CN114679720B - Network slice request method and device, electronic equipment and storage medium - Google Patents
Network slice request method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN114679720B CN114679720B CN202210312620.3A CN202210312620A CN114679720B CN 114679720 B CN114679720 B CN 114679720B CN 202210312620 A CN202210312620 A CN 202210312620A CN 114679720 B CN114679720 B CN 114679720B
- Authority
- CN
- China
- Prior art keywords
- network
- slice
- unsigned
- network slice
- electronic device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 91
- 230000008859 change Effects 0.000 claims description 30
- 230000003993 interaction Effects 0.000 claims description 11
- 238000004590 computer program Methods 0.000 claims description 7
- 238000004891 communication Methods 0.000 abstract description 3
- 238000007726 management method Methods 0.000 description 43
- 230000008569 process Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 11
- 239000002699 waste material Substances 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 238000013523 data management Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000008713 feedback mechanism Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
- H04W8/205—Transfer to or from user equipment or user record carrier
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The embodiment of the application relates to the technical field of communication and discloses a method and a device for requesting a network slice, electronic equipment and a storage medium, wherein the method is applied to the electronic equipment and comprises the steps of receiving first feedback information sent by first network equipment, wherein the first feedback information is used for indicating that the first network slice is in an unsigned state; and storing the first slice identifier corresponding to the first network slice to an unsigned list according to the first feedback information, wherein the unsigned list is used for storing the slice identifier corresponding to the network slice of which the electronic equipment does not have access rights. By implementing the embodiment of the application, the electronic equipment can be prevented from requesting to access the unsigned network slice to the network equipment, thereby saving network air interface resources.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a network slice request method and apparatus, an electronic device, and a storage medium.
Background
With the rapid development of communication technology, in order to meet network requirements in different scenarios, network resources of a public network from an access network to a core network are nowadays cut into a plurality of mutually independent network slices for providing different network services according to different network requirements.
In practice, it is found that when an electronic device initiates a network slice access request to a public network, it may request access to an unsigned network slice from the network device, which results in that the request will be rejected by the network device, resulting in waste of air interface resources of the network.
Disclosure of Invention
The embodiment of the application discloses a network slice requesting method and device, electronic equipment and a storage medium, which can avoid the electronic equipment requesting to access an unsigned network slice to the network equipment, thereby saving network air interface resources.
An embodiment of the application in a first aspect discloses a network slice request method, which is applied to electronic equipment, and comprises the following steps:
Receiving first feedback information sent by first network equipment, wherein the first feedback information is used for indicating that a first network slice is in an unsigned state;
And storing a first slice identifier corresponding to the first network slice to an unsigned list according to the first feedback information, wherein the unsigned list is used for storing the slice identifier corresponding to the network slice of which the electronic equipment does not have access right.
The second aspect of the embodiment of the application discloses a network slice request method, which is applied to first network equipment and comprises the following steps:
Receiving a second network request sent by the electronic equipment, wherein the second network request at least comprises a request for accessing the first network slice;
and under the condition that the first network slice is in an unsigned state, sending first feedback information to the electronic equipment, so that the electronic equipment stores a first slice identifier corresponding to the first network slice into an unsigned list according to the first feedback information, wherein the unsigned list is used for storing slice identifiers corresponding to network slices which are not provided with access rights by the electronic equipment.
A third aspect of an embodiment of the present application discloses a network slice requesting device, which is applied to an electronic device, and the device includes:
The first receiving unit is used for receiving first feedback information sent by the first network equipment, wherein the first feedback information is used for indicating that a first network slice is in an unsigned state;
the storage unit is configured to store, according to the first feedback information, a first slice identifier corresponding to the first network slice to an unsigned list, where the unsigned list is configured to store a slice identifier corresponding to a network slice that the electronic device does not have access rights.
An embodiment of the present application in a fourth aspect discloses a request device for network slicing, which is applied to a first network device, and the device includes:
The second receiving unit is used for receiving a first network request sent by the electronic equipment, and the first network request at least comprises a request for accessing a first network slice;
The first sending unit is configured to send first feedback information to the electronic device when it is determined that the first network slice is in an unsigned state, so that the electronic device stores a first slice identifier corresponding to the first network slice to an unsigned list according to the first feedback information, where the unsigned list is used to store slice identifiers corresponding to network slices that the electronic device does not have access rights.
A fifth aspect of an embodiment of the present application discloses an electronic device, including:
A memory storing executable program code;
A processor coupled to the memory;
The processor invokes the executable program code stored in the memory to execute the network slice request method disclosed in the first aspect or the second aspect of the embodiment of the present application.
A sixth aspect of the embodiment of the present application discloses a computer-readable storage medium storing a computer program, where the computer program causes a computer to execute the network slice request method disclosed in the first aspect or the second aspect of the embodiment of the present application.
Compared with the related art, the embodiment of the application has the following beneficial effects:
In the embodiment of the application, the first network device can send the first feedback information for indicating that the first network slice is in the unsigned state to the electronic device, when the electronic device receives the first feedback information, the electronic device can determine that the electronic device does not have the authority for accessing the first network slice, and further the electronic device can store the first slice identifier corresponding to the first network slice into the unsigned list, and then the electronic device can not request the network device to access the unsigned network slice according to the unsigned list, thereby avoiding the electronic device from requesting the network device to access the unsigned network slice and saving network air interface resources; in addition, the electronic equipment can be prevented from requesting to access the unsigned network slice to the network equipment, and the network equipment refuses the interaction process of the request, so that the time for establishing connection between the electronic equipment and the network equipment can be shortened.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a network slice request flow in the related art disclosed in an embodiment of the present application;
FIG. 2 is a flow chart of a method for requesting a network slice according to an embodiment of the present application;
FIG. 3 is a flow chart of another method for requesting a network slice according to an embodiment of the present application;
FIG. 4 is a timing diagram of an embodiment of the present disclosure;
FIG. 5 is a flow chart of a method for requesting a network slice according to an embodiment of the present application;
FIG. 6 is another timing diagram of an embodiment of the present disclosure;
FIG. 7 is a flow chart of a request method for a network slice according to another embodiment of the present application;
FIG. 8 is a schematic diagram of a network slice requesting device according to an embodiment of the present application;
FIG. 9 is a schematic diagram of another network slice requesting device according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be noted that the terms "first," "second," "third," and "fourth," etc. in the description and claims of the present application are used for distinguishing between different objects and not for describing a particular sequential order. The terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or apparatus.
The embodiment of the application discloses a network slice requesting method and device, electronic equipment and a storage medium, which can avoid the electronic equipment requesting to access an unsigned network slice to the network equipment, thereby saving network air interface resources.
The technical scheme of the application will be described in detail with reference to specific embodiments.
In order to more clearly illustrate a network slice request method disclosed in the embodiments of the present application, first, a network slice and a network slice access request process in the related art are described.
In the related art, in order to meet network requirements in different scenarios, network resources of a public network from an access network to a core network are cut into a plurality of mutually independent network slices for providing different network services for different network requirements, for example: the intelligent driving network slice is used for independently providing network services for automatic driving; the intelligent mobile phone network slice is used for providing network services for mobile phones and the like. And the electronic equipment can initiate an access request to the corresponding network slice according to the network requirement of the electronic equipment.
It should be further noted that different network operators typically correspond to different network devices, and different network devices typically support different public land mobile networks (Public Land Mobile Network, PLMNs), wherein each PLMN may be individually cut into multiple network slices. For example, PLMN1 may be partitioned into network slice 1, network slice 2; the PLMN2 may be divided into a network slice 1 and a network slice 2, which is not limited herein.
Referring to fig. 1, fig. 1 is a schematic diagram of a network slice request flow in the related art according to an embodiment of the present application. Wherein, step 1: the electronic device 110 sends a third network request to the first network device 120, the third network request including a request to access network slice 1 and network slice 2.
Step 2: in the event that the first network device 120 determines that the network slice 2 is not signed up (i.e., the electronic device 110 does not have permission to access the network slice 2), the first rejection information may be sent to the electronic device 110 to reject the electronic device 110 from accessing the network slice 2.
Step 3: when the electronic device 110 roams from a first network (i.e., PLMN 1) corresponding to the first network device 120 to a second network (i.e., PLMN 2) corresponding to the second network device 130, the electronic device 110 sends a fourth network request to the second network device 130, where the fourth network request includes a request to access network slice 1 and network slice 2.
Step 4: in case it is determined from the fourth network request that the network slice 2 is not signed up, the second network device 130 will send the second rejection information to the electronic device 110 again to reject the electronic device 110 to access the network slice 2.
The first reject information and the second reject information generally include a cause value of "0000", which indicates that the first network device 120 or the second network device 130 only rejects the electronic device 110 from accessing the network slice 2, but does not describe the reason for rejection (the reason for rejection may be that the first network device 120 or the second network device 130 does not support the network slice 2, or that the electronic device 110 does not have the authority to access the network slice 2). In this regard, when the electronic device 110 roams to the second network device 130, the fourth network request still includes the request to access network slice 2 because the electronic device 110 does not know the specific reason for rejection by the first network device 120. This results in the subsequent second network device 130 feeding back the second reject information to the electronic device 110 again, which wastes network air interface resources and increases the duration of the connection between the electronic device and the network device.
Based on this, the method for requesting a network slice disclosed in the embodiment of the present application is described below.
Referring to fig. 2, fig. 2 is a flowchart of a network slice request method according to an embodiment of the application. The method can be applied to electronic equipment, including but not limited to mobile phones, tablet computers, smart watches and the like. The method may comprise the steps of:
202. and receiving first feedback information sent by the first network equipment, wherein the first feedback information is used for indicating that the first network slice is in an unsigned state.
In the embodiment of the present application, the first network device may be a server, a server cluster, or the like that supports a network. Optionally, the first feedback information may include a cause value "0011" that is used to indicate that the corresponding network slice is in an unsigned state (i.e., the electronic device does not have permission to access the corresponding network slice). For example, "network slice 2with 0011" indicates that network slice 2 is in an unsigned state. Compared with the reason value of 0000, the reason value of 0011 can clearly indicate that the reason that the network slice access request is refused is that the network slice is in an unsigned state, so that when the reason that the first network device does not support the first network slice is eliminated, and the electronic device subsequently sends the network request to other network devices, the electronic device can not request to access the first network slice which is not signed any more, thereby avoiding wasting air interface resources. In addition, by the method, only a new cause value is needed to be added at the network equipment end, and an interactive protocol or network element between the electronic equipment and the network equipment is not needed to be upgraded, so that the method is simple and convenient to implement, and the improved cost is saved.
Alternatively, the first feedback information may include, but is not limited to, "registration accept (Registration Accept) information", "registration reject (Registration Reject) information", or "configuration update command (Configuration Update Command) information".
It should be further noted that, if the electronic device wants to possess an access right of a certain network slice, the electronic device needs to sign up with a corresponding network operator for the network slice. After signing, the electronic device has access rights to the network slice in the signing state, but does not have access rights to the network slice in the non-signing state. In contrast, the first network slice being in an unsigned state indicates that the electronic device does not have permission to access the first network slice.
In one embodiment, the first network device may send the first feedback information to the electronic device upon detecting that the first network slice is in an unsigned state. In another embodiment, in the event that the electronic device is in need of access to the first network slice, a second network request may be sent to the first network device, the second network request including at least a request to access the first network slice; and further, if the first network device determines that the first network slice is in an unsigned state under the condition that the first network device receives the second network request sent by the electronic device, the first network device may send the first feedback information to the electronic device.
By implementing the method, the first network device can feed back the first feedback information to the electronic device when the electronic device has the requirement of accessing the first network slice, so that the first network device is prevented from sending the first feedback information to the electronic device without the requirement of accessing the first network slice to inform the electronic device, and further waste of air interface resources is avoided.
204. And storing a first slice identifier corresponding to the first network slice to an unsigned list according to the first feedback information, wherein the unsigned list is used for storing slice identifiers corresponding to the network slices of which the electronic equipment does not have access rights.
In the embodiment of the application, when the electronic equipment receives the first feedback information, the electronic equipment can analyze the first feedback information to obtain an analysis result. For example, the electronic device analyzes the first feedback information, and the analysis result includes a cause value of "0011", and the cause value indicates that the corresponding network slice is in an unsigned state, so that the electronic device may determine that the first network slice is in the unsigned state.
Further, if the analysis result indicates that the first network slice is in an unsigned state, the electronic device may store the first slice identifier corresponding to the first network slice to the unsigned list according to the first feedback information. Alternatively, each network slice may correspond to a slice label, for example: network slice 1 may correspond to "S-NSSAI 1" and network slice 2 may correspond to "S-NSSAI 2", which are not limited herein. And the electronic equipment or the network equipment can conveniently identify and manage different network slices.
Optionally, the electronic device may include a storage medium including, but not limited to, non-volatile random access memory (Non-Volatile Random Access Memory, NVRAM), random access memory (random access memory, RAM), and is not limited herein. And the electronic equipment can further create an unsigned list in the storage medium, wherein the unsigned list is used for storing the slice identifications corresponding to the network slices which the electronic equipment does not have access rights. For example, the electronic device does not have the authority to access the network slice 2 (i.e. the network slice 2 is in an unsigned state), the electronic device may store the first slice identifier "S-NSSAI 2" corresponding to the network slice 2 in the unsigned list, so that the subsequent electronic device can determine which network slice is in the unsigned state according to the slice identifier stored in the unsigned list.
By implementing the method disclosed in the embodiments, the first network device may send the first feedback information for indicating that the first network slice is in an unsigned state to the electronic device, when the electronic device receives the first feedback information, it may determine that the electronic device does not have the authority to access the first network slice, and then the electronic device may store the first slice identifier corresponding to the first network slice into the unsigned list, and then the electronic device may not initiate an access request to the network slice having no access authority according to the unsigned list, so as to avoid the electronic device from requesting to access the unsigned network slice to the network device, and save network air interface resources; in addition, the electronic equipment can be prevented from requesting to access the unsigned network slice to the network equipment, and the network equipment refuses the interaction process of the request, so that the time for establishing connection between the electronic equipment and the network equipment can be shortened.
Referring to fig. 3, fig. 3 is a flowchart illustrating another network slice request method according to an embodiment of the present application. The method can be applied to electronic equipment, including but not limited to mobile phones, tablet computers, smart watches and the like. The method may comprise the steps of:
302. And receiving first feedback information sent by the first network equipment, wherein the first feedback information is used for indicating that the first network slice is in an unsigned state.
304. And storing a first slice identifier corresponding to the first network slice to an unsigned list according to the first feedback information, wherein the unsigned list is used for storing slice identifiers corresponding to the network slices of which the electronic equipment does not have access rights.
In one embodiment, after storing the first slice identifier corresponding to the first network slice in the unsigned list according to the first feedback information, the electronic device may delete the first slice identifier from the unsigned list after waiting for the first time period. Alternatively, the first duration may be set by the electronic device, the first network device, or the developer, which is not limited herein.
By implementing the method, the electronic device can delete the first slice identifier stored in the unsigned list after waiting for a period of time, so that the situation that the first network slice corresponding to the first slice identifier cannot be normally accessed all the time can be avoided, and normal access to the first network slice by the subsequent electronic device is ensured.
306. And under the condition that the electronic equipment roams from a first network corresponding to the first network equipment to a second network corresponding to the second network equipment, acquiring a second network slice to be accessed under the second network.
It should be noted that the second network slice to be accessed under the second network is a network slice to be requested to be accessed when the electronic device roams to the second network.
It will be appreciated that the electronic device may roam from one network to another when in a different location or when there are different network demands, to obtain better network services. When the electronic device roams from one network to another, it needs to re-access the network slice under the new network.
Alternatively, in the case that the electronic device roams from a first network corresponding to the first network device to a second network corresponding to the second network device, the electronic device may determine, according to a current network requirement of the electronic device, a second network slice to be accessed under the first network. Alternatively, the current network demand of the electronic device may be determined according to a scene (including, but not limited to, an autopilot scene, a virtual reality scene, a network game scene, etc.) in which the electronic device is currently located.
308. And removing the network slice in the unsigned state in the second network slice according to the unsigned list to obtain a third network slice in the signed state, and generating a first network request according to the third network slice.
Optionally, before sending the network request to the second network device, the electronic device may acquire an unsigned list from the storage medium, and determine a fourth network slice in an unsigned state according to the unsigned list, so that the electronic device may reject the fourth network slice included in the second network slice, to obtain a third network slice in a signed state.
For example, the second network slice to be accessed under the second network includes a network slice 1 and a network slice 2, and the first slice identifier stored in the unsigned list corresponds to the network slice 2, the electronic device may reject the network slice 2 to obtain the network slice 1 in the signed state.
Further, the electronic device may generate a first network request from the third network slice, the first network request including at least a request to access the third network slice.
310. A first network request is sent to a second network device.
Optionally, a data transmission link may be established between the electronic device and the second network device, and the electronic device may send the first network request to the second network device through the data transmission link.
By implementing the method disclosed in each embodiment, when the electronic device roams from the first network corresponding to the first network device to the second network corresponding to the second network device, an access request is not initiated to a network slice without access permission according to the unsigned list, so that the electronic device can be prevented from requesting to access the unsigned network slice to the network device, and network air interface resources are saved; in addition, the electronic equipment can be prevented from requesting to access the unsigned network slice to the network equipment, and the network equipment refuses the interaction process of the request, so that the time for establishing connection between the electronic equipment and the network equipment can be shortened; and the electronic device can delete the first slice identifier stored in the unsigned list after waiting for a period of time, so that the situation that the first network slice corresponding to the first slice identifier cannot be normally accessed all the time can be avoided, and normal access of the subsequent electronic device to the first network slice is ensured.
In order to more clearly describe the network slice request method disclosed in the embodiment of the present application, the following description is presented with reference to fig. 4, and fig. 4 is a timing chart disclosed in the embodiment of the present application, where:
Step 1: the electronic device 110 sends a second network request to the first network device 120, the second network request including at least a request to access the first network slice; step 2: when determining that the first network slice is in the unsigned state, the first network device 120 may send first feedback information to the electronic device 110, where the first feedback information is used to indicate that the first network slice is in the unsigned state; step 3: the electronic device 110 stores a first slice identifier corresponding to the first network slice to the unsigned list according to the first feedback information; step 4: the electronic device 110 may obtain a second network slice to be accessed under the second network when roaming from the first network corresponding to the first network device 120 to the second network corresponding to the second network device 130, reject a network slice in an unsigned state in the second network slice according to an unsigned list to obtain a third network slice in a signed state, and generate a first network request according to the third network slice; step 5: the first network request is sent to the second network device 130.
Referring to fig. 5, fig. 5 is a flowchart of another network slice request method according to an embodiment of the present application. The method can be applied to electronic equipment, including but not limited to mobile phones, tablet computers, smart watches and the like. The method may comprise the steps of:
502. and receiving first feedback information sent by the first network equipment, wherein the first feedback information is used for indicating that the first network slice is in an unsigned state.
504. And storing a first slice identifier corresponding to the first network slice to an unsigned list according to the first feedback information, wherein the unsigned list is used for storing slice identifiers corresponding to the network slices of which the electronic equipment does not have access rights.
506. And receiving an identification set sent by the first network equipment, wherein the network slices corresponding to the second slice identifications included in the identification set are network slices in a signed state, and the identification set is generated by the first network equipment according to the fact that the first network slices are recovered from an unsigned state to the signed state.
In the embodiment of the present application, when the first network device detects that the subscription information of the network slice changes (for example, the first network device switches from an unsigned state to a signed state, or switches from the signed state to an unsigned state, etc.), the first network device may send the subscription state change information of the network slice to the electronic device through a feedback mechanism, so that the electronic device may adjust the slice identifier in the unsigned list according to the subscription state change information (including, but not limited to, deleting the slice identifier or adding the slice identifier). Alternatively, the feedback mechanism may include "registration procedure" or "Generic UE configuration update procedure", without limitation.
In one embodiment, the first network device may generate an identifier set according to one or more second slice identifiers, where each network slice corresponding to the second identifier included in the identifier set is a network slice corresponding to the electronic device and currently in a signed state; the first network device may then send the set of identifications to the electronic device to let the electronic device determine which network slices are in a contracted state.
Alternatively, the identification set may include "Allowed NSSAI" or "Configured NSSAI"; wherein "Allowed NSSAI" represents the intersection of a network slice that the electronic device requests access to and a network slice that the first network device allows the electronic device to access; "Configured NSSAI" represents the network slice that the first network device assigns to the electronic device that allows access to the electronic device.
In another embodiment, the first network device includes a first management module and a second management module, where the first management module is configured to interact data with the electronic device, and the second management module is at least configured to store a subscription condition of the network slice corresponding to the first network device and the electronic device. Optionally, the first management module may include an access and mobility management module (ACCESS AND Mobility Management Function, AMF); the second management module may include a Unified data management module (Unified DATA MANAGEMENT, UDM).
In one embodiment, the second management module may generate corresponding state change information, where the state change information is used to indicate that the first network slice is switched from the unsigned state to the signed state, if the first network slice is determined to be switched from the unsigned state to the signed state; and the second management module can send the state change information to the first management module.
Further, the first management module may generate an identification set according to the received state change information, and send the identification set to the electronic device. Optionally, the identifier set includes at least a slice identifier corresponding to a first network slice that is switched from the contracted state to the contracted state.
Further, under the condition that the electronic device receives the identifier set sent by the first management module, if it is determined that the second slice identifier included in the identifier set includes the first slice identifier, the first slice identifier may be deleted from the subscription list.
In another embodiment, the first network device may send second feedback information to the electronic device when determining that the network slice corresponding to the first network device and the subscription condition of the electronic device change, where the second feedback information is used to indicate that the network slice corresponding to the first network device and the subscription condition of the electronic device change; and the electronic device may delete the first slice identifier included in the unsigned list according to the second feedback information after receiving the second feedback information sent by the first network device.
Alternatively, the second feedback information may include "registration accept (Registration Accept) information" or "configuration update command (Configuration Update Command) information", and the "registration accept (Registration Accept) information" or "configuration update command (Configuration Update Command) information" carries information of subscription information change of the network slice.
By implementing the method, the electronic device can delete the slice identifiers in the unsigned list under the condition that the network slice corresponding to the first network device and the subscription condition of the electronic device are detected to change, so that the situation that the subsequent electronic device cannot access the network slice corresponding to the slice identifier in the unsigned list all the time is avoided, and the subsequent electronic device can access the network slice normally is ensured.
508. If the identification set comprises the first slice identification, deleting the first slice identification from the unsigned list.
Further, after receiving the identifier set sent by the first network device, if it is determined that the second slice identifier included in the identifier set includes the first slice identifier, the electronic device may delete the first slice identifier from the unsigned list.
It can be understood that the network slices corresponding to the second slice identifiers included in the identifier set are all network slices in the signed state, so when the second slice identifiers include the first slice identifiers, it is indicated that the first network slices corresponding to the first slice identifiers have been restored to the signed state, and then the electronic device can delete the first slice identifiers from the unsigned list, so as to avoid that the first network slices corresponding to the first slice identifiers cannot be normally accessed all the time, and ensure normal access to the first network slices by subsequent electronic devices.
By implementing the method, the first network device can feed back the slice identifier corresponding to the signed network slice to the electronic device, so that the electronic device can delete the slice identifier of the network slice restored to the signed state from the unsigned list, and the first network slice corresponding to the first slice identifier can not be normally accessed all the time, so that normal access of the subsequent electronic device to the first network slice is ensured.
By implementing the method disclosed by the embodiments, the electronic equipment can be prevented from requesting to access the unsigned network slice to the network equipment, and network air interface resources are saved; in addition, the electronic equipment can be prevented from requesting to access the unsigned network slice to the network equipment, and the network equipment refuses the interaction process of the request, so that the time for establishing connection between the electronic equipment and the network equipment can be shortened; the electronic equipment can delete the slice identifiers in the unsigned list under the condition that the network slice corresponding to the first network equipment and the subscription condition of the electronic equipment are detected to change, so that the situation that the subsequent electronic equipment cannot access the network slice corresponding to the slice identifier in the unsigned list all the time is avoided, and the subsequent electronic equipment can access the network slice normally is ensured; and the first network device can feed back the slice identifier corresponding to the signed network slice to the electronic device, so that the electronic device can delete the slice identifier of the network slice restored to the signed state from the unsigned list, and the first network slice corresponding to the first slice identifier can not be normally accessed all the time, so that normal access of the subsequent electronic device to the first network slice is ensured.
In order to more clearly describe the network slice request method disclosed in the embodiment of the present application, the following description is presented with reference to fig. 6, and fig. 6 is another timing diagram disclosed in the embodiment of the present application, where: the first network device 120 may include a first management module 140 and a second management module 150;
Step 1: the electronic device 110 sends a second network request to the first management module 140, the second network request including at least a request to access the first network slice; step 2: when the first network device 120 determines that the first network slice is in the unsigned state, the first network device may send, through the first management module 140, first feedback information to the electronic device 110, where the first feedback information is used to indicate that the first network slice is in the unsigned state; step 3: the electronic device 110 stores a first slice identifier corresponding to the first network slice to the unsigned list according to the first feedback information; step 4: the second management module 150 may generate corresponding state change information and send the state change information to the first management module 140 when determining that the first network slice is switched from the unsigned state to the signed state; step 5: the first management module 140 generates an identification set according to the state change information and sends the identification set to the electronic device 110; step 6: upon determining that the set of identifications includes the first tile identification, the electronic device 110 deletes the first tile identification from the unsigned list.
Referring to fig. 7, fig. 7 is a flowchart of a request method for a network slice according to another embodiment of the present application. The method may be applied to a first network device including, but not limited to, a network-enabled server, a server cluster, etc. The method may comprise the steps of:
702. a second network request sent by the electronic device is received, the second network request including at least a request to access the first network slice.
704. And under the condition that the first network slice is determined to be in an unsigned state, sending first feedback information to the electronic equipment, so that the electronic equipment stores a first slice identifier corresponding to the first network slice into an unsigned list according to the first feedback information, wherein the unsigned list is used for storing slice identifiers corresponding to the network slices of which the electronic equipment does not have access rights.
In one embodiment, after the first network device sends the first feedback information to the electronic device, an identifier set may be generated according to one or more second slice identifiers, where each network slice corresponding to the second identifier included in the identifier set is a network slice corresponding to the electronic device and currently in a signed state; and the first network device may send an identifier set to the electronic device, where the identifier set is configured to enable the electronic device to delete the first slice identifier from the unsigned list when it is determined that the identifier set includes the first slice identifier.
By implementing the method, the first network device can feed back the slice identifier corresponding to the signed network slice to the electronic device, so that the electronic device can delete the slice identifier of the network slice restored to the signed state from the unsigned list, and the first network slice corresponding to the first slice identifier can not be normally accessed all the time, so that normal access of the subsequent electronic device to the first network slice is ensured.
In another embodiment, the first network device may include a first management module and a second management module, where the first management module is configured to interact data with the electronic device, and the second management module is at least configured to store a subscription condition of a network slice corresponding to the first network device and the electronic device; and the first network device can generate corresponding state change information through the second management module under the condition that the first network slice is determined to be switched from an unsigned state to a signed state, and send the state change information to the first management module; and the first network device can generate an identification set according to the state change information through the first management module, and send the identification set to the electronic device through the first management module.
By implementing the method, the first network device can feed back the slice identifier corresponding to the signed network slice to the electronic device, so that the electronic device can delete the slice identifier of the network slice restored to the signed state from the unsigned list, and the first network slice corresponding to the first slice identifier can not be normally accessed all the time, so that normal access of the subsequent electronic device to the first network slice is ensured.
In an embodiment, the first network device may send second feedback information to the electronic device when it is determined that the network slice corresponding to the first network device changes with the subscription condition of the electronic device, so that the electronic device deletes the identifier included in the unsigned list according to the second feedback information.
By implementing the method, the electronic device can delete the slice identifiers in the unsigned list under the condition that the network slice corresponding to the first network device and the subscription condition of the electronic device are detected to change, so that the situation that the subsequent electronic device cannot access the network slice corresponding to the slice identifier in the unsigned list all the time is avoided, and the subsequent electronic device can access the network slice normally is ensured.
By implementing the method disclosed in the embodiments, when the first network device receives the first network request sent by the electronic device, the first network device may send first feedback information for indicating that the first network slice is in an unsigned state to the electronic device, and when the electronic device receives the first feedback information, the electronic device may determine that the electronic device does not have permission to access the first network slice, so that the electronic device may store the first slice identifier corresponding to the first network slice in an unsigned list, and then the electronic device may not initiate an access request to the network slice having no access permission according to the unsigned list, thereby avoiding the electronic device from requesting to access the network slice having no subscription to the network device, and saving network air interface resources; in addition, the electronic equipment can be prevented from requesting to access the unsigned network slice to the network equipment, and the network equipment refuses the interaction process of the request, so that the time for establishing connection between the electronic equipment and the network equipment can be shortened.
Referring to fig. 8, fig. 8 is a schematic structural diagram of a network slice requesting device according to an embodiment of the present application, which can be applied to electronic devices including, but not limited to, mobile phones, tablet computers, smart watches, etc. The apparatus may include a first receiving unit 802 and a storage unit 804, wherein:
a first receiving unit 802, configured to receive first feedback information sent by a first network device, where the first feedback information is used to indicate that a first network slice is in an unsigned state;
The storage unit 804 is configured to store, according to the first feedback information, a first identifier corresponding to the first network slice to an unsigned list, where the unsigned list is used to store a slice identifier corresponding to a network slice that the electronic device does not have access rights.
By implementing the device, the first network device can send the first feedback information for indicating that the first network slice is in the unsigned state to the electronic device, when the electronic device receives the first feedback information, the electronic device can determine that the electronic device does not have the authority for accessing the first network slice, and further the electronic device can store the first slice identifier corresponding to the first network slice into the unsigned list, and then the electronic device can initiate an access request to the network slice which does not have the access authority according to the unsigned list, so that the electronic device can be prevented from requesting to access the unsigned network slice to the network device, and network air interface resources are saved; in addition, the electronic equipment can be prevented from requesting to access the unsigned network slice to the network equipment, and the network equipment refuses the interaction process of the request, so that the time for establishing connection between the electronic equipment and the network equipment can be shortened.
As an alternative embodiment, the apparatus shown in fig. 8 may further include an acquisition unit, a first generation unit, and a second transmission unit, which are not shown, wherein:
The acquisition unit is used for acquiring a second network slice to be accessed under a second network under the condition that the electronic equipment roams from a first network corresponding to the first network equipment to the second network corresponding to the second network equipment after storing a first slice identifier corresponding to the first network slice into an unsigned list according to the first feedback information;
The first generation unit is used for removing the network slice in the unsigned state in the second network slice according to the unsigned list to obtain a third network slice in the signed state, and generating a first network request according to the third network slice;
And the second sending unit is used for sending the first network request to the second network equipment.
By implementing the device, the first network device can send the first feedback information for indicating that the first network slice is in the unsigned state to the electronic device, when the electronic device receives the first feedback information, the electronic device can determine that the electronic device does not have the authority for accessing the first network slice, and then the electronic device can store the first slice identifier corresponding to the first network slice into the unsigned list, and then the electronic device can initiate an access request to the network slice which does not have the access authority according to the unsigned list, so that the electronic device can be prevented from requesting to access the unsigned network slice to the network device, and network air interface resources are saved.
As an alternative embodiment, the apparatus shown in fig. 8 may further include a third receiving unit and a first deleting unit, which are not shown, wherein:
The third receiving unit is used for receiving an identification set sent by the first network device after the first slice identification corresponding to the first network slice is stored in the unsigned list according to the first feedback information, the network slice corresponding to each second slice identification included in the identification set is a network slice in a signed state, and the identification set is generated by the first network device according to the restoration of the first network slice from the unsigned state to the signed state;
And the first deleting unit is used for deleting the first slice identifier from the unsigned list when the first slice identifier is determined to be included in the identifier set.
By implementing the device, the first network device can feed back the slice identifier corresponding to the signed network slice to the electronic device, so that the electronic device can delete the slice identifier of the network slice restored to the signed state from the unsigned list, and the situation that the first network slice corresponding to the first slice identifier cannot be normally accessed all the time is avoided, so that the normal access of the subsequent electronic device to the first network slice is ensured.
As an optional implementation manner, the first network device includes a first management module and a second management module, the first management module is used for performing data interaction with the electronic device, and the second management module is at least used for storing the subscription condition of the network slice corresponding to the first network device and the electronic device; ; and the third receiving unit is also used for receiving an identification set sent by the first management module, wherein the identification set is generated by the first management module according to the state change information sent by the second management module, and the state change information at least comprises that the first network slice is switched from an unsigned state to a signed state.
By implementing the device, the first network device can feed back the slice identifier corresponding to the signed network slice to the electronic device, so that the electronic device can delete the slice identifier of the network slice restored to the signed state from the unsigned list, and the situation that the first network slice corresponding to the first slice identifier cannot be normally accessed all the time is avoided, so that the normal access of the subsequent electronic device to the first network slice is ensured.
As an alternative embodiment, the apparatus shown in fig. 8 may further include a second deletion unit, not shown, wherein:
And the second deleting unit is used for deleting the first slice identifier from the unsigned list after waiting for the first time after storing the first slice identifier corresponding to the first network slice into the unsigned list according to the first feedback information.
By implementing the device, the electronic equipment can delete the first slice identifier stored in the unsigned list after waiting for a period of time, so that the situation that the first network slice corresponding to the first slice identifier cannot be normally accessed all the time can be avoided, and normal access to the first network slice by the subsequent electronic equipment is ensured.
As an alternative embodiment, the apparatus shown in fig. 8 may further include a fourth receiving unit and a third deleting unit, which are not shown, wherein:
The fourth receiving unit is used for receiving second feedback information sent by the first network equipment, and the second feedback information is used for indicating that the signing condition of the network slice corresponding to the first network equipment and the electronic equipment is changed;
And the third deleting unit is used for deleting the first slice identifier included in the unsigned list according to the second feedback information.
By implementing the device, the electronic equipment can delete the slice identifiers in the unsigned list under the condition that the network slice corresponding to the first network equipment and the subscription condition of the electronic equipment are detected to change, so that the situation that the subsequent electronic equipment cannot access the network slice corresponding to the slice identifier in the unsigned list all the time is avoided, and the subsequent electronic equipment can access the network slice normally.
As an alternative embodiment, the apparatus shown in fig. 8 may further include a third transmitting unit, not shown, in which:
and the third sending unit is used for sending a second network request to the first network device before receiving the first feedback information sent by the first network device, wherein the second network request at least comprises a request for accessing the first network slice, so that the first network device sends the first feedback information to the electronic device under the condition that the first network slice is determined to be in an unsigned state.
By implementing the device, the first network device can feed back the first feedback information to the electronic device when the electronic device has the requirement of accessing the first network slice, so that the first network device is prevented from sending the first feedback information to the electronic device without the requirement of accessing the first network slice to inform the electronic device, and further waste of air interface resources is avoided.
Referring to fig. 9, fig. 9 is a schematic structural diagram of another network slice requesting device according to an embodiment of the present application, where the device may be applied to a first network device, including but not limited to a server supporting a network, a server cluster, etc. The apparatus may include a second receiving unit 902 and a first transmitting unit 904, wherein:
A second receiving unit 902, configured to receive a second network request sent by the electronic device, where the second network request includes at least a request to access the first network slice;
The first sending unit 904 is configured to send first feedback information to the electronic device when it is determined that the first network slice is in an unsigned state, so that the electronic device stores, according to the first feedback information, a first slice identifier corresponding to the first network slice to an unsigned list, where the unsigned list is used to store slice identifiers corresponding to network slices that the electronic device does not have access rights.
By implementing the device, when the first network device receives the first network request sent by the electronic device, the first network device can send first feedback information for indicating that the first network slice is in an unsigned state to the electronic device, when the electronic device receives the first feedback information, the electronic device can determine that the electronic device does not have the authority to access the first network slice, and then the electronic device can store the first slice identifier corresponding to the first network slice into an unsigned list, and then the subsequent electronic device can not initiate an access request to the network slice which does not have the access authority according to the unsigned list, so that the electronic device can be prevented from requesting to access the network slice which does not have the access authority to the network device, and network air interface resources are saved; in addition, the electronic equipment can be prevented from requesting to access the unsigned network slice to the network equipment, and the network equipment refuses the interaction process of the request, so that the time for establishing connection between the electronic equipment and the network equipment can be shortened.
As an alternative embodiment, the apparatus shown in fig. 9 may further include a second generating unit and a fourth transmitting unit, which are not shown, wherein:
The second generation unit is used for generating an identification set after the first feedback information is sent to the electronic equipment, wherein the network slice corresponding to each second identification included in the identification set is the network slice corresponding to the electronic equipment and currently in a signed state;
And the fourth sending unit is used for sending an identification set to the electronic equipment, and the identification set is used for enabling the electronic equipment to delete the first slice identification from the unsigned list when determining that the identification set comprises the first slice identification.
By implementing the device, the first network device can feed back the slice identifier corresponding to the signed network slice to the electronic device, so that the electronic device can delete the slice identifier of the network slice restored to the signed state from the unsigned list, and the situation that the first network slice corresponding to the first slice identifier cannot be normally accessed all the time is avoided, so that the normal access of the subsequent electronic device to the first network slice is ensured.
As an optional implementation manner, the first network device includes a first management module and a second management module, the first management module is used for performing data interaction with the electronic device, and the second management module is at least used for storing the subscription condition of the network slice corresponding to the first network device and the electronic device; ; the fourth sending unit is further configured to generate corresponding state change information and send the state change information to the first management module when the second management module determines that the first network slice is switched from the non-signed state to the signed state; and generating an identification set according to the state change information through the first management module, and sending the identification set to the electronic equipment through the first management module.
By implementing the device, the first network device can feed back the slice identifier corresponding to the signed network slice to the electronic device, so that the electronic device can delete the slice identifier of the network slice restored to the signed state from the unsigned list, and the situation that the first network slice corresponding to the first slice identifier cannot be normally accessed all the time is avoided, so that the normal access of the subsequent electronic device to the first network slice is ensured.
As an alternative embodiment, the apparatus shown in fig. 9 may further include a fifth transmitting unit, not shown, in which:
And the fifth sending unit is used for sending second feedback information to the electronic equipment under the condition that the subscription conditions of the network slice corresponding to the first network equipment and the electronic equipment are determined to be changed, so that the electronic equipment deletes the identifiers included in the non-subscription list according to the second feedback information.
By implementing the device, the electronic equipment can delete the slice identifiers in the unsigned list under the condition that the network slice corresponding to the first network equipment and the subscription condition of the electronic equipment are detected to change, so that the situation that the subsequent electronic equipment cannot access the network slice corresponding to the slice identifier in the unsigned list all the time is avoided, and the subsequent electronic equipment can access the network slice normally.
Referring to fig. 10, fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the application.
As shown in fig. 10, the electronic device may include:
A memory 1001 in which executable program codes are stored;
A processor 1002 coupled to the memory 1001;
The processor 1002 invokes executable program codes stored in the memory 1001, and executes the method for requesting a network slice applied to the electronic device disclosed in the above embodiments, or executes the method for requesting a network slice applied to the first network device disclosed in the above embodiments.
An embodiment of the present application discloses a computer-readable storage medium storing a computer program, where the computer program causes a computer to execute a method for requesting a network slice applied to an electronic device disclosed in the above embodiments, or execute a method for requesting a network slice applied to a first network device disclosed in the above embodiments.
The embodiment of the application also discloses an application release platform, wherein the application release platform is used for releasing a computer program product, and the computer program product is used for enabling the computer to execute part or all of the steps of the method in the method embodiments.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present application. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. Those skilled in the art will also appreciate that the embodiments described in the specification are alternative embodiments and that the acts and modules referred to are not necessarily required for the present application.
In various embodiments of the present application, it should be understood that the sequence numbers of the foregoing processes do not imply that the execution sequences of the processes should be determined by the functions and internal logic of the processes, and should not be construed as limiting the implementation of the embodiments of the present application.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units described above, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer-accessible memory. Based on this understanding, the technical solution of the present application, or a part contributing to the prior art or all or part of the technical solution, may be embodied in the form of a software product stored in a memory, comprising several requests for a computer device (which may be a personal computer, a server or a network device, etc., in particular may be a processor in a computer device) to execute some or all of the steps of the above-mentioned method of the various embodiments of the present application.
Those of ordinary skill in the art will appreciate that all or part of the steps of the various methods of the above embodiments may be implemented by a program that instructs associated hardware, the program may be stored in a computer readable storage medium including Read-Only Memory (ROM), random access Memory (Random Access Memory, RAM), programmable Read-Only Memory (Programmable Read-Only Memory, PROM), erasable programmable Read-Only Memory (Erasable Programmable Read Only Memory, EPROM), one-time programmable Read-Only Memory (OTPROM), electrically erasable programmable Read-Only Memory (EEPROM), compact disc Read-Only Memory (Compact Disc Read-Only Memory, CD-ROM) or other optical disk Memory, magnetic disk Memory, tape Memory, or any other medium that can be used for carrying or storing data.
The network slice request method and device, the electronic device and the storage medium disclosed in the embodiments of the present application are described in detail, and specific examples are applied to illustrate the principles and the implementation of the present application, and the description of the above embodiments is only used to help understand the method and the core idea of the present application; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present application, the present description should not be construed as limiting the present application in view of the above.
Claims (14)
1. A method of requesting a network slice, for application to an electronic device, the method comprising:
Receiving first feedback information sent by first network equipment, wherein the first feedback information is used for indicating that a first network slice is in an unsigned state;
Storing a first slice identifier corresponding to the first network slice into an unsigned list according to the first feedback information, wherein the unsigned list is used for storing slice identifiers corresponding to network slices which do not have access rights of the electronic equipment;
Acquiring a second network slice to be accessed under a second network under the condition that the electronic equipment roams from a first network corresponding to the first network equipment to the second network corresponding to the second network equipment;
Removing the network slice in the unsigned state in the second network slice according to the unsigned list to obtain a third network slice in the signed state, and generating a first network request according to the third network slice;
and sending the first network request to the second network device.
2. The method of claim 1, wherein after the storing the first slice identifier corresponding to the first network slice to the unsigned list according to the first feedback information, the method further comprises:
receiving an identification set sent by the first network device, wherein the network slices corresponding to the second slice identifications included in the identification set are network slices in a signed state, and the identification set is generated by the first network device according to restoration of the first network slices from the unsigned state to the signed state;
and if the identification set comprises the first slice identification, deleting the first slice identification from the unsigned list.
3. The method of claim 2, wherein the first network device includes a first management module and a second management module, the first management module is configured to perform data interaction with the electronic device, and the second management module is at least configured to store a subscription condition of a network slice corresponding to the first network device and the electronic device; the receiving the identifier set sent by the first network device includes:
And receiving an identification set sent by the first management module, wherein the identification set is generated by the first management module according to state change information sent by the second management module, and the state change information at least comprises that the first network slice is switched from an unsigned state to a signed state.
4. The method of claim 1, wherein after the storing the first slice identifier corresponding to the first network slice to the unsigned list according to the first feedback information, the method further comprises:
The first slice identity is deleted from the unsigned list after waiting for a first time period.
5. The method according to claim 1, wherein the method further comprises:
Receiving second feedback information sent by the first network device, wherein the second feedback information is used for indicating that a subscription condition of a network slice corresponding to the first network device and the electronic device is changed;
And deleting the first slice identifier included in the unsigned list according to the second feedback information.
6. The method according to any one of claims 1-5, wherein before the receiving the first feedback information sent by the first network device, the method further comprises:
And sending a second network request to the first network device, wherein the second network request at least comprises a request for accessing a first network slice, so that the first network device sends first feedback information to the electronic device under the condition that the first network slice is determined to be in an unsigned state.
7. A method of requesting a network slice, applied to a first network device, the method comprising:
Receiving a second network request sent by the electronic equipment, wherein the second network request at least comprises a request for accessing the first network slice;
And under the condition that the first network slice is determined to be in an unsigned state, sending first feedback information to the electronic equipment, so that the electronic equipment stores a first slice identifier corresponding to the first network slice into an unsigned list according to the first feedback information, under the condition that the electronic equipment roams from a first network corresponding to the first network equipment to a second network corresponding to the second network equipment, the electronic equipment obtains a second network slice to be accessed under the second network, and according to the unsigned list, eliminating the network slice in the second network slice in the unsigned state to obtain a third network slice in the signed state, generating a first network request according to the third network slice, and sending the first network request to the second network equipment, wherein the unsigned list is used for storing the slice identifier corresponding to the network slice of the electronic equipment which does not have access authority.
8. The method of claim 7, wherein after the sending the first feedback information to the electronic device, the method further comprises:
Generating an identification set and sending the identification set to the electronic equipment, wherein the identification set comprises one or more second slice identifications, a network slice corresponding to each second slice identification is a network slice corresponding to the electronic equipment and currently in a signed state, and the identification set is used for enabling the electronic equipment to delete the first slice identification from the unsigned list when determining that the identification set comprises the first slice identification.
9. The method of claim 8, wherein the first network device includes a first management module and a second management module, the first management module is configured to perform data interaction with the electronic device, and the second management module is at least configured to store a subscription condition of a network slice corresponding to the first network device and the electronic device; the generating the identification set and sending the identification set to the electronic device includes:
under the condition that the first network slice is determined to be switched from an unsigned state to a signed state through the second management module, corresponding state change information is generated, and the state change information is sent to the first management module;
And generating an identification set according to the state change information through the first management module, and sending the identification set to the electronic equipment through the first management module.
10. The method of claim 7, wherein the method further comprises:
and under the condition that the network slice corresponding to the first network device and the signing condition of the electronic device are determined to be changed, sending second feedback information to the electronic device, so that the electronic device deletes the identification included in the unsigned list according to the second feedback information.
11. A request device for network slicing, applied to an electronic device, the device comprising:
The first receiving unit is used for receiving first feedback information sent by the first network equipment, wherein the first feedback information is used for indicating that a first network slice is in an unsigned state;
the storage unit is used for storing a first slice identifier corresponding to the first network slice into an unsigned list according to the first feedback information, wherein the unsigned list is used for storing slice identifiers corresponding to network slices which do not have access rights of the electronic equipment;
The acquiring unit is configured to acquire a second network slice to be accessed under a second network device when the electronic device roams from a first network corresponding to the first network device to the second network corresponding to the second network device after storing a first slice identifier corresponding to the first network slice into an unsigned list according to the first feedback information;
the first generation unit is used for removing the network slice in the unsigned state in the second network slice according to the unsigned list to obtain a third network slice in the signed state, and generating a first network request according to the third network slice;
and the second sending unit is used for sending the first network request to the second network equipment.
12. A network slice requesting apparatus for use with a first network device, the apparatus comprising:
A second receiving unit, configured to receive a second network request sent by an electronic device, where the second network request at least includes a request to access the first network slice;
The first sending unit is configured to send first feedback information to the electronic device when it is determined that the first network slice is in an unsigned state, so that the electronic device stores a first slice identifier corresponding to the first network slice into an unsigned list according to the first feedback information, and when the electronic device roams from a first network corresponding to the first network device to a second network corresponding to the second network device, so that the electronic device obtains a second network slice to be accessed under the second network, and eliminates the network slice in the unsigned state in the second network slice according to the unsigned list, so as to obtain a third network slice in the signed state, generates a first network request according to the third network slice, and sends the first network request to the second network device, where the unsigned list is used for storing the slice identifier corresponding to the network slice in which the electronic device does not have access rights.
13. An electronic device comprising a memory storing executable program code, and a processor coupled to the memory; wherein the processor invokes the executable program code stored in the memory to perform the method of any one of claims 1-6 or 7-10.
14. A computer readable storage medium storing a computer program, which when executed by a processor implements the method of any one of claims 1-6 or 7-10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210312620.3A CN114679720B (en) | 2022-03-28 | 2022-03-28 | Network slice request method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210312620.3A CN114679720B (en) | 2022-03-28 | 2022-03-28 | Network slice request method and device, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114679720A CN114679720A (en) | 2022-06-28 |
CN114679720B true CN114679720B (en) | 2024-07-09 |
Family
ID=82076335
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210312620.3A Active CN114679720B (en) | 2022-03-28 | 2022-03-28 | Network slice request method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114679720B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107580360A (en) * | 2016-07-04 | 2018-01-12 | 中国移动通信有限公司研究院 | A kind of network is cut into slices method, equipment and the network architecture of selection |
CN111885698A (en) * | 2020-07-22 | 2020-11-03 | Oppo广东移动通信有限公司 | Network slice registration method, device, terminal and storage medium |
CN112118120A (en) * | 2019-06-20 | 2020-12-22 | 中国电信股份有限公司 | Slicing signing method, system and computer readable storage medium |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107318113B (en) * | 2016-04-27 | 2021-09-21 | 华为技术有限公司 | Network slice processing method and device |
CN109560948B (en) * | 2017-09-25 | 2021-01-29 | 华为技术有限公司 | Network slice deployment method and related equipment |
CN113965463B (en) * | 2020-06-29 | 2024-08-27 | 中兴通讯股份有限公司 | Network slice switching method, terminal, storage medium and electronic device |
CN113098726B (en) * | 2021-06-10 | 2021-09-03 | 深圳艾灵网络有限公司 | Network slicing method, device and storage medium |
-
2022
- 2022-03-28 CN CN202210312620.3A patent/CN114679720B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107580360A (en) * | 2016-07-04 | 2018-01-12 | 中国移动通信有限公司研究院 | A kind of network is cut into slices method, equipment and the network architecture of selection |
CN112118120A (en) * | 2019-06-20 | 2020-12-22 | 中国电信股份有限公司 | Slicing signing method, system and computer readable storage medium |
CN111885698A (en) * | 2020-07-22 | 2020-11-03 | Oppo广东移动通信有限公司 | Network slice registration method, device, terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN114679720A (en) | 2022-06-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106572517B (en) | The processing method of network slice, the selection method and device for accessing network | |
EP2262288A1 (en) | Service realization method, device and system based on position | |
CN112822756B (en) | Communication method, system, base station and terminal | |
CN113573372B (en) | Cell selection method and terminal | |
CN113841429B (en) | Communication network component and method for initiating slice specific authentication and authorization | |
EP4329392A1 (en) | Registration method and apparatus for terminal ue, electronic device, and storage medium | |
CN113825121A (en) | Delaying delivery of eSIM to an auxiliary mobile wireless device subscribing to cellular wireless service | |
CN111526546A (en) | Cell switching method and device, and user processing method and device | |
CN114765623A (en) | Information subscribing method, information distributing method and device | |
CN113727325B (en) | Session processing method and related equipment | |
CN114679720B (en) | Network slice request method and device, electronic equipment and storage medium | |
CN113796156B (en) | Communication network component and method for processing service requests | |
CN110460989B (en) | Method, device and system for setting telephone number | |
CN114828106B (en) | Method and user terminal for realizing mobility management | |
CN112312420B (en) | Method and device for processing and configuring minimization of drive test, terminal and network side equipment | |
US20220417834A1 (en) | Communication method, system, base station, and terminal | |
CN110167064B (en) | Method, network element, terminal and system for controlling terminal access | |
EP3174331A1 (en) | Method and device for initiating mobility management process | |
CN112702767A (en) | Method and system for AMF redistribution | |
CN112968868A (en) | Method and device for opening service | |
CN116032573B (en) | Method, terminal, platform, equipment and medium for multi-user sharing slice service | |
CN116321110B (en) | Service subscription method, device, service providing network element and storage medium | |
CN113079584B (en) | Session management method of EC platform, SMF network element and AMF network element | |
CN116074903A (en) | Session establishment method, apparatus and storage medium | |
US20220417754A1 (en) | Platform system for controlling vertical service of mobile communication network, and method for controlling same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |