction configuration is specific to the access category, which is slice specific (this configuration takes into account the specific load information slice, and the restriction configuration transmission can be triggered by updated load information), access category from the 5GMM entity; UE access class (s); and / or if the access attempt is triggering the change from RRC-INACTIVE to RRC-CONNECTED and, if so, if the access attempt is triggered by the RAN-level radiolocation. [0082] [0082] The UE decides whether the attempted access is restricted or not, based on information from the BS - if restricted, the UE enters the idle mode and, if not restricted, the UE transitions from the Inactive RRC to the Connected RRC; in RRC, there are three different states - connected, inactive and idle (at the RRC level). [0083] [0083] The slice (for example, SST) can be taken into account for the access category decision: the 5GMM entity collects information from other entities, and the 5GMM entity can collect which slice (for example, SST) the request for 5GSM access is related from 5GSM entity. In addition, SST from an already established PDU session may be available at the 5GMM entity. Thus, 5GMM can also use the SST (S) of the PDU session (s) associated with the access attempt as well. In summary, the 5GMM entity can obtain SST (s) related to the attempted access from the 5GSM entity and / or itself. [0084] [0084] In addition, specific categories of mobile or wireless operator access can be determined: The network provides the UE (5GMM entity) access category filter (s). The filter is associated with a specific operator access category and has an associated precedence over standard access categories. [0085] [0085] Determination / population of constraint configuration by BS: NGAP (BS) can determine or populate the constraint configuration according to the slice specific load information received from the core network. The core network can indicate the specific slice load in the core network for the RAN node. The load can be indicated by PLMN, SST, SD and / or S-NSSAI. [0086] [0086] Figure 7 is a diagram illustrating a general procedure for restricting access for access attempts made by an upper layer according to an implementation example. Figure 8 is a diagram illustrating a general procedure for restricting access to access attempts triggered by the RRC layer according to an implementation example. The RRC layer of the UE in RRC-INACTIVE mode can trigger an access attempt. The RRC layer may or may not be assigned an access category for the access attempt. In an implementation example, the NAS layer provides an access category for a NAS message, regardless of RRC states. Figure 9 is a diagram illustrating a procedure for a RAN node to define the constraint configuration to be broadcast according to an implementation example. AMF and / or SMF load information per network slice can be delivered to the RAN node. [0087] [0087] Figure 10 is a diagram illustrating a specific network access restriction technique according to another implementation example. Operations 1-7 are described below for illustrative purposes. [0088] [0088] 1a. The IMS client in the UE can provide at least one of the following indications to the 5GMM entity in the UE either directly from the IMS client to the 5GMM entity or via the 5GSM entity: - MO-MMTEL-voice-initiated; - MO-MMTEL-voice-finished; - MO-MMTEL-video-started; - MO-MMTEL-video-finalized; - MO-SMSoIP-attempt-initiated; and - MO-SMSoIP-attempt-finished. [0089] [0089] As indicated above, the 5GMM entity may be aware of the start and end of the MMTel mobile voice service, the MMTel video service and the SMSoIP service. [0090] [0090] 1b. The SMS entity of the UE may request that the 5GMM entity deliver an SMS MO message, [0091] [0091] 1c. The UE 5GSM entity can request delivery of 5GSM messages to the 5GMM entity in the UE. Along with the 5GSM message, the 5GSM entity can also provide PDU session information, for example, PDU session ID, S-NSSAI, DNN. [0092] [0092] The 5GMM entity can store the information provided by the 5GSM entity in addition to the 5GSM message, for example, PDU session ID, S-NSSAI, DNN. [0093] [0093] If no 5G NAS signaling connection is established for a PDU session and the user data from the PDU session needs to be delivered to the network, the 5GMM entity may be asked to establish a 5G NAS signaling connection by the controlling entity of QoS flow. In this case, the 5GMM entity can also receive the PDU session ID of the PDU session. [0094] [0094] 2. The network may provide filter (s) of operator-specific access category to the 5GMM entity of the UE via, for example, a NAS message, OMA DM. In case the operator-specific access category filter (s) is delivered via a NAS message, that is, the AMF provides the filter (s) to the UE via a 5GMM message, the ) filter (s) may come from PCF. The NAS message can correspond to N1: CONFIGURATION COMMAND message. [0095] [0095] Each of the access category filters is associated with a specific operator access category and / or precedence value and can include at least one of the following criteria: - SST; per slice, and for one or more types of service; - SD; - application ID; - OS ID; - OS application ID; and - DNN. [0096] [0096] For example, within a slice type (or SST), there may be different access categories for different types of service (the slice ID can be, for example, a combination of SST plus SD, SD being optional ). For each combination of SST + SD (or for each network slice, where the slice can be allocated to a service type of UEs), there can be an Access Category. An access category filter can indicate an access category for each of a plurality of slices (or for each slice ID or SST). This information informs the UE how the access attempt should be attributed to an access category; this access category can be used by the UE to perform access restriction analysis: For example, a filter (sent to the UE) for operator-specific access category X can indicate that SST = eMBB and SD = Amazon, which means that an access attempt subject to an eMBB network slice dedicated to Amazon services will be classified as access category X. As another example, a filter for operator-specific access category Y may indicate that DNN (network name of data, which could be linked to the slice, but not the same; Internet or IMS / IP multimedia subsystem) = corporate network, which means that an access attempt subject to internal corporate traffic should be categorized as access category Y. Subject to operator policy, access attempts categorized as access categories X and Y can be prioritized by setting small restriction fee values for these access categories in the restriction setting widespread. [0097] [0097] The operator-specific access category filter (s) may have a higher or lower priority than standard access category decision rules. [0098] [0098] As can be seen in the examples above, in order to give special treatment to access attempts related to proprietary traffic for roaming UEs and even for home network UEs (if the network wants to change the previous configuration), the network must be able to configure the UE with operator-specific access categories. [0099] [0099] 3. Taking into account the information obtained in step 1 and the following information available in the 5GMM entity: - if the access attempt is a response to a message completed by mobile; - SST (s) of the PDU session (s) associated with the attempted access (the SST of an already established PDU session may be available in the 5GMM entity); - UE's registered PLMN and UE / VPLMN's most preferred HPLMN / EHPLMN (s) - Any operator provided access category filters the UE decides on a standard access category. Examples of standard access categories are: - MO resulting from MT: the access attempt is a response to a message terminated by mobile - Voice from MO MMTel: the access attempt is made by a voice call MO MMTel - Voice from MO MMTel: the access attempt is made by a video call MO MMTel - MO SMSoIP: the access attempt is made by a MO SMSoIP - MO SMSoNAS: the access attempt is made by a MO SMSoNAS - Emergence of MO: a access attempt is relevant to the emergency call - delay-tolerant MO service in the EHPLMN: the access attempt is relevant to the delay-tolerant or UE service registered in the EU's EHPLMN - delay-tolerant MO service in the most preferred VPLMN : the access attempt is relevant to the delay-tolerant service or the UE registered in the [00100] [00100] There are cases in which an access attempt is associated with multiple SSTs. To deal with these cases, the order of priority can be decided, for example, URLLC> eMBB> massive IoT, ie again, for example, an access attempt associated with URLLC and massive IoT is treated in the same way as the attempt access associated with: URLLC and eMBB; or URLLC alone. [00101] [00101] In addition, if available, the UE may decide that the attempted access is subject to a specific category of operator, taking into account the filter received in step 2. In addition to what the 5GMM entity considers as input factors for the access category decision for the standard access category, the 5GMM entity also takes into account parameters that are not considered as input to the standard access category decision, for example, SD (s) related to the attempt to access. [00102] [00102] 4. The 5GMM entity of the UE forwards the access category together with the NAS message to the RRC layer of the UE. [00103] [00103] 5. The AMF (example of core network entity) can indicate the load (general network load and slice specific loads) in the core network for the RAN / BS node. The load can be indicated by PLMN, SST, SD and / or S-NSSAI. This information can be provided by SMF to the RAN node. Load information can be expressed on a percentage scale by PLMN, SST, SD and / or S-NSSAI. [00104] [00104] A) More specifically, the AMF can directly provide its load information by PLMN, by SST, by SD and / or by S-NSSAI to the RAN node. Since the UEs served by the RAN node can be served by multiple AMFs, the RAN node may need to collect load information from all AMFs serving the UEs served by the RAN node in order to discover the overall load on the core network ( MFAs). [00105] [00105] (B) On the other hand, SMF can provide the load information via PLMN, SST, SD and / or S-NSSAI to the AMF, and the AMF can forward the load information to the RAN. Since the UEs served by the RAN node can be served by multiple SMFs, the RAN node may need to collect load information from all SMFs that serve the UEs served by the RAN node in order to discover the overall load on the core network ( SMFs). In the message from the AMF to the RAN node, the AMF can include the AMF load information by PLMN, SST, SD and / or S-NSSAI, in addition to the SMF load information to be forwarded. [00106] [00106] C) Or the AMF may collect load information by PLMN, SST, SD and / or S-NSSAI from the SMFs and provide the collected load information to the RAN node. The collected load information can be defined so that the AMF load itself is also reflected in addition to the SMFs load. [00107] [00107] In B) and C), an SMF can indicate that the resources allocated to a network slice with SST = massive IoT are overloaded (for example, 98% load). In B) the AMF forwards the load information (SMF's massive IoT slice resources are loaded 98%) and in C) the AMF gathers SMF massive IoT slice load information (s) and decides the load of massive IoT slice also taking into account the AMF load for the massive IoT slice (in this case, how the AMF calculates the overall load for the massive IoT slice can be left for implementation). [00108] [00108] 6. The RAN node populates (determines) the restriction setting per slice (for example, which can provide greater restriction for some slices, and lower restriction rates for other slices - the prioritization of some traffic over others, for example, you can choose to have a lower restriction rate for URLLC than for eMBB) to be broadcast to the UE. In step 5, the RAN node can be aware of the load status of the core network by PLMN, SST, SD and / or S-NSSAI. Thus, the RAN node can populate or determine the constraint configuration, so that the load of a particular network slice / PLMN can be reduced, for example, the restriction parameters for access categories related to specific network slices (for example, example, eMBB, URLLC, massive IoT, IMS) can be defined so that the access attempt associated with these access categories is reduced. Note that the massive IoT slice is mapped to delay-tolerant service series access categories. [00109] [00109] The restriction configuration can indicate one or more of the following, as an illustrative example: - if a particular access class (es) should be restricted with a certain rate restriction and restriction timer; - whether a particular access category (s) should be restricted with a certain restriction rate and restriction timer; - whether the restriction should be applied to each of the access classes in the range 11-15; [00110] [00110] Please note that the restriction rate and restriction timer for IMS services (MMTel voice, MMTel video, SMSoIP) and the compensation parameter (s) for high priority IMS PDU sessions can be delivered to the IMS client in the UE by the RRC layer in the UE and the IMS client can use the information to restrict the verification of IMS services. [00111] [00111] For example, a UE can select a random number between 0 and 1 and determine a restriction factor and compare it to the restriction rate (if it is less than the restriction rate, the access attempt will not be restricted. [00112] [00112] The exemplary implementation of the restriction configuration disseminated in the System Information can be represented as follows: Information element SystemInformationBlockTypeX - ASN1START SystemInformationBlockTypeX :: = SEQUENCE {accessBarringConfiguration SEQUENCE {plmn-IdentityIndex-r15 INTEGER (1. .maxPLMN- r15) OPTIONAL - Need OP abc-Info-r15 SEQUENCE {abcForSpecialAC BIT STRING (SIZE (5)) OPTIONAL - Need OP abcForAC BIT STRING (SIZE (10)) OPTIONAL - Need OP barringPerAccessCategoryList-r15 BarringPerAccessCategoryList-r15 OPTIONAL - Need OP} abcConfig-r15 SEQUENCE {abcFactor-r15 ENUMERATED {p00, p05, p10, p15, p20, p25, p30, p40, p50, p60, p70, p75, p80, p85, p90, p95), [00113] [00113] Where abc-Info-rl5 belongs to the collective configuration of three types of Access Restriction Configuration: - for special access classes (for example, ACl 1-15) through abcForSpecialAC; - for regular LTE access classes using abcForAC; - for access categories using the parameter barringPerAccessCategoryList, where the range of access categories is determined by maxAccessCategory-r15. [00114] [00114] Some example advantages of various example implementations may include, or example, that the UE's aerial interface and RRC layer become adaptable, extensible and transparent to a high degree in terms of providing or restricting particular access attempts. While the NW (network) has the means to control various services and attempts to access the terminal in the same unified manner. Assuming that the List of Access Categories is extensively defined in the RRC layer, the technique allows adding potentially new services without the need to change the service's accessibility structure. [00115] [00115] 7. The RRC layer of the UE restricts access attempts according to the widespread restriction configuration, and the information about the access attempt, for example, at least one of the following, for example: [00116] [00116] For example, if the 5GMM entity of a UE in RRC-INACTIVE mode requested the RRC layer to carry a NAS message with access category = MO SMSoNAS and the restriction setting indicates that the restriction rate for the category of access = MO SMSoNAS is 40% and the compensation parameter for RRC-INACTIVE UEs is 0.3, the attempt to access the MO SMSoNAS should be restricted with a probability of 0.4 * 0.3 = 0.12 (12 % of that access attempt will be restricted). [00117] [00117] In an implementation example, the UE RRC layer can obtain UE access class (s) from the USIM, but if this is not available, the upper layer can provide the UE RRC layer with the EU access class (s). [00118] [00118] If the attempt to access a UE in RRC-INACTIVE mode is restricted, the RRC layer must indicate the top layer of the restriction result with a specific cause. The cause must indicate that the UE is restricted due to the restriction configuration of the RAN node, so that this case can be differentiated from the radio link failure. In this case, both in the RRC layer and in the NAS layer, the UE enters the idle mode. The NAS layer must operate as if the UE is restricted in idle mode. [00119] [00119] List of example abbreviations: 3GPP: partnership project for the third generation 4G: fourth generation mobile telecommunications technology 5G: fifth generation mobile telecommunications technology [00120] [00120] Figure 11 is a block diagram of a wireless station (for example, AP, BS, eNB, UE or user device) 1100, according to an implementation example. The wireless station 1100 may include, for example, one or two RF (radio frequency) or wireless transceivers 1102A, 1102B, wherein each wireless transceiver includes a transmitter for transmitting signals and a receiver for receiving signals. The wireless station also includes a processor or control unit / entity (controller) 1104 for executing instructions or software and controlling signal transmission and reception, and memory 1106 for storing data and / or instructions. [00121] [00121] Processor 1104 can also make decisions or determinations, generate frames, packets or messages for transmission, [00122] [00122] Furthermore, with reference to Figure 11, a controller (or processor) 1108 can execute software and instructions, and can provide general control for station 1100, and can provide control for other systems not shown in Figure 11, how to control input / output devices (for example, display, keyboard) and / or can run software for one or more applications that may be provided on the 1100 wireless station, such as an e-mail program, audio / audio applications video, word processor, Voice over IP application or other application or software. [00123] [00123] In addition, a storage medium can be provided that includes stored instructions that, when executed by a controller or processor, can result in processor 1104, or another controller or processor, performing one or more of the functions or tasks described above. [00124] [00124] According to another example of implementation, the RF or wireless transceiver (s) 1102 A / 1102B can receive signals or data and / or transmit or send signals or data. The 1104 processor (and possibly the 1102A / 1102B transceivers) can control the 1102A or 1102B RF or wireless transceiver to receive, send, broadcast or transmit signals or data. [00125] [00125] The modalities are not, however, restricted to the system that is given as an example, but one skilled in the art can apply the solution to other communication systems. Another example of a suitable communication system is the 5G concept. It is assumed that the network architecture in 5G will be quite similar to that of LTE-advanced. 5G is likely to use multiple input multiple output antennas (MIMO), many more base stations or nodes than LTE (the so-called small cell concept), including macro sites operating in cooperation with smaller stations and perhaps also using a variety of radio technologies for better coverage and improved data rates. [00126] [00126] It should be considered that future networks are likely to use network function virtualization (NFV), which is a concept of network architecture that proposes the virtualization of network node functions in "building blocks" or entities that can be operationally connected or linked to provide services. A virtualized network function (VNF) can comprise one or more virtual machines running computer program codes using standard or general type servers instead of custom hardware. Cloud computing or data storage can also be used. In radio communications, this can mean that node operations can be performed, at least in part, on a server, host or node operationally coupled to a remote radio header. It is also possible for node operations to be distributed among a plurality of servers, nodes or hosts. It should also be understood that the distribution of work between the operations of the core network and the operations of the base station may differ from that of LTE or even non-existent. [00127] [00127] The implementations of the various techniques described here can be implemented in a set of digital electronic circuits, or in hardware, firmware, computer software or in combinations of them. Implementations can be implemented as a computer program product, that is, a computer program tangibly embedded in an information carrier, for example, in a machine-readable storage device or in a propagated signal, for realization by, or to control the operation of a given processing device, for example, a programmable processor, a computer or multiple computers. Implementations can also be provided on a computer-readable medium or a computer-readable storage medium, which can be a non-transitory medium. Implementations of the various techniques may also include implementations provided by means of signals or transient means, and / or programs and / or software implementations that can be downloaded over the Internet or other networks, wired networks and / or wireless networks. In addition, implementations can be provided through machine-type communications (MTC) and also through an Internet of Things (IOT). [00128] [00128] The computer program can be in the form of source code, form of object code or in some intermediate way and can be stored in some type of carrier, distribution medium or computer-readable medium, which can be any entity or device capable of carrying the program. Such carriers include a recording medium, computer memory, read-only memory, photoelectric and / or electric carrier signal, telecommunications signal, and software distribution package, for example. Depending on the processing power required, the computer program can be run on a single electronic digital computer or can be distributed among a number of computers. [00129] [00129] In addition, implementations of the various techniques described here may use a cyber-physical system (CPS) (a system of collaborative computational elements that control physical entities). The CPS can allow the implementation and exploration of large quantities of interconnected ICT devices (sensors, actuators, processor microcontrollers, ...) embedded in physical objects in different locations. Mobile cyber-physical systems, in which the physical system in question has inherent mobility, are a subcategory of cyber-physical systems. Examples of mobile physical systems include mobile robotics and electronics carried by humans or animals. The rise in popularity of smartphones has increased interest in the area of mobile cyber-physical systems. Therefore, several implementations of techniques described in this document can be provided through one or more of these technologies. [00130] [00130] A computer program, like the computer program (s) described above, can be written in any form of programming language, including compiled or interpreted languages, and can be deployed in any form, including as a stand-alone program or as a module, component, subroutine or other unit or part thereof suitable for use in a computing environment. A computer program can be deployed to run on one computer or multiple computers at one site or distributed across multiple sites and interconnected over a communication network. [00131] [00131] Method steps can be performed by one or more programmable processors running a computer program or parts of computer programs to perform functions operating on input data and generating output. Method steps can also be performed, and a device can be implemented as a set of special purpose logic circuits, for example, an FPGA (Field Programmable Gate Array) or an ASIC (application specific integrated circuit). [00132] [00132] Processors suitable for carrying out a computer program include, for example, microprocessors of general and special purpose and any one or more processors of any type of digital computer, chip or chipset. Usually, a processor receives instructions and data from a read-only memory or a random access memory or both. The elements of a computer can include at least one processor to execute instructions and one or more memory devices to store instructions and data. Generally, a computer can also include or be operationally coupled to receive or transfer data to, or both, one or more mass storage devices for storing data, for example, magnetic, magneto-optical discs or optical discs. Information carriers suitable for incorporating instructions and data from computer programs include all forms of non-volatile memory, including by way of example semiconductor memory devices, for example, EPROM, EEPROM and flash memory devices; magnetic disks, for example, internal or removable hard drives; magneto-optical discs; and CD-ROM and DVD-ROM discs. The processor and memory can be supplemented by, or incorporated into, a special purpose logic circuitry. [00133] [00133] To provide interaction with a user, implementations can be implemented on a computer that has a display device, for example, a cathode ray tube screen (CRT) or liquid crystal screen (LCD), to display information to the user and a user interface, such as a keyboard and pointing device, for example, a mouse or tracking ball, by which the user can provide information to the computer. Other types of devices can also be used to provide user interaction; for example, the feedback provided to the user can be any form of sensory feedback, for example, visual feedback, auditory feedback or tactile feedback; and user input can be received in any form, including acoustic, speech, or tactile input. [00134] [00134] Implementations can be implemented in a computing system that includes a back-end component, for example, as a data server or that includes a middleware component, for example, an application server or that includes a component front-end, for example, a client computer having a graphical user interface or a web browser through which a user can interact with an implementation or any combination of these back-end, middleware or front-end components. The components can be interconnected by any form or means of digital data communication, for example, a communication network. Examples of communication networks include a local area network (LAN) and a wide area network (WAN), for example, the Internet. [00135] [00135] Although certain features of the described implementations have been illustrated as described here, many modifications, substitutions, changes and equivalents will now occur for those skilled in the art. It should, therefore, be understood that the attached claims are intended to cover all modifications and alterations that fit the true spirit of the various modalities.
权利要求:
Claims (48) [1] 1. Method characterized by the fact that it comprises: detecting, by a user device, a network slice or an application associated with an attempt by the user device to access a wireless network; determine, by the user device, an access category based on the detected network slice or the detected application; and make, by the user device, a restriction decision for attempted access based on the determined access category. [2] 2. Method, according to claim 1, characterized by the fact that the making of a restriction decision comprises: making, by the user device based on the determined access category, a decision that the access attempt is not restricted ; and the method further comprises performing, by the user device based on the decision, the detected access attempt to the wireless network. [3] 3. Method, according to claim 2, characterized by the fact that the realization of the detected access attempt comprises: sending, by the user's device, a radio resource control connection (RRC) request message to request a connection to the wireless network. [4] 4. Method according to any one of claims 1 to 3, characterized by the fact that it further comprises: receiving, by the user device, a message of non-access layer indicating a respective access category associated with one or more applications ; and where determining the access category based on the detected application includes: determine, by the user device, the access category for the access attempt based on the application that is associated with the access attempt and one or more access category definitions. [5] 5. Method according to any one of claims 1 to 3, characterized by the fact that it further comprises: receiving, by the user device, one or more definitions of access category that indicate a respective access category associated with one or more network slices; and where determining the access category based on the detected network slice includes: determining, by the user device, the access category for the access attempt based on the network slice that is associated with the access attempt and one or more more access category definitions. [6] 6. Method according to any one of claims 1 to 5, characterized by the fact that it further comprises: receiving, by the user device, a restriction configuration that indicates a set of restriction parameters for one or more of the access categories ; and in which the restriction decision making for the access attempt includes the making, by the user device, of a restriction decision for the access attempt based on the restriction configuration and the access category for the access attempt. [7] 7. Method, according to claim 6, characterized by the fact that said restriction configuration indicates whether a particular access category should be restricted with a certain restriction factor and restriction timer, and in which a restriction decision is made for the access attempt based on the restriction setting and the access category for the access attempt comprises, when said restriction setting indicates that the given access category must be restricted with a certain restriction factor and restriction time: generate a random number; and decide that the access attempt is not restricted when the random number is less than the certain restriction factor, otherwise decide that the access attempt is at least temporally restricted. [8] Method according to either of claims 6 or 7, characterized in that the set of restriction parameters includes at least one restriction rate and a restriction timer. [9] Method according to any one of claims 6 to 8, characterized by the fact that the constraint configuration is based on specific load information for the network slice that indicates a network load for each of one or more slices of network. [10] 10. Method according to any one of claims 6 to 9, characterized in that the restriction configuration that indicates a set of restriction parameters for one or more of the access categories provides a different prioritization than one or more attempts to access based on access categories of access attempts. [11] 11. Method according to any one of claims 1 to 10, characterized by the fact that the network slice associated with the access attempt is identified by one or more of the following: a type of slice / service (SST); and a type of slice / service (SST) and slice differentiator (SD). [12] 12. Method according to any one of claims 1 to 11, characterized by the fact that the application associated with the attempted access is identified by one or more of the following: operating system identity; and operating system application identity. [13] 13. Method according to any one of claims 1 to 12, characterized by the fact that it further comprises: receiving a compensation parameter for a user device in Idle mode; determine, by the user device, that the user device is in Idle mode; and where the making of a restriction decision comprises: applying, by the user device, the compensation parameter to the making of a restriction decision for the user device to adjust a restriction rate of the attempted access of the user device that is in Idle mode. [14] 14. Method characterized by the fact that it comprises: receiving, by a base station from one or more core network entities within a wireless network, specific load information for the network slice that indicates a load for each of one or more network slices; determine, by the base station based on the received network slice specific load information, a restriction setting that indicates a set of restriction parameters for one or more access categories; and send, through the base station to a user device, the restriction setting to reduce a load on the wireless network. [15] 15. Method, according to claim 14, characterized by the fact that the restriction configuration that indicates a set of restriction parameters for one or more access categories indicates whether an access attempt to which a network slice is associated is triggered by radio access network (RAN) level radiolocation. [16] 16. Method according to claim 15, characterized by the fact that sending comprises sending, by the base station to a user device, the restriction configuration, to allow the user device to make a restriction decision for an attempt to access based on a network slice associated with the user device's attempted access. [17] 17. Method according to claim 14 or 15, characterized by the fact that the set of restriction parameters includes at least one restriction rate and a restriction timer. [18] 18. Method according to any one of claims 14 to 17, characterized in that said restriction configuration indicates whether a particular access category should be restricted with a certain restriction factor and restriction timer. [19] 19. Method according to any one of claims 14 to 18, characterized by the fact that the one or more network slices are identified by one or more of the following: a type of slice / service (SST); and a type of slice / service (SST) and slice differentiator (SD). [20] 20. Method, characterized by the fact that it comprises: determining, by a core network entity, load information specific to the network slice that indicates a load for each one or more network slices; and sending, by the core network entity to a base station, the network slice-specific load information. [21] 21. Method according to claim 20, characterized by the fact that the core network entity comprises a first core network entity, and in which the load information specific to the network slice is determined by the first core network entity to from one or more of the following: specific network slice load information determined or collected by the first core network entity; and specific network slice load information received from a second core network entity. [22] 22. Method, according to claim 20 or 21, characterized by the fact that it further comprises: sending, by the core network entity to a user device, one or more access category definitions that indicate an access category associated with one or more network slices. [23] 23. Method according to any one of claims 20 to 22, characterized in that the one or more network slices are identified by or associated with one or more of the following: a type of slice / service (SST); and a type of slice / service (SST) and slice differentiator (SD). [24] 24. User device, characterized by the fact that it comprises means for detecting a network slice or an application associated with an attempt by the user device to access a wireless network; means for determining an access category based on the detected network slice or detected application; and means for making a restriction decision for attempted access based on the given access category. [25] 25. User device according to claim 24, characterized by the fact that the means for making a restriction decision making are configured to make, based on the determined access category, a decision that the attempted access does not is restricted; and in which the user device comprises means to carry out, on the basis of the decision, the detected access attempt to the wireless network. [26] 26. User device, according to claim 25, characterized by the fact that the means to carry out, on the basis of the decision, the detected access attempt to the wireless network are configured to: send a control connection request message radio resource (RRC) to request a connection to the wireless network. [27] 27. User device according to any one of claims 24 to 26, characterized by the fact that it further comprises: means for receiving a non-access layer message that indicates a respective access category associated with one or more applications; and in which said determination of the access category based on the detected application includes: determining the access category for the access attempt based on the application that is associated with the access attempt and one or more access category definitions. [28] 28. User device according to any one of claims 24 to 26, characterized by the fact that it further comprises: means for receiving one or more access category definitions that indicate a respective access category associated with one or more slices of access. network; and in which said determination of the access category based on the detected network slice includes: determining the access category for the access attempt based on the network slice that is associated with the access attempt and one or more definitions of access category access. [29] 29. User device according to any one of claims 24 to 28, characterized by the fact that it further comprises: means for receiving a restriction configuration that indicates a set of restriction parameters for one or more of the access categories; and in which said means to make a restriction decision for the attempted access based on the given access category is configured to make the restriction decision based on the restriction configuration and the access category for the attempted access. [30] 30. User device according to claim 29, characterized by the fact that said restriction configuration indicates whether a particular access category should be restricted with a certain restriction factor and restriction timer, and in which said means to take a restriction decision based on the given access category are configured to, when said restriction setting indicates that the given access category must be restricted with a certain restriction factor and restriction time: generate a random number; and decide that the access attempt is not restricted when the random number is less than the certain restriction factor, otherwise decide that the access attempt is at least temporally restricted. [31] 31. User device according to claim 29 or 30, characterized by the fact that the set of restriction parameters includes at least one restriction rate and a restriction timer. [32] 32. User device according to any one of claims 29 to 31, characterized in that the restriction configuration is based on a specific load information for the network slice that indicates a network load for each one or more network slices. [33] 33. User device according to any of the claims 30 to 32, characterized by the fact that the restriction configuration that indicates a set of restriction parameters for one or more of the access categories provides a different prioritization of one or more access attempts based on access categories of the access attempts . [34] 34. User device according to any one of claims 24 to 33, characterized by the fact that the network slice associated with the access attempt is identified by one or more of the following: a type of slice / service (SST); and a type of slice / service (SST) and slice differentiator (SD). [35] 35. User device according to any one of claims 24 to 34, characterized by the fact that the application associated with the attempted access is identified by one or more of the following: operating system identity; and operating system application identity. [36] 36. User device according to any one of claims 24 to 35, characterized by the fact that it further comprises: means for receiving a compensation parameter in Idle mode; means for determining that the user device is in Idle mode; and in which the means to make a restriction decision for attempted access based on the given access category are configured to: apply the compensation parameter for making a restriction decision for the user device to adjust a restriction rate attempting to access the user device that is in Idle mode. [37] 37. Base station characterized by the fact that it comprises: means for receiving from one or more core network entities within a wireless network, specific network slice charge information that indicates a charge for each of one or more slices network; means for determining, based on the received network slice specific load information, a restriction configuration indicating a set of restriction parameters for one or more access categories; and means for sending to a user device, the restriction setting to reduce a load on the wireless network. [38] 38. Base station according to claim 37, characterized by the fact that the restriction configuration that indicates a set of restriction parameters for one or more access categories indicates whether an access attempt with which a network slice is associated is triggered by radio access network (RAN) level radiolocation. [39] 39. Base station according to claim 38, characterized in that the means for sending are configured to send the restriction configuration to a user device, to allow the user device to make a restriction decision for an attempt of access based on a network slice associated with the user device's attempted access. [40] 40. Base station according to any of claims 37 to 39, characterized in that the set of restriction parameters includes at least one restriction rate and a restriction timer. [41] 41. Base station according to any of claims 37 to 40, characterized in that said restriction configuration indicates whether a particular access category should be restricted with a certain restriction factor and restriction timer. [42] 42. Base station according to any one of claims 37 to 41, characterized by the fact that one or more network slices are identified by one or more of the following: a type of slice / service (SST); and a type of slice / service (SST) and slice differentiator (SD). [43] 43. Core network entity, characterized by the fact that it comprises: means to determine load information specific to the network slice that indicate a load for each of one or more network slices; and means for sending the network slice-specific load information to a base station. [44] 44. Core network entity characterized by the fact that the core network entity comprises a first core network entity, and in which the load information specific to the network slice is determined by the first core network entity from one or more of the following: network slice-specific load information determined or collected by the first core network entity; and specific network slice load information received from a second core network entity. [45] 45. Core network entity, according to claim 43 or 44, characterized by the fact that it further comprises: means for sending one or more access category definitions that indicate an access category associated with one or more network slices to a user device. [46] 46. Core network entity according to any of claims 43 to 45, characterized by the fact that one or more core network slices are identified by or associated with one or more of the following: a type of slice / service ( SST); and a type of slice / service (SST) and slice differentiator (SD). [47] 47. Apparatus characterized by the fact that it comprises at least one processor and at least one memory including instructions that, when executed by at least one processor, causes the apparatus to perform a method defined in any one of claims 1 to 23. [48] 48. Apparatus characterized by the fact that it comprises a non-transitory computer-readable storage medium and that stores executable instructions that, when executed by at least one data processing device, are configured to make at least one processing device perform a method defined in any one of claims 1 to 23.
类似技术:
公开号 | 公开日 | 专利标题 BR112020002801A2|2020-07-28|specific network slice access restriction for wireless networks US10638356B2|2020-04-28|Transmission of network slicing constraints in 5G wireless networks US10701751B2|2020-06-30|Signaling for multiple radio access technology dual connectivity in wireless network US11026133B2|2021-06-01|Flexible quality of service for inter-base station handovers within wireless network US10979886B2|2021-04-13|UE configuration and update with network slice selection policy KR20160111400A|2016-09-26|A method and appartus for adaptive barring control for mo-sms in wireless accesss system US20190150061A1|2019-05-16|Access control methods and apparatus for radio systems US20170367035A1|2017-12-21|Cellular and wlan aggregation JP2020512776A|2020-04-23|Mobile communication system apparatus and method US11044640B2|2021-06-22|Uplink bearer binding in handover US20200351409A1|2020-11-05|Validity information conditions WO2014181028A1|2014-11-13|Method and apparatus for access control WO2020224622A1|2020-11-12|Information configuration method and device US11259161B2|2022-02-22|Enhancements for radio access capability signaling | US20210282022A1|2021-09-09|Registered and unregistered operation for shared band wireless nodes within wireless networks US20210368501A1|2021-11-25|Streamlining protocol layers processing, and slotless operation US20220053450A1|2022-02-17|Techniques for supporting low latency nr positioning protocols US20210368581A1|2021-11-25|Ue-to-ue relay service in 5g systems US20210226914A1|2021-07-22|Initiation of domain name system | resolution in 5g systems WO2022032155A1|2022-02-10|Directional sensing indication through a qcl framework WO2022031427A1|2022-02-10|Srs trp association and multiple usage configuration WO2022015595A1|2022-01-20|Default spatial relation for pucch and srs with multi-trp WO2022031541A1|2022-02-10|Beam management for multi-trp operation WO2022026161A1|2022-02-03|Reservation signal for communications above 52.6 ghz WO2022031702A1|2022-02-10|Latency reduction for nr beam acquisition
同族专利:
公开号 | 公开日 AU2021254647A1|2021-11-18| WO2019030429A1|2019-02-14| KR20200036933A|2020-04-07| CO2020001475A2|2020-06-19| CN111165021A|2020-05-15| TW201922045A|2019-06-01| RU2020105917A|2021-09-14| TWI695649B|2020-06-01| RU2020105917A3|2021-09-14| US20200178158A1|2020-06-04| PH12020500273A1|2020-09-21| CA3072743A1|2019-02-14| CL2020000314A1|2020-10-09| AU2018314932A1|2020-02-27| EP3665953A4|2021-09-15| EP3665953A1|2020-06-17| AU2018314932B2|2021-07-22| KR20220016294A|2022-02-08| MA49976A|2020-06-17| JP2020530710A|2020-10-22| SG11202001072WA|2020-03-30|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US9949166B2|2012-01-23|2018-04-17|Intel Corporation|Extended access barring signaling for a core network and node| EP3163947B1|2014-06-30|2019-09-04|LG Electronics Inc.|Method for barring network access for each application, and user equipment| WO2016006948A1|2014-07-09|2016-01-14|Lg Electronics Inc.|Method and apparatus for performing application specific access control in wireless communication system| US9860824B2|2014-11-10|2018-01-02|Lg Electronics Inc.|Method and user equipment for blocking network access by ACDC| MX2018001875A|2015-08-14|2018-06-20|Ericsson Telefon Ab L M|System and method for providing control information for application-specific congestion control for data communication.| WO2017074486A1|2015-10-28|2017-05-04|Intel IP Corporation|Slice-based operation in wireless networks with end-to-end network slicing| US10129108B2|2015-11-13|2018-11-13|Huawei Technologies Co., Ltd.|System and methods for network management and orchestration for network slicing| CN108476406A|2016-01-08|2018-08-31|瑞典爱立信有限公司|For the access control in the network including network fragment| CN112996087A|2016-09-28|2021-06-18|华为技术有限公司|Network slice selection method, terminal equipment and network equipment|KR102325521B1|2017-08-14|2021-11-12|삼성전자 주식회사|Method and apparatus for handling network congestion control to rrc-inactive or light-connection device| CN109548042A|2017-09-22|2019-03-29|中兴通讯股份有限公司|A kind of network slice configuration method and device| US11064450B2|2018-11-12|2021-07-13|Mediatek Inc.|Synchronization of QoS flows and rules in mobile communications| US10887825B2|2019-05-01|2021-01-05|Verizon Patent And Licensing Inc.|Method and system for application-based access control using network slicing| WO2021020834A1|2019-07-26|2021-02-04|엘지전자 주식회사|Method for accessing network by terminal| GB2587337A|2019-09-17|2021-03-31|Samsung Electronics Co Ltd|Network slice instance load distribution| WO2021086126A1|2019-10-30|2021-05-06|삼성전자 주식회사|Access management method and device for performing data communication service by using nas protocol in 5g environment| KR102351935B1|2020-05-14|2022-01-14|주식회사 엘지유플러스|Method for controlling wireless communication network connections and attaratus thereof| CN113853004A|2020-06-28|2021-12-28|中兴通讯股份有限公司|Information sending method, NR cell access method, access network equipment and mobile terminal| WO2022021155A1|2020-07-29|2022-02-03|LenovoLimited|Method and apparatus for managing access control information| WO2022027355A1|2020-08-05|2022-02-10|Apple Inc.|Access barring for radio access network slicing|
法律状态:
2021-11-03| B350| Update of information on the portal [chapter 15.35 patent gazette]|
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 US201762544519P| true| 2017-08-11|2017-08-11| US62/544,519|2017-08-11| PCT/FI2018/050570|WO2019030429A1|2017-08-11|2018-08-02|Network slice-specific access barring for wireless networks| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|