CN111200812B - Method for accelerating NFs mutual discovery in 5G core network - Google Patents
Method for accelerating NFs mutual discovery in 5G core network Download PDFInfo
- Publication number
- CN111200812B CN111200812B CN202010014267.1A CN202010014267A CN111200812B CN 111200812 B CN111200812 B CN 111200812B CN 202010014267 A CN202010014267 A CN 202010014267A CN 111200812 B CN111200812 B CN 111200812B
- Authority
- CN
- China
- Prior art keywords
- cache
- nfs
- key value
- nrf
- discovery
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention provides a method for accelerating NFs mutual discovery in a 5G core network, which adopts reference factors of a NFs local cache NRF discovery result and a mode of mapping the position and state information of an opposite end NF by using a cache mapping table, avoids NFs repeated NRF query, improves NFs mutual discovery efficiency, and provides a mode of dynamically modifying a configuration file on NFs according to network deployment requirements, so that a network administrator can change the reference factors of a certain NF cache with minimum cost.
Description
Technical Field
The invention relates to the technical field of mobile communication, in particular to a method for accelerating NFs mutual discovery in a 5G core network.
Background
In a service-based architecture SBA of a 5G core network (abbreviated as 5GC), network element functions are subdivided, more network functional entities NFs are evolved, and the NFs need to be subjected to mutual discovery and selection processes firstly if the NFs need to communicate with each other. The methods for NFs to discover each other are defined in versions R15 and R16 of the 3GPP protocol TS23501-g30, namely, local acquisition and NRF discovery. In the two discovery modes, local acquisition usually adopts a mode of writing a static configuration file into NF address information of an opposite terminal. If the NRF discovery mode is adopted, different reference Factors (such as DNN, S-NSSAI, etc.) need to be adopted according to different NF types through NRF discovery, which may cause that the reference Factors discovered each time are the same, the same NF is repeatedly accessed for many times, resulting in network resource waste and network efficiency reduction. Table one lists some optional Factors corresponding to NF found in TS23501-g30 protocol (the specific Factors use is determined by operator policy and network deployment).
AMF | SMF | AUSF | UPF |
S-NSSAI | DNN | PLMN | DNN |
AMF Region ID | S-NSSAI | Routing Indicator | S-NSSAI |
AMF Set ID | NSI-ID | Group ID | SSC mode |
PLMN | Access Type | SUPI | PDU Session Type |
TABLE 1
In various related patent schemes related to NFs mutual discovery content of 5GC networks, for example, "method, device and readable storage medium for NF discovery through NRF" of chinese patent application publication No. CN109803242A, "network function NF management method and NF management device" of chinese patent application publication No. CN109417492A, "method and device for discovering network function service" of chinese patent application publication No. CN109391592A, all have no content for accelerating NFs mutual discovery.
NFs mutual discovery mode, the 3GPP protocol gives two modes (local acquisition and NRF discovery) and NFs mutually selected Factors, which are actually used depending on the network needs. The local acquisition adopts a static configuration file mode, the network flexibility is poor, the configuration file needs to be changed once other NFs location information is changed, and the location information of roaming NFs cannot be acquired. While the NRF discovery mode may cause repeated access (for example, the AMF discovers the same SMF multiple times), which results in network resource waste and network efficiency reduction, NFs may cache the NRF query result for the next discovery, so far, there is no public caching method and algorithm. Even though NFs caches NRF discovery results locally, there is no corresponding factor corresponding to the discovery results, and the network administrator cannot configure the cached factor type in NFs, once the network deployment changes, the Factors cannot be dynamically adjusted, the network mode will be rigid, and the discovery policy and NFs processing efficiency cannot be optimized.
Disclosure of Invention
In view of the above, to solve the problems in the prior art, the present invention is to accelerate NFs mutual discovery process, mainly to solve the problem that when NFs mutual discovery occurs, the network communication efficiency is reduced due to repeated access to NRF. Meanwhile, the invention improves the flexibility of NFs in mutual discovery.
The purpose of the invention is realized by the following technical scheme:
the invention provides a method for accelerating NFs mutual discovery in a 5G core network, which comprises the following steps:
step S1, when the NF needs to communicate with the opposite end NF, the NF decodes the message triggering the communication process to obtain data or obtains the type and reference factor of the opposite end NF from the NF stored data;
step S2, the NF obtains the type of the opposite terminal NF generated by the strategy configuration file configured by the network administrator and the key value template generated in the initialization stage from the self cache;
step S3, judging whether the type of the NF of the opposite terminal exists in the self cache of the step S2, if so, combining the corresponding key value template and the reference factor in the self cache to generate the key value of the cache mapping table, and turning to the step S4; otherwise go to step S5;
step S4, judging whether the key value has a mapping value in the cache mapping table, if yes, directly obtaining the mapping value to communicate with an opposite terminal NF, otherwise, turning to step S5;
and step S5, the NF sends an opposite end NF discovery request to the NRF, the NRF returns the position and state information of the opposite end NF according to the NF request, and the NRF returns the result to directly communicate with the opposite end NF.
Further, step S5 includes a step of updating the cache mapping table according to the result returned by the NRF.
Further, the step of updating the cache mapping table is as follows: when the NF receives the information of the NF position and the state of the opposite terminal returned by the NRF, the NF firstly decodes the information, then generates a key value according to the decoded reference factor and the key value template in the cache, and updates the generated key value into a cache mapping table.
Further, the step of generating the key-value template in the initialization stage includes:
step S201, reading each caching strategy configured by a network administrator from a strategy configuration file, wherein each caching strategy comprises the type of each NF and a corresponding reference factor;
step S202, generating a policy table in a cache;
and step S203, generating a key value template in the cache according to the NFs types in the policy table and the corresponding reference factors.
Further, the generating a key value of the cache mapping table includes:
in the process of generating the key value template, the reference factors are substituted for the placeholders through the programming language interface, and the unique key value in the cache mapping table is generated.
Further, the mapping value is an IP address of the NF of the opposite end or a fully qualified domain name.
The invention has the beneficial effects that:
1. by using NFs local cache hash address mapping table, the efficiency of NFs mutual discovery is improved, and the decrease of network speed caused by repeated access to NRF is avoided.
2. NFs, the reference factors and the address information of the opposite terminal NFs are mutually found to construct a hash address mapping table, and the corresponding relation between the reference factors and the address information of the opposite terminal NFs is effectively managed.
3. Algorithms such as a generated key value template and a Hash mapping table are used, and the processing efficiency and light weight of the local cache program are guaranteed. The unique key value generated according to the reference factors is stored in the hash address mapping table, so that the stored content is effectively managed, and a large number of reference factors are not stored.
4. Providing a configuration file that allows a network administrator to select local cache NF types and reference factors allows the network administrator to optimize NFs the mutual discovery efficiency.
Drawings
FIG. 1 is a flow chart of NFs discovery with each other in an accelerated 5G core network according to the present invention;
FIG. 2 is a flowchart illustrating the generation of cache mapping table key values Kp (m) according to the present invention;
FIG. 3 is a diagram of a cache address hash mapping table;
FIG. 4 is a flow chart of updating a cache address hash mapping table;
FIG. 5 a network topology diagram for multiple UEs and SMFs;
fig. 6 is a communication flow diagram of multiple UEs and multiple SMF scenarios according to a first embodiment;
fig. 7 is a flowchart of updating a cache address hash mapping table by multiple UEs and multiple SMFs according to the first embodiment.
DETAILED DESCRIPTION OF EMBODIMENT (S) OF INVENTION
The embodiments of the present disclosure are described in detail below with reference to the accompanying drawings.
The embodiments of the present disclosure are described below with specific examples, and other advantages and effects of the present disclosure will be readily apparent to those skilled in the art from the disclosure in the specification. It is to be understood that the described embodiments are merely illustrative of some, and not restrictive, of the embodiments of the disclosure. The disclosure may be embodied or carried out in various other specific embodiments, and various modifications and changes may be made in the details within the description without departing from the spirit of the disclosure. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
Example one
The invention adopts NFs Factors of local cache NRF (network resource management function entity) discovery result and uses Hash address mapping table (also called cache mapping table) H(addr)The way of Table mapping NFs address information of opposite end avoids NFs repeated query of NRF, improves NFs efficiency of mutual discovery, and provides a way of dynamically modifying NFs configuration files according to network deployment needs, so that a network administrator can change the Factors of a certain NF cache with minimum cost.
The method for accelerating NFs mutual discovery in a 5G core network, as shown in FIG. 1, comprises the following steps:
and step S1, when the NF needs to communicate with the opposite end NF, the NF decodes the message triggering the communication process into data or obtains the type of the opposite end NF and the reference Factors factor from the NF storage data.
Step S2, the NF obtains the type of the opposite terminal NF generated by the strategy configuration file configured by the network administrator from the self cache and the key value template K generated in the initialization stagetmpl(m);
The key value template K in the initialization phase is described in detail with reference to FIG. 2tmplThe generation method of (m) specifically comprises the following steps:
step S201, slave policy configuration file PNFReading each caching strategy P configured by network administrator in DocNF(m) each caching strategy comprises the type of each NF and corresponding reference Factors;
step S202, generating a policy table P in the cacheNFTable;
Step S203, according to the policy table PNFNFs types in Table and corresponding reference Factors factor, generating key-value template K in cachetmpl(m)。
Although the efficiency of character recognition and processing in this process is not high, the number of strategies generally configured is small (NFs types are not many), and the generation of the key-value template K is realizedtmpl(m) ofThe process only occurs at initialization and is not repeated subsequently.
Step S3, judging whether the type of the NF of the opposite terminal exists in the self cache of the step S2, if so, setting the corresponding key value template K in the self cachetmpl(m) combining the reference Factors into a key value Kp (m) of the cache mapping table, and turning to the step S4; otherwise go to step S5.
In the generation of KtmplIn the process of (m), the reference Factors factor are substituted for the placeholder through a programming language interface, and a cache mapping table H is generated(addr)Unique key value Kp (m) in Table.
At KtmplIn (m) "% s" represents character string placeholder, in generating Ktmpl(m) replacing the placeholders with Factors through the programming language interface to generate a cache mapping table H(addr)Unique key value Kp (m) in Table. If a factor value is null, a null value of "null" is assigned. In policy profile PNFIn Doc, the caching policy PNF(m) specifies the NF type put into cache and the generated key-value template Ktmpl(m) the format of P can be dynamically changed according to the optimization strategy of the network administratorNFAnd (4) Doc. The purpose of adopting the algorithm is to simplify the processing process, to use the language with high efficiency, and to enable the network administrator to optimize the cache acceleration strategy according to the network requirement.
Step S4, determining the key value Kp (m) in the cache mapping table H(addr)If the Table has a mapping value, if the key value Kp (m) is in the cache mapping Table H(addr)If the Table has the mapping value, the mapping value is directly obtained to communicate with the opposite end NF, otherwise, the step S5 is performed.
The mapping value is the IP address or the Fully Qualified Domain Name (FQDN) of the NF at the opposite end. After obtaining Kp (m), H is entered(addr)Table finds the IP address or fully qualified domain name of peer NFs. FIG. 3 is a cache mapping table H(addr)Table, one Kp (m) in the cache mapping Table uniquely corresponds to the IP address or Fully Qualified Domain Name (FQDN) of one NF if Kp (m) is in H(addr)If the Table has a mapping value, the mapping value can be directly used for communicating with the NF of the opposite end, and the NRF discovery process is skipped. If Kp(m) there is no mapping value, a request is issued to the NRF to discover the peer NF.
And step S5, the NF sends an opposite end NF discovery request to the NRF, the NRF returns the position and state information of the opposite end NF according to the NF request, and the NRF returns the result to directly communicate with the opposite end NF.
Preferably, after step S5, the method further includes a step of updating the cache mapping table according to a result returned by the NRF, as shown in fig. 4, specifically:
when the NF receives the information of the NF position and the state of the opposite end returned by the NRF, the NF firstly decodes the information, and then the NF decodes the information according to the decoded reference Factors and the key value template K in the cachetmpl(m) generating key value Kp (m), and updating cache mapping table H(addr)Table。
The application scenario of the method of the present invention is shown below using one multi-UE and multi-SMF scenario as an example.
Fig. 5 is a network topology diagram of the present example, in which some NFs not used in the example have been omitted from the diagram.
Fig. 6 is a network communication flow diagram of the present example, and in fig. 6, two UEs (UE1 and UE2) are shown respectively issuing PDU Session establishment requests to the AMF. When UE1 starts sending a PDU Session establishment request to AMF, AMF configures policy according to network administrator at H(addr)The SMF position information corresponding to the Factors is not found in the Table, at the moment, the AMF will make a discovery request to the NRF, the NRF will return the discovered SMF _1 position information to the AMF, and the AMF will record the acquired SMF _1 and the Kp (m) and SMF _1 position information generated by the corresponding Factors into H(addr)Table, and request to set up PDU Session to SMF _ 1.
When UE2 sends a PDU Session setup request, the fans carried in UE2 and Kp (m) generated by UE1 when communicating are the same, and AMF is at H(addr)And obtaining SMF _1 position information in the Table, and sending a PDU Session establishment request to the SMF _ 1.
In FIG. 6, UE2 is based on cache H(addr)The Table has the NF address information of the opposite end, so that a request message for finding the SMF _1 does not need to be sent to the NRF again, the speed of finding the SMF _1 by each other is accelerated NFs, and the efficiency of network communication is improved.
Other flows for creating the PDU Session are not the key points to be protected by the method of the present invention, and are not described herein, and if necessary, the TS23502 protocol flow can be consulted.
Fig. 7 shows AMF subscribing to SMF _1 status from NRF, and notifying AMF to update h (addr) Table when NRF receives SMF _1 status update, or NRF recognizes that SMF does not send heartbeat message (heartbeat is a term of art in communication, for example, a doctor recognizes that patient is alive when he recognizes heartbeat, and also in communication, a computer recognizes that another computer sends heartbeat message regularly, and then knows that another computer is not bad or powered off, and can communicate).
The above description is for the purpose of illustrating embodiments of the invention and is not intended to limit the invention, and it will be apparent to those skilled in the art that any modification, equivalent replacement, or improvement made without departing from the spirit and principle of the invention shall fall within the protection scope of the invention.
Claims (4)
1. A method for accelerating NFs discovery in a 5G core network, comprising: the method comprises the following steps:
step S1, when the NF needs to communicate with the opposite end NF, the NF decodes the message triggering the communication process to obtain data or obtains the type and reference factor of the opposite end NF from the NF stored data;
step S2, the NF obtains the type of the opposite terminal NF generated by the strategy configuration file configured by the network administrator and the key value template generated in the initialization stage from the self cache;
step S3, judging whether the type of the NF of the opposite terminal exists in the self cache of the step S2, if so, combining the corresponding key value template and the reference factor in the self cache to generate the key value of the cache mapping table, and turning to the step S4; otherwise go to step S5; the generation method of the key value of the cache mapping table comprises the following steps: substituting the reference factor for the placeholder in the key value template through a programming language interface to generate a key value in a cache mapping table;
step S4, judging whether the key value has a mapping value in the cache mapping table, if yes, directly obtaining the mapping value to communicate with an opposite terminal NF, otherwise, turning to step S5;
step S5, the NF sends an opposite end NF discovery request to the NRF, the NRF returns the position and state information of the opposite end NF according to the NF request, and the NRF returns the result to directly communicate with the opposite end NF;
the step of generating the key-value template in the initialization stage comprises:
step S201, reading each caching strategy configured by a network administrator from a strategy configuration file, wherein each caching strategy comprises the type of each NF and a corresponding reference factor;
step S202, generating a policy table in a cache;
and step S203, generating a key value template in the cache according to the NFs types in the policy table and the corresponding reference factors.
2. The method of claim 1, wherein the method for accelerating NFs discovery in a 5G core network comprises: the step S5 further includes a step of updating the cache mapping table according to the result returned by the NRF.
3. The method of claim 2, wherein the method for accelerating NFs mutual discovery in a 5G core network comprises: the step of updating the cache mapping table is as follows: when the NF receives the information of the NF position and the state of the opposite terminal returned by the NRF, the NF firstly decodes the information, then generates a key value according to the decoded reference factor and the key value template in the cache, and updates the generated key value into a cache mapping table.
4. The method of claim 1, wherein the method for accelerating NFs discovery in a 5G core network comprises: the mapping value is the IP address of the opposite end NF or the fully qualified domain name.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010014267.1A CN111200812B (en) | 2020-01-07 | 2020-01-07 | Method for accelerating NFs mutual discovery in 5G core network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010014267.1A CN111200812B (en) | 2020-01-07 | 2020-01-07 | Method for accelerating NFs mutual discovery in 5G core network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111200812A CN111200812A (en) | 2020-05-26 |
CN111200812B true CN111200812B (en) | 2021-07-20 |
Family
ID=70747474
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010014267.1A Active CN111200812B (en) | 2020-01-07 | 2020-01-07 | Method for accelerating NFs mutual discovery in 5G core network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111200812B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114363935A (en) * | 2021-12-31 | 2022-04-15 | 中国电信股份有限公司 | Network element detection method and device, storage medium and electronic equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109792598A (en) * | 2016-10-06 | 2019-05-21 | 三星电子株式会社 | The method and apparatus for supporting to be attached and create ownership routing PDU session in the roaming environments of network fragment for terminal |
CN109803242A (en) * | 2017-11-17 | 2019-05-24 | 中兴通讯股份有限公司 | Method, equipment and the readable storage medium storing program for executing of NF discovery are carried out by NRF |
CN110278556A (en) * | 2018-03-13 | 2019-09-24 | 中兴通讯股份有限公司 | A kind of safety certification strategy determines method, equipment and computer readable storage medium |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10952176B2 (en) * | 2017-03-17 | 2021-03-16 | Samsung Electronics Co., Ltd. | AF influenced PDU session management and subscription procedures |
CN111034266A (en) * | 2017-10-16 | 2020-04-17 | 株式会社Ntt都科摩 | Communication system, communication control device, and communication method |
CN109673037B (en) * | 2017-10-17 | 2021-04-20 | 华为技术有限公司 | Network function discovery method and equipment |
US10863376B2 (en) * | 2018-01-18 | 2020-12-08 | Intel Corporation | Measurement job creation and performance data reporting for advanced networks including network slicing |
WO2019193129A1 (en) * | 2018-04-05 | 2019-10-10 | Telefonaktiebolaget Lm Ericsson (Publ) | Smf service area information provision |
CN110401946A (en) * | 2019-08-08 | 2019-11-01 | 广州爱浦路网络技术有限公司 | The network dicing method and network slicing device of 5G core net |
-
2020
- 2020-01-07 CN CN202010014267.1A patent/CN111200812B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109792598A (en) * | 2016-10-06 | 2019-05-21 | 三星电子株式会社 | The method and apparatus for supporting to be attached and create ownership routing PDU session in the roaming environments of network fragment for terminal |
CN109803242A (en) * | 2017-11-17 | 2019-05-24 | 中兴通讯股份有限公司 | Method, equipment and the readable storage medium storing program for executing of NF discovery are carried out by NRF |
CN110278556A (en) * | 2018-03-13 | 2019-09-24 | 中兴通讯股份有限公司 | A kind of safety certification strategy determines method, equipment and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN111200812A (en) | 2020-05-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11323316B2 (en) | Device configuration method and apparatus that are based on network configuration protocol | |
KR100984384B1 (en) | System, network device, method, and computer program product for active load balancing using clustered nodes as authoritative domain name servers | |
JP4638816B2 (en) | Method for deploying, preparing and storing initial filter conditions | |
Tang et al. | QoS-aware replica placement for content distribution | |
US8073972B2 (en) | System and method for location discovery based on DNS | |
KR100576935B1 (en) | Ontology-based service discovery system and method for ad hoc networks | |
US9143389B2 (en) | Methods, appratuses, and computer program products for determining a network interface to access a network resource | |
CN110580256B (en) | Method, device and system for identifying application identification | |
CN109995641B (en) | Information processing method, computing node and storage medium | |
US8874708B2 (en) | Location discovery based on DNS | |
CN112449758A (en) | Method and apparatus for processing slice selection data for a user | |
US9935791B2 (en) | Method and system for name resolution across heterogeneous architectures | |
CN116762373A (en) | Prioritizing network function nodes | |
CN113835825B (en) | Dynamic adjustment method and device of virtual service host, server and storage medium | |
CN102546820A (en) | Transmission optimization method, and mapping information storage method, device and system | |
WO2019154476A1 (en) | Unique service identifier for a message proxy in a service based architecture | |
WO2009000214A1 (en) | Method and device for configuring configuration data of user access network | |
CN111200812B (en) | Method for accelerating NFs mutual discovery in 5G core network | |
US9130938B2 (en) | Method, switch, and system for processing a message | |
CN116170403B (en) | Method and device for decentralized domain name resolution based on Handle system | |
EP1301010B1 (en) | Method for providing services in a communication network | |
CN113055448B (en) | Metadata management method and device | |
US8108523B2 (en) | Automatic extension of distributed managed ranges in a multi-master system | |
WO2012152076A1 (en) | Service adaptation method, device and system | |
CN112637126A (en) | Service registration method and Pod |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |