Nothing Special   »   [go: up one dir, main page]

WO2024210448A1 - Procédé et dispositif pour prendre en charge un découpage en tranches de réseau pour un terminal itinérant dans un système de communication sans fil - Google Patents

Procédé et dispositif pour prendre en charge un découpage en tranches de réseau pour un terminal itinérant dans un système de communication sans fil Download PDF

Info

Publication number
WO2024210448A1
WO2024210448A1 PCT/KR2024/004222 KR2024004222W WO2024210448A1 WO 2024210448 A1 WO2024210448 A1 WO 2024210448A1 KR 2024004222 W KR2024004222 W KR 2024004222W WO 2024210448 A1 WO2024210448 A1 WO 2024210448A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
vplmn
nssai
slice
plmn
Prior art date
Application number
PCT/KR2024/004222
Other languages
English (en)
Korean (ko)
Inventor
서경주
Original Assignee
삼성전자 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 삼성전자 주식회사 filed Critical 삼성전자 주식회사
Publication of WO2024210448A1 publication Critical patent/WO2024210448A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems

Definitions

  • the present disclosure relates to a method and device for supporting a terminal performing data communication using a network slice in a wireless communication system. More specifically, in communication using a network slice, when a terminal roams, the present disclosure relates to a method and device for selecting and connecting to a PLMN (public land mobile network) that provides a service to the terminal by considering network slice information in order to support the service of the terminal in the roaming area.
  • PLMN public land mobile network
  • 5G mobile communication technology defines a wide frequency band to enable fast transmission speeds and new services, and can be implemented not only in the sub-6GHz frequency band, such as 3.5 gigahertz (3.5GHz), but also in the ultra-high frequency band called millimeter wave (mmWave), such as 28GHz and 39GHz ('Above 6GHz').
  • mmWave millimeter wave
  • mmWave millimeter wave
  • 28GHz and 39GHz 'Above 6GHz'
  • 6G mobile communication technology which is called the system after 5G communication (Beyond 5G)
  • implementation in the terahertz band for example, the 3 terahertz (3THz) band at 95GHz
  • 3THz the 3 terahertz
  • eMBB enhanced Mobile Broadband
  • URLLC Ultra-Reliable Low-Latency Communications
  • mMTC massive Machine-Type Communications
  • beamforming and massive MIMO to mitigate path loss of radio waves in ultra-high frequency bands and increase the transmission distance of radio waves
  • numerologies such as operation of multiple subcarrier intervals
  • dynamic operation of slot formats for efficient use of ultra-high frequency resources
  • initial access technology to support multi-beam transmission and wideband
  • definition and operation of BWP Bitth Part
  • new channel coding methods such as LDPC (Low Density Parity Check) codes for large-capacity data transmission and Polar Code for reliable transmission of control information
  • L2 pre-processing L2 Standardization has been made for network slicing, which provides dedicated networks specialized for specific services, and pre-processing.
  • V2X Vehicle-to-Everything
  • NR-U New Radio Unlicensed
  • UE Power Saving NR terminal low power consumption technology
  • NTN Non-Terrestrial Network
  • Standardization of wireless interface architecture/protocols for technologies such as the Industrial Internet of Things (IIoT) to support new services through linkage and convergence with other industries, Integrated Access and Backhaul (IAB) to provide nodes for expanding network service areas by integrating wireless backhaul links and access links, Mobility Enhancement including Conditional Handover and Dual Active Protocol Stack (DAPS) handover, and 2-step RACH for NR to simplify random access procedures is also in progress, and standardization of system architecture/services for 5G baseline architecture (e.g. Service based Architecture, Service based Interface) for grafting Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) technologies, and Mobile Edge Computing (MEC) that provides services based on the location of the terminal is also in progress.
  • 5G baseline architecture e.g. Service based Architecture, Service based Interface
  • NFV Network Functions Virtualization
  • SDN Software-Defined Networking
  • MEC Mobile Edge Computing
  • a method performed by an AMF (Access and Mobility Management Function) device in a wireless communication system may include the steps of: receiving, from a terminal through a base station, a registration request message including information that slice aware PLMN selection capability (capability-slice aware-PLMN) is supported; and transmitting, to the terminal through the base station, a registration accept message including at least one of matching information of single network slice selection assistance information (S-NSSAI) and VPLMNs (Visited PLMNs) and priority information of the VPLMN based on the S-NSSAI.
  • S-NSSAI single network slice selection assistance information
  • VPLMNs Visited PLMNs
  • the disclosed embodiment seeks to provide a device and method capable of effectively providing a service in a mobile communication system.
  • FIG. 1 illustrates a 5G network according to one embodiment of the present disclosure.
  • FIG. 2 is a diagram illustrating an operation for supporting network slices in a 5G network according to one embodiment of the present disclosure.
  • FIG. 3 is a diagram illustrating an operation for supporting network slices in a 5G network according to another embodiment of the present disclosure.
  • FIG. 4 is a diagram illustrating an operation for supporting network slices in a 5G network according to another embodiment of the present disclosure.
  • FIG. 5 is a diagram illustrating an operation for supporting network slices in a 5G network according to another embodiment of the present disclosure.
  • FIG. 6 is a diagram showing the configuration of a terminal according to one embodiment of the present disclosure.
  • FIG. 7 is a diagram illustrating a configuration of a network entity according to one embodiment of the present disclosure.
  • a method performed by an AMF (Access and Mobility Management Function) device in a wireless communication system may include the steps of: receiving, from a terminal through a base station, a registration request message including information that slice aware PLMN selection capability (capability-slice aware-PLMN) is supported; and transmitting, to the terminal through the base station, a registration accept message including at least one of matching information of single network slice selection assistance information (S-NSSAI) and VPLMNs (Visited PLMNs) and priority information of the VPLMN based on the S-NSSAI.
  • S-NSSAI single network slice selection assistance information
  • VPLMNs Visited PLMNs
  • a method performed by a user equipment in a wireless communication system may include the steps of: transmitting a first registration request message including information that the user equipment supports slice aware public land mobile network (PLMN) selection capability (capability-slice aware-PLMN) to an AMF (Access and Mobility Management Function) device through a base station; and receiving a registration accept message from the AMF device through the base station including at least one of single network slice selection assistance information (S-NSSAI), matching information of visited PLMNs (VPLMNs), and priority information of the VPLMN based on the S-NSSAI.
  • PLMN slice aware public land mobile network
  • AMF Access and Mobility Management Function
  • An Access and Mobility Management Function (AMF) device of a wireless communication system includes a transceiver; and a controller coupled with the transceiver, wherein the controller receives a registration request message including information that slice aware PLMN selection capability (capability-slice aware-PLMN) is supported from a terminal through a base station, and controls transmission of a registration accept message including at least one of single network slice selection assistance information (S-NSSAI), matching information of visited PLMNs (VPLMNs), and priority information of a VPLMN based on S-NSSAI to the terminal through the base station.
  • S-NSSAI single network slice selection assistance information
  • VPLMNs matching information of visited PLMNs
  • priority information of a VPLMN based on S-NSSAI priority information of a VPLMN based on S-NSSAI
  • a terminal of a wireless communication system includes a transceiver; and a controller coupled with the transceiver, wherein the controller controls to transmit a first registration request message including information that the terminal supports slice aware public land mobile network (PLMN) selection capability (capability-slice aware-PLMN) to an AMF (Access and Mobility Management Function) device through a base station, and to receive, from the AMF device through the base station, a registration accept message including at least one of single network slice selection assistance information (S-NSSAI), matching information of visited PLMNs (VPLMNs), and priority information of the VPLMN based on the S-NSSAI.
  • PLMN slice aware public land mobile network
  • AMF Access and Mobility Management Function
  • a method for operating a policy control function (PCF) in a wireless communication system includes the steps of: receiving a user equipment route selection policy (URSP) update request message from a user data management (UDM); and transmitting a URSP update message including matching information of S-NSSAI and VPLMN and priority information to an access and mobility management function (AMF).
  • URSP user equipment route selection policy
  • UDM user data management
  • AMF access and mobility management function
  • each block of the processing flow diagrams and combinations of the flow diagrams can be performed by computer program instructions.
  • These computer program instructions can be loaded onto a processor of a general-purpose computer, a special-purpose computer, or other programmable data processing equipment, so that the instructions executed by the processor of the computer or other programmable data processing equipment create a means for performing the functions described in the flow diagram block(s).
  • These computer program instructions can also be stored in a computer-available or computer-readable memory that can be directed to a computer or other programmable data processing equipment to implement the functions in a specific manner, so that the instructions stored in the computer-available or computer-readable memory can also produce an article of manufacture that includes an instruction means for performing the functions described in the flow diagram block(s).
  • the computer program instructions may also be installed on a computer or other programmable data processing apparatus, a series of operational steps may be performed on the computer or other programmable data processing apparatus to produce a computer-executable process, so that the instructions executing the computer or other programmable data processing apparatus may also provide steps for executing the functions described in the flowchart block(s).
  • each block may represent a module, segment, or portion of code that contains one or more executable instructions for performing a particular logical function(s). It should also be noted that in some alternative implementation examples, the functions mentioned in the blocks may occur out of order. For example, two blocks shown in succession may in fact be performed substantially concurrently, or the blocks may sometimes be performed in reverse order, depending on the functionality they perform.
  • the term ' ⁇ part' used in this embodiment means software or hardware components such as FPGA (Field Programmable Gate Array) or ASIC (Application Specific Integrated Circuit), and the ' ⁇ part' performs certain roles.
  • the ' ⁇ part' is not limited to software or hardware.
  • the ' ⁇ part' may be configured to be in an addressable storage medium and may be configured to reproduce one or more processors.
  • the ' ⁇ part' includes components such as software components, object-oriented software components, class components, and task components, and processes, functions, properties, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuits, data, databases, data structures, tables, arrays, and variables.
  • the functions provided in the components and ' ⁇ parts' may be combined into a smaller number of components and ' ⁇ parts' or further separated into additional components and ' ⁇ parts'.
  • the components and ' ⁇ parts' may be implemented to regenerate one or more CPUs within the device or secure multimedia card.
  • the ' ⁇ part' may include one or more processors.
  • connection nodes terms referring to network entities, terms referring to messages, terms referring to interfaces between network entities, terms referring to various identification information, etc. are examples for convenience of explanation. Therefore, the present disclosure is not limited to the terms described below, and other terms referring to objects having equivalent technical meanings may be used.
  • this disclosure uses terms and names defined in the 3GPP LTE (3rd Generation Partnership Project Long Term Evolution) standard or the 3GPP NR standard, or terms and names modified based thereon.
  • this disclosure is not limited to the above-described terms and names, and can be equally applied to systems conforming to other standards.
  • the base station is an entity that performs resource allocation of a terminal, and may be at least one of a gNode B, an eNode B, a Node B, a BS (Base Station), a wireless access unit, a base station controller, or a node on a network.
  • the terminal may include a UE (User Equipment), an MS (Mobile Station), a cellular phone, a smartphone, a computer, or a multimedia system capable of performing a communication function.
  • a downlink (DL) refers to a wireless transmission path of a signal that a base station transmits to a terminal
  • an uplink (UL) refers to a wireless transmission path of a signal that a terminal transmits to a base station.
  • the 5G or NR system separates the AMF (Access and Mobility Management Function), which is the management entity that manages the mobility of the terminal, and the SMF (Session Management Function), which is the entity that manages the session. Accordingly, the communication method and communication management method between the terminal and the network entity have changed.
  • AMF Access and Mobility Management Function
  • SMF Session Management Function
  • mobility management is performed through AMF via N3IWF (Non-3GPP Inter-Working Function), and session management is performed through SMF.
  • N3IWF Non-3GPP Inter-Working Function
  • SMF Session Management Function
  • AMF can also process security-related information, which is an important element in mobility management.
  • the MME is responsible for both mobility management and session management.
  • a non-standalone (NSA) architecture can be supported that performs communication by jointly utilizing the network entities of the 4G LTE system.
  • FIG. 1 illustrates a 5G network according to one embodiment of the present disclosure.
  • a 5G or NR core network may be configured to include at least one of network functions (NFs), such as a User Plane Function (UPF, 131), a Session Management Function (SMF, 121), an Access and Mobility Management Function (AMF, 111), a 5G Radio Access Network (RAN, 103), a User Data Management (UDM, 151), and a Policy Control Function (PCF, 161).
  • NFs network functions
  • UPF User Plane Function
  • SMF Session Management Function
  • AMF Access and Mobility Management Function
  • RAN Radio Access Network
  • UDM User Data Management
  • PCF Policy Control Function
  • PCF Policy Control Function
  • AUSF Authentication Server Function
  • AAA authentication, authorization and accounting
  • AMF (111) is an entity for managing access and mobility of UE (101).
  • AMF (111) can perform network functions such as registration, connection, reachability, mobility management, access confirmation, authentication, and mobility event generation of UE (101).
  • the SMF (121) can perform a management function for a PDU (protocol data unit) session of the UE (101).
  • the SMF (121) can perform a session management function through the establishment, modification, and release of sessions and the maintenance of a tunnel between the UPF (131) and the RAN (103) required therefor, an IP (Internet protocol) address allocation and management function of the UE (101), user plane selection and control, traffic processing control in the UPF (131), and charging data collection control, etc., and network functions.
  • PDU protocol data unit
  • the SMF (121) can perform a session management function through the establishment, modification, and release of sessions and the maintenance of a tunnel between the UPF (131) and the RAN (103) required therefor, an IP (Internet protocol) address allocation and management function of the UE (101), user plane selection and control, traffic processing control in the UPF (131), and charging data collection control, etc., and network functions.
  • IP Internet protocol
  • UPF (131) performs a role of processing data of UE (101), and can perform a role of processing data so that data transmitted by UE (101) can be transferred to an external network or data received from an external network can be transferred to UE (101).
  • UPF (131) can perform network functions such as performing an anchor role between radio access technologies (RATs), packet routing and forwarding, packet inspection, applying user plane policies, creating traffic usage reports, and buffering.
  • RATs radio access technologies
  • UDM (151) can perform functions such as generating authentication information for 3GPP security, processing user identifiers (user IDs), managing a list of network functions (NFs) supporting terminals (101), and managing subscription information.
  • PCF (161) is an NF that manages operator policy information for providing services in a 5G system.
  • UE(User Equipment, Terminal) can access the 5G core network through the base station (5G RAN, radio access network, base station, BS, 103).
  • N3IWF N3 interworking function
  • session management is controlled by the UE, non 3GPP access, N3IWF, and SMF, and for mobility management, control can be performed through the UE, non 3GPP access, N3IWF, and AMF.
  • a 5G or NR system entities performing mobility management and session management are separated into AMF (111) and SMF (121). Meanwhile, a 5G or NR system is being considered for a SA (standalone) deployment structure that performs communication only with 5G or NR entities and a NSA (non stand alone) deployment structure that uses 4G entities and 5G or NR entities together.
  • SA standalone
  • NSA non stand alone
  • NAS Non Access Stratum
  • 3GPP has standardized the architecture and procedures of 5G network systems.
  • Mobile carriers can provide various services in 5G networks. In order to provide each service, mobile carriers need to satisfy different service requirements (e.g., delay time, communication range, data rate, bandwidth, reliability, etc.) for each service. To this end, mobile carriers can configure network slices and allocate network resources suitable for specific services for each network slice or set of network slices.
  • Network resources can mean NF (network function), logical resources provided by NF, or wireless resources of a base station.
  • a mobile carrier can configure network slice A to provide mobile broadband services, network slice B to provide vehicle communication services, and network slice C to provide IoT services.
  • network slice A to provide mobile broadband services
  • network slice B to provide vehicle communication services
  • network slice C to provide IoT services.
  • a 5G network can efficiently provide relevant services to terminals through network slices specialized for the characteristics of each service.
  • the present disclosure relates to a method and device for supporting a terminal performing data communication using a network slice in a wireless communication system. More specifically, in communication using a network slice, when a terminal roams, the present disclosure relates to a method and device for selecting and connecting to a PLMN (public land mobile network) that provides a service to the terminal by considering network slice information in order to support the service of the terminal in the roaming area.
  • PLMN public land mobile network
  • the terminal selects a PLMN based on services such as charging. Since the terminal selects a network regardless of whether the network provides a network slice, the UE may not be provided with the service it wants. In addition, even if there is a PLMN that can provide the network slice service under better resource conditions, the service may not be provided smoothly when a network that does not provide a network slice or does not sufficiently support a network slice is selected when providing the service during roaming. Therefore, the present disclosure describes a method and device for selecting a network that supports a service during roaming by considering a network slice.
  • FIG. 2 is a flowchart illustrating an operation for supporting network slices in a 5G network according to one embodiment of the present disclosure.
  • a UE (101) notifies the network that it has slice aware PLMN selection capability (capability-slice aware-PLMN) through a registration request message or a registration complete message, and the network can securely provide information on slices and VPLMNs (Visited PLMNs) supporting slices from a UDM (151) to an AUSF (141), and priority information of VPLMNs according to the degree of slice support, to the UE (101).
  • slice aware PLMN selection capability capability-slice aware-PLMN
  • the network can securely provide information on slices and VPLMNs (Visited PLMNs) supporting slices from a UDM (151) to an AUSF (141), and priority information of VPLMNs according to the degree of slice support, to the UE (101).
  • the UE (101) sends a registration request message to the AMF (111-2) through the 5G RAN (103-02).
  • the UE (101) includes slice aware PLMN selection capability (capability-slice aware-PLMN) information in the registration request message and sends it together.
  • This slice aware PLMN selection capability (capability slice aware-PLMN) information is information for notifying that the UE (101) can select a PLMN based on the slice information or that the terminal can select a PLMN based on the slice information when roaming.
  • This slice aware PLMN selection capability (capability slice aware-PLMN) information may be an independent information element (IE), may be part of the 5GMM information element, or may include specific bits or indicators.
  • IE independent information element
  • AMF (111-2) sends a request message to UDM (151).
  • This request message informs the network that UE (101) has the processing capability to select PLMN based on network slice information, and is a process in which AMF (111-2) of the network requests necessary information from UDM (151) to support slice information requested by UE (101).
  • UDM (151) requests a security protection request message to AUSF (141).
  • information that UDM (151) sends to AUSF (141) may include S-NSSAI (single network slice selection assistance information), VPLMN information, matching information between S-NSSAI and VPLMN, and priority information therefor.
  • the UDM (151) transmits information of the S-NSSAI supporting the service of the UE (101), and information of the visited PLMMs, i.e., VPLMNs, that can support the corresponding S-NSSAI, i.e., the network slice, to the AUSF (141).
  • VPLMNs there may be a list of such VPLMNs, information on whether the VPLMNs support the network slice from which the UE (101) wants to receive service, and if there are multiple VPLMNs that can provide the network slice, for example, if there are multiple VPLMNs that support the network slice corresponding to the NSSAI (for example, let's say NSSAI-a) (for example, if there are multiple VPLMNs that can support S-NSSAI-a, such as VPLMN-1, VPLMN-2, VPLMN-3, and VPLMN-4).
  • NSSAI-a for example, if there are multiple VPLMNs that can support S-NSSAI-a, such as VPLMN-1, VPLMN-2, VPLMN-3, and VPLMN-4).
  • these VPLMNs can be given priorities based on the amount of resources (radio resources, core network resources, etc.) that can be provided to the UE.
  • this priority information can be transmitted to the UE (101) by determining priorities based on the resources provided by the VPLMNs while sending information on VPLMNs (i.e., a list of VPLMNs: e.g., VPLMN-1, VPLMN-2, VPLMN-3, VPLMN-4, etc.) that are mapped 1:n (1:1 mapping is also possible) with slice information (e.g., SNSSAI-a).
  • the information transmitted may be VPLMN-1, VPLMN-2, VPLMN-3, VPLMN-4 mapped to SNSSAI-a and priority information for each of VPLMN-1, VPLMN-2, VPLMN-3, VPLMN-4.
  • Examples of information transmitted according to these examples include:
  • priorities were given to VPLMNs based on charging, etc., but according to one embodiment of the present disclosure, priorities can be given based on services to be provided to terminals, particularly, network slice information.
  • slice information, VPLMN information, and priority information of VPLMNs can be provided together.
  • the UE (101) by providing a plurality of VPLMN information in the slice information, that is, information of VPLMNs in a 1 (slice information):n (information of VPLMNs) relationship for a slice from which a service is to be received, the UE (101) can receive service according to slice-aware priority information among the VPLMNs.
  • UDM (151) provides information on VPLMNs and priorities according to the degree of slice provision of VPLMNs, it is possible to enable UE (101) to select PLMNs according to the degree of slice provision. Then, in process 223, UDM (151) can transmit slice information, whether or not to provide slice-related service, and S-NSSAI information to AUSF (141). Or, as another embodiment, UDM (151) can transmit a security protection request (request security protection) message to AUSF (141).
  • This security protection request (request security protection) message includes information on S-NSSAI supporting service, corresponding S-NSSAI, visited PLMM capable of supporting network slice, i.e., information on VPLMNs, and this information can be security protected by AUSF (141) thereafter.
  • AUSF (141) When AUSF (141) receives a security protection request message, it derives a security key based on the master key of AKA (authentication and key agreement) held by AUSF (141) and UE (101), i.e., Kausf. AUSF (141) can secure a response message using the security key derived from the Kausf key.
  • AKA authentication and key agreement
  • AUSF (141) can secure a response message using the security key derived from the Kausf key.
  • UDM In process 227, AUSF (141) sends a response security protection message to UDM (151). That is, UDM (151) grants slice-aware priority to VPLMNs based on S-NSSAI information, S_NSSAI, that is, information on VPLMNs that can provide network slices, and information related to slices that VPLMNs can provide (e.g., resource, data rate, etc.), that is, priority based on information related to slices that VPLMNs can provide (e.g., resource, data rate, etc.), and sends the message to AUSF (141). AUSF (141) then security-protects the corresponding information and transmits it to UDM (151).
  • S_NSSAI S-NSSAI information
  • S_NSSAI information on VPLMNs that can provide network slices
  • information related to slices that VPLMNs can provide e.g., resource, data rate, etc.
  • priority based on information related to slices that VPLMNs can provide e.g
  • AMF (111-2) sends a registration accept message to UE (101).
  • AMF (111-2) can also send matching information of S-NSSAI and VPLMNs, and priority information of VPLMNs according to the level of S-NSSAI provision to UE (101).
  • the UE (101) stores S-NSSAI, VPLMN information, and priority information together. This information can be used to determine the priority of PLMN selection in the process of performing PLMN selection by the UE (101).
  • the UE (101) can select a PLMN, and at this time, when selecting a PLMN, the UE (101) can select a PLMN that supports a service when roaming based on slice information, that is, information on VPLMNs that provide S-NSSAI and slices, and priority information that is determined according to the degree of slice provision for the VPLMN that provides the slice.
  • the UE (101) sends a registration complete message to the AMF (111-2).
  • the UE (101) may also send a slice-aware PLMN indication to the AMF (111-2).
  • the UE (101) may inform the network that the UE (101) has the ability to select a PLMN based on slice information.
  • step 281 the UE (101) sends a registration request to the AMF (111-2) of another PLMN.
  • AMF (111-3) sends a registration accept message to UE (101).
  • FIG. 3 is a diagram illustrating an operation for supporting network slices in a 5G network according to another embodiment of the present disclosure.
  • the UE (101) notifies the network that it has slice aware PLMN selection capability (capability-slice aware-PLMN) through a registration request message or a registration complete message.
  • slice aware PLMN selection capability capability-slice aware-PLMN
  • the network can securely provide information on slices and VPLMNs (Visited PLMNs) supporting the slices from UDM (151) to AUSF (141), and priority information of VPLMNs according to the degree of slice support, to UE (101).
  • VPLMNs Virtual PLMNs
  • the network can update the information by transmitting a DL NAS transport message to UE (101).
  • the UE (101) sends a registration request message to the AMF (111-2) through the 5G RAN (103-02).
  • the UE (101) includes slice aware PLMN selection capability (capability-slice aware-PLMN) information in the registration request message and sends it together.
  • This slice aware PLMN selection capability (capability slice aware-PLMN) information is information for notifying that the UE (101) can select a PLMN based on the slice information or that the terminal can select a PLMN based on the slice information when roaming.
  • This slice aware PLMN selection capability (capability slice aware-PLMN) information may be an independent information element (IE), may be part of a 5GMM information element, or may include specific bits or indicators.
  • IE independent information element
  • AMF (111-2) sends a request message to UDM (151).
  • This request message informs the network that UE (101) has the processing capability to select a PLMN based on network slice information, and is a process in which AMF (111-2) of the network requests necessary information from UDM (151) to support the slice information requested by UE (101).
  • UDM (151) requests a security protection request message to AUSF (141).
  • the information that UDM (151) sends to AUSF (141) may include information such as S-NSSAI (single network slice selection assistance information), VPLMN information, matching information between S-NSSAI and VPLMN, and priority thereof.
  • the UDM (151) transmits information of the S-NSSAI supporting the service of the UE (101), and information of the visited PLMMs, i.e., VPLMNs, that can support the corresponding S-NSSAI, i.e., the network slice, to the AUSF (141).
  • VPLMNs there may be a list of such VPLMNs, information on whether the VPLMNs support the network slice from which the UE (101) wants to receive service, and if there are multiple VPLMNs that can provide the network slice, for example, if there are multiple VPLMNs that support the network slice corresponding to the NSSAI (for example, let's say NSSAI-a) (for example, if there are multiple VPLMNs that can support S-NSSAI-a, such as VPLMN-1, VPLMN-2, VPLMN-3, and VPLMN-4).
  • NSSAI-a for example, if there are multiple VPLMNs that can support S-NSSAI-a, such as VPLMN-1, VPLMN-2, VPLMN-3, and VPLMN-4).
  • these VPLMNs can be given priorities based on the amount of resources (radio resources, core network resources, etc.) that can be provided to the UE.
  • this priority information can be transmitted to the UE (101) by determining priorities based on the resources provided by the VPLMNs while sending information on VPLMNs (i.e., a list of VPLMNs: e.g., VPLMN-1, VPLMN-2, VPLMN-3, VPLMN-4, etc.) that are mapped 1:n (1:1 mapping is also possible) with slice information (e.g., SNSSAI-a).
  • the information transmitted may be VPLMN-1, VPLMN-2, VPLMN-3, VPLMN-4 mapped to SNSSAI-a and priority information for each of VPLMN-1, VPLMN-2, VPLMN-3, VPLMN-4.
  • priorities were given to VPLMNs based on charging, etc., but according to one embodiment of the present disclosure, priorities can be given based on services to be provided to terminals, particularly, network slice information.
  • priority may be given to a VPLMN based on how well it can provide a network slice (e.g., amount of resources available).
  • slice information, VPLMN information, and priority information of VPLMNs can be provided together.
  • the UE (101) by providing a plurality of VPLMN information in the slice information, that is, information of VPLMNs in a 1 (slice information):n (information of VPLMNs) relationship for a slice from which a service is to be received, the UE (101) can receive service according to slice-aware priority information among the VPLMNs.
  • the UDM (151) provides information on VPLMNs and priorities according to the degree of slice provision of the VPLMNs, it is possible to enable the UE (101) to select a PLMN according to the degree of slice provision.
  • the UDM (151) can transmit slice information, whether or not to provide a slice-related service, and S-NSSAI information to the AUSF (141).
  • the UDM (151) can transmit a security protection request (request security protection) message to the AUSF (141).
  • This security protection request (request security protection) message includes information on the S-NSSAI supporting the service, the corresponding S-NSSAI, the visited PLMM that can support the network slice, that is, information on the VPLMNs, and this information can be security protected by the AUSF (141) thereafter.
  • AUSF (141) When AUSF (141) receives a security protection request message, it derives a security key based on the master key of AKA (authentication and key agreement) held by AUSF (141) and UE (101), i.e., Kausf. AUSF (141) can secure a response message using the security key derived from the Kausf key.
  • AKA authentication and key agreement
  • AUSF (141) can secure a response message using the security key derived from the Kausf key.
  • the AUSF (141) sends a response security protection message to the UDM (151). That is, the UDM (151) grants slice-aware priorities to the VPLMNs based on S-NSSAI information, S_NSSAI, that is, information on VPLMNs that can provide network slices, and information related to slices that the VPLMNs can provide (e.g., resources, data rates, etc.), and sends the messages to the AUSF (141). The AUSF (141) then security-protects the corresponding information and transmits it to the UDM (151).
  • S_NSSAI S-NSSAI information
  • S_NSSAI information on VPLMNs that can provide network slices
  • information related to slices that the VPLMNs can provide e.g., resources, data rates, etc.
  • UDM (151) transmits roaming information to AMF (111-2).
  • S-NSSAI information, matching information of VPLMNs, and priority information according to S-NSSAI provision of the corresponding VPLMN are transmitted together.
  • This S-NSSAI information, information of VPLMNs, and priority information according to the degree of slice provision of the VPLMN can be transmitted in a secured manner through encryption, integrity protection, etc.
  • AMF (111-2) sends a registration accept message to UE (101).
  • AMF (111-2) may also transmit matching information of S-NSSAI and VPLMNs, and priority information of VPLMNs according to the level of S-NSSAI provision to UE (101).
  • the UE (101) stores S-NSSAI, VPLMN information, and priority information together. This information can be used to determine the priority of PLMN selection in the process of performing PLMN selection by the UE (101).
  • the UE (101) can select a PLMN, and at this time, when selecting a PLMN, the UE (101) can select a PLMN that supports a service when roaming based on slice information, that is, information on VPLMNs that provide S-NSSAI and slices, and priority information that is determined according to the degree of slice provision for the VPLMN that provides the slice.
  • the UE (101) sends a registration complete message to the AMF (111-2).
  • the UE (101) may also send a slice-aware PLMN indication to the AMF (111-2).
  • the UE (101) may inform the network that the UE (101) has the ability to select a PLMN based on slice information.
  • the UE (101) and the network perform communication.
  • the UDM (151) can trigger a procedure for updating changed information related to the configuration of the UE by transmitting a message to the AUSF (141).
  • UDM (151) requests a security protection request message to AUSF (141).
  • the information that UDM (151) sends to AUSF (141) may include S-NSSAI (single network slice selection assistance information), VPLMN information, matching information between S-NSSAI and VPLMN, and priority information therefor.
  • the UDM (151) transmits information of the S-NSSAI supporting the service of the UE (101), and information of the visited PLMMs, i.e., VPLMNs, that can support the corresponding S-NSSAI, i.e., the network slice, to the AUSF (141).
  • VPLMNs there may be a list of such VPLMNs, information on whether the VPLMNs support the network slice from which the UE (101) wants to receive service, and if there are multiple VPLMNs that can provide the network slice, for example, if there are multiple VPLMNs that support the network slice corresponding to the NSSAI (for example, let's say NSSAI-a) (for example, if there are multiple VPLMNs that can support S-NSSAI-a, such as VPLMN-1, VPLMN-2, VPLMN-3, and VPLMN-4).
  • NSSAI-a for example, if there are multiple VPLMNs that can support S-NSSAI-a, such as VPLMN-1, VPLMN-2, VPLMN-3, and VPLMN-4).
  • these VPLMNs can be given priorities based on the amount of resources (radio resources, core network resources, etc.) that can be provided to the UE.
  • this priority information can be transmitted to the UE (101) by determining priorities based on the resources provided by the VPLMNs while sending information on VPLMNs (i.e., a list of VPLMNs: e.g., VPLMN-1, VPLMN-2, VPLMN-3, VPLMN-4, etc.) that are mapped 1:n (1:1 mapping is also possible) with slice information (e.g., SNSSAI-a).
  • the information transmitted may be VPLMN-1, VPLMN-2, VPLMN-3, VPLMN-4 mapped to SNSSAI-a and priority information for each of VPLMN-1, VPLMN-2, VPLMN-3, VPLMN-4.
  • priorities were given to VPLMNs based on charging, etc., but according to one embodiment of the present disclosure, priorities can be given based on services to be provided to terminals, particularly, network slice information.
  • priority can be given to a VPLMN based on how well it can provide a network slice (e.g., amount of resources available).
  • slice information, VPLMN information, and priority information of VPLMNs can be provided together.
  • the UE (101) by providing a plurality of VPLMN information in the slice information, that is, information of VPLMNs in a 1 (slice information):n (information of VPLMNs) relationship for a slice from which a service is to be received, the UE (101) can receive service according to slice-aware priority information among the VPLMNs.
  • the UE (101) can select a PLMN according to the degree of slice provision.
  • UDM (151) can transmit slice information and whether slice-related service is provided, and S-NSSAI information to AUSF (141).
  • UDM (151) can transmit a security protection request (request security protection) message to AUSF (141).
  • This security protection request (request security protection) message includes information on S-NSSAI supporting service, corresponding S-NSSAI, visited PLMM that can support network slice, i.e., information on VPLMNs, and this information can be security protected by AUSF (141) thereafter.
  • AUSF (141) When AUSF (141) receives a security protection request message, it derives a security key based on the master key of AKA (authentication and key agreement) held by AUSF (141) and UE (101), i.e., Kausf. AUSF (141) can secure a response message using the security key derived from the Kausf key.
  • AKA authentication and key agreement
  • AUSF (141) can secure a response message using the security key derived from the Kausf key.
  • the AUSF (141) sends a response security protection message to the UDM (151). That is, the UDM (151) grants slice-aware priorities to the VPLMNs based on S-NSSAI information, S_NSSAI, that is, information on VPLMNs that can provide network slices, and information related to slices that the VPLMNs can provide (e.g., resources, data rates, etc.), and sends the messages to the AUSF (141). The AUSF (141) then security-protects the corresponding information and transmits it to the UDM (151).
  • S_NSSAI S-NSSAI information
  • S_NSSAI information on VPLMNs that can provide network slices
  • information related to slices that the VPLMNs can provide e.g., resources, data rates, etc.
  • UDM (151) transmits roaming information to AMF (111-2).
  • S-NSSAI information, matching information of VPLMNs, and priority information according to S-NSSAI provision of the corresponding VPLMN are transmitted together.
  • This S-NSSAI information, information of VPLMNs, and priority information according to the degree of slice provision of the VPLMN can be transmitted in a secured manner through encryption, integrity protection, etc.
  • AMF (111-2) sends a DL NAS transport message to UE (101).
  • AMF (111-2) can also send S-NSSAI and matching information of VPLMNs, and priority information of VPLMNs according to the degree of S-NSSAI provision to UE (101).
  • UE (101) can update VPLMN information related to slices that UE (101) previously stored.
  • the UE (101) stores the S-NSSAI, VPLMN information, and priority information together. This information can be used to determine the priority of PLMN selection in the process of performing PLMN selection by the UE (101).
  • the UE (101) can select a PLMN, and at this time, when selecting a PLMN, the UE (101) can select a PLMN that supports a service when roaming based on slice information, that is, information on VPLMNs that provide S-NSSAI and slices, and priority information that is determined according to the degree of slice provision for the VPLMN that provides the slice.
  • slice information that is, information on VPLMNs that provide S-NSSAI and slices, and priority information that is determined according to the degree of slice provision for the VPLMN that provides the slice.
  • AMF (111-2) can send a response message to UDM (151).
  • step 381 the UE (101) sends a registration request to the AMF (111-2) of another PLMN.
  • AMF (111-3) sends a registration accept message to UE (101).
  • FIG. 4 is a diagram illustrating an operation for supporting network slices in a 5G network according to another embodiment of the present disclosure.
  • the UE (101) notifies the network that it has slice aware PLMN selection capability (capability-slice aware-PLMN) through a registration request message or a registration complete message.
  • slice aware PLMN selection capability capability-slice aware-PLMN
  • the network can securely provide information on slices and VPLMNs (Visited PLMNs) supporting the slices from UDM (151) to AUSF (141), and priority information of VPLMNs according to the degree of slice support, to UE (101).
  • VPLMNs Virtual PLMNs
  • the network can update the information by transmitting a DL NAS transport message to UE (101).
  • URSP user equipment route selection policy
  • AUSF (141) can be used for security, but a separate application function can also be used.
  • information such as a security key and security credential shared by the network and UE (101) can be utilized.
  • AMF (111-2) sends a request message to UDM (151).
  • This request message informs the network that UE (101) has the processing capability to select a PLMN based on network slice information, and is a process in which AMF (111-2) of the network requests necessary information from UDM (151) to support the slice information requested by UE (101).
  • UDM (151) requests a security protection request message to AUSF (141).
  • the information that UDM (151) sends to AUSF (141) may include information such as S-NSSAI (single network slice selection assistance information), VPLMN information, matching information between S-NSSAI and VPLMN, and priority thereof.
  • the UDM (151) transmits information of the S-NSSAI supporting the service of the UE (101), and information of the visited PLMMs, i.e., VPLMNs, that can support the corresponding S-NSSAI, i.e., the network slice, to the AUSF (141).
  • VPLMNs there may be a list of such VPLMNs, information on whether the VPLMNs support the network slice from which the UE (101) wants to receive service, and if there are multiple VPLMNs that can provide the network slice, for example, if there are multiple VPLMNs that support the network slice corresponding to the NSSAI (for example, let's say NSSAI-a) (for example, if there are multiple VPLMNs that can support S-NSSAI-a, such as VPLMN-1, VPLMN-2, VPLMN-3, and VPLMN-4).
  • NSSAI-a for example, if there are multiple VPLMNs that can support S-NSSAI-a, such as VPLMN-1, VPLMN-2, VPLMN-3, and VPLMN-4).
  • these VPLMNs can be given priorities based on the amount of resources (radio resources, core network resources, etc.) that can be provided to the UE.
  • this priority information can be transmitted to the UE (101) by determining priorities based on the resources provided by the VPLMNs while sending information on VPLMNs (i.e., a list of VPLMNs: e.g., VPLMN-1, VPLMN-2, VPLMN-3, VPLMN-4, etc.) that are mapped 1:n (1:1 mapping is also possible) with slice information (e.g., SNSSAI-a).
  • the information transmitted may be VPLMN-1, VPLMN-2, VPLMN-3, VPLMN-4 mapped to SNSSAI-a and priority information for each of VPLMN-1, VPLMN-2, VPLMN-3, VPLMN-4.
  • priorities were given to VPLMNs based on charging, etc., but according to one embodiment of the present disclosure, priorities can be given based on services to be provided to terminals, particularly, network slice information.
  • priority may be given to a VPLMN based on how well it can provide a network slice (e.g., amount of resources available).
  • slice information, VPLMN information, and priority information of VPLMNs can be provided together.
  • the UE (101) by providing a plurality of VPLMN information in the slice information, that is, information of VPLMNs in a 1 (slice information):n (information of VPLMNs) relationship for a slice from which a service is to be received, the UE (101) can receive service according to slice-aware priority information among the VPLMNs.
  • UDM (151) provides information on VPLMNs and priorities according to the degree of slice provision of VPLMNs, it is possible to enable UE (101) to select PLMNs according to the degree of slice provision. Then, in process 223, UDM (151) can transmit slice information, whether or not to provide slice-related service, and S-NSSAI information to AUSF (141). Or, as another embodiment, UDM (151) can transmit a security protection request (request security protection) message to AUSF (141).
  • This security protection request (request security protection) message includes information on S-NSSAI supporting service, corresponding S-NSSAI, visited PLMM capable of supporting network slice, i.e., information on VPLMNs, and this information can be security protected by AUSF (141) thereafter.
  • AUSF (141) When AUSF (141) receives a security protection request message, it derives a security key based on the master key of AKA (authentication and key agreement) held by AUSF (141) and UE (101), i.e., Kausf. AUSF (141) can secure a response message using the security key derived from the Kausf key.
  • AKA authentication and key agreement
  • AUSF (141) can secure a response message using the security key derived from the Kausf key.
  • the AUSF (141) sends a response security protection message to the UDM (151). That is, the UDM (151) grants slice-aware priorities to the VPLMNs based on S-NSSAI information, S_NSSAI, that is, information on VPLMNs that can provide network slices, and information related to slices that the VPLMNs can provide (e.g., resources, data rates, etc.), and sends the messages to the AUSF (141). The AUSF (141) then security-protects the corresponding information and transmits it to the UDM (151).
  • S_NSSAI S-NSSAI information
  • S_NSSAI information on VPLMNs that can provide network slices
  • information related to slices that the VPLMNs can provide e.g., resources, data rates, etc.
  • UDM (151) transmits roaming information to AMF (111-2).
  • S-NSSAI information, matching information of VPLMNs, and priority information according to S-NSSAI provision of the corresponding VPLMN are transmitted together.
  • This S-NSSAI information, information of VPLMNs, and priority information according to the degree of slice provision of the VPLMN can be transmitted in a secured manner through encryption, integrity protection, etc.
  • AMF (111-2) sends a registration accept message to UE (101).
  • AMF (111-2) may also transmit matching information of S-NSSAI and VPLMNs, and priority information of VPLMNs according to the level of S-NSSAI provision to UE (101).
  • the UE (101) stores S-NSSAI, VPLMN information, and priority information together. This information can be used to determine the priority of PLMN selection in the process of performing PLMN selection by the UE (101).
  • the UE (101) can select a PLMN, and at this time, when selecting a PLMN, the UE (101) can select a PLMN that supports a service when roaming based on slice information, that is, information on VPLMNs that provide S-NSSAI and slices, and priority information determined according to the degree of slice provision for the VPLMN that provides the slice.
  • a registration complete message is sent to AMF (111-2).
  • UE (101) may also send a slice-aware PLMN indication to AMF (111-2).
  • UE (101) may inform the network that UE (101) has the ability to select PLMN based on slice information.
  • the UE (101) and the network perform communication.
  • the network performs triggering to update the changed information.
  • UDM (151) can trigger a procedure for updating changed information related to the configuration of UE (101) by sending a message to AUSF (141).
  • UDM (151) requests a security protection request message to AUSF (141).
  • the information that UDM (151) sends to AUSF (141) may include information such as S-NSSAI (single network slice selection assistance information), VPLMN information, matching information between S-NSSAI and VPLMN, and priority thereof.
  • the UDM (151) transmits information of the S-NSSAI supporting the service of the UE (101), and information of the visited PLMMs, i.e., VPLMNs, that can support the corresponding S-NSSAI, i.e., the network slice, to the AUSF (141).
  • VPLMNs there may be a list of such VPLMNs, information on whether the VPLMNs support the network slice from which the UE (101) wants to receive service, and if there are multiple VPLMNs that can provide the network slice, for example, if there are multiple VPLMNs that support the network slice corresponding to the NSSAI (for example, NSSAI-a) (for example, if there are multiple VPLMNs that can support S-NSSAI-a, such as VPLMN-1, VPLMN-2, VPLMN-3, and VPLMN-4).
  • NSSAI-a for example, if there are multiple VPLMNs that can support S-NSSAI-a, such as VPLMN-1, VPLMN-2, VPLMN-3, and VPLMN-4).
  • these VPLMNs can be given priorities based on the amount of resources (radio resources, core network resources, etc.) that can be provided to the UE.
  • this priority information can be transmitted to the UE (101) by determining priorities based on the resources provided by the VPLMNs while sending information on VPLMNs (i.e., a list of VPLMNs: e.g., VPLMN-1, VPLMN-2, VPLMN-3, VPLMN-4, etc.) that are mapped 1:n (1:1 mapping is also possible) with slice information (e.g., SNSSAI-a).
  • the information transmitted may be VPLMN-1, VPLMN-2, VPLMN-3, VPLMN-4 mapped to SNSSAI-a and priority information for each of VPLMN-1, VPLMN-2, VPLMN-3, VPLMN-4.
  • priorities were given to VPLMNs based on charging, etc., but according to one embodiment of the present disclosure, priorities can be given based on services to be provided to terminals, particularly, network slice information.
  • priority may be given to a VPLMN based on how well it can provide a network slice (e.g., amount of resources available).
  • slice information, VPLMN information, and priority information of VPLMNs can be provided together.
  • the UE (101) by providing a plurality of VPLMN information in the slice information, that is, information of VPLMNs in a 1 (slice information):n (information of VPLMNs) relationship for a slice from which a service is to be received, the UE (101) can receive service according to slice-aware priority information among the VPLMNs.
  • the UE (101) can select a PLMN according to the degree of slice provision.
  • UDM (151) can transmit slice information and whether slice-related service is provided, and S-NSSAI information to AUSF (141).
  • UDM (151) can transmit a security protection request (request security protection) message to AUSF (141).
  • This security protection request (request security protection) message includes information on S-NSSAI supporting service, corresponding S-NSSAI, visited PLMM that can support network slice, i.e., information on VPLMNs, and this information can be security protected by AUSF (141) thereafter.
  • AUSF (141) When AUSF (141) receives a security protection request message, it derives a security key based on the master key of AKA (authentication and key agreement) held by AUSF (141) and UE (101), i.e., Kausf. AUSF (141) can secure a response message using the security key derived from the Kausf key.
  • AKA authentication and key agreement
  • AUSF (141) can secure a response message using the security key derived from the Kausf key.
  • the AUSF (141) sends a response security protection message to the UDM (151). That is, the UDM (151) grants slice-aware priorities to the VPLMNs based on S-NSSAI information, S_NSSAI, that is, information on VPLMNs that can provide network slices, and information related to slices that the VPLMNs can provide (e.g., resources, data rates, etc.), and sends the messages to the AUSF (141). The AUSF (141) then security-protects the corresponding information and transmits it to the UDM (151).
  • S_NSSAI S-NSSAI information
  • S_NSSAI information on VPLMNs that can provide network slices
  • information related to slices that the VPLMNs can provide e.g., resources, data rates, etc.
  • UDM (151) can trigger a procedure for updating URSP by sending a URSP update request (Request URSP update) message to PCF (161).
  • URSP update request Request URSP update
  • PCF (161) can send a response message to UDM (151).
  • PCF (161) transmits a URSP update (URSP update for updating URSP rule) message to AMF (111-2).
  • URSP update URSP update for updating URSP rule
  • S-NSSAI information, matching information of VPLMNs, and priority information according to S-NSSAI provision of the corresponding VPLMN are transmitted together.
  • This S-NSSAI information, information of VPLMNs, and priority information according to the degree of slice provision of the VPLMN can be transmitted in a secured manner through encryption, integrity protection, etc.
  • AMF (111-2) sends a configuration update command message to UE (101).
  • the configuration update command message is described as an example, but it may also be possible to perform this function using another message.
  • AMF (111-2) may also transmit matching information of S-NSSAI and VPLMNs, and priority information of VPLMNs according to the degree of S-NSSAI provision to UE (101).
  • UE (101) may update VPLMN information related to a slice that UE (101) previously stored.
  • the UE (101) stores the S-NSSAI, VPLMN information, and priority information together. This information can be used to determine the priority of PLMN selection in the process of performing PLMN selection by the UE (101).
  • the UE (101) can select a PLMN, and at this time, when selecting a PLMN, the UE (101) can select a PLMN that supports a service when roaming based on slice information, that is, information on VPLMNs that provide S-NSSAI and slices, and priority information that is determined according to the degree of slice provision for the VPLMN that provides the slice.
  • slice information that is, information on VPLMNs that provide S-NSSAI and slices, and priority information that is determined according to the degree of slice provision for the VPLMN that provides the slice.
  • the UE (101) may respond by sending a configuration complete message to the AMF (111-2).
  • the response message may be used to inform the network that another form of response message has transmitted information related to the VPLMN, slice.
  • AMF (111-2) can send a response message to PCF (161).
  • FIG. 5 is a diagram illustrating an operation for supporting network slices in a 5G network according to another embodiment of the present disclosure.
  • a UE (101) notifies the network that it has slice aware PLMN selection capability (capability-slice aware-PLMN) through a registration request message or a registration complete message, and the network can securely provide information on slices and VPLMNs (Visited PLMNs) supporting slices, and priority information of VPLMNs according to the degree of slice support from UDM (151) to AF (XX), i.e., application function or network entity, to the UE (101).
  • slice aware PLMN selection capability capability-slice aware-PLMN
  • XX application function or network entity
  • the UE (101) sends a registration request message to the AMF (111-2) through the 5G RAN (103-02).
  • the UE (101) includes slice aware PLMN selection capability (capability-slice aware-PLMN) information in the registration request message and sends it together.
  • This slice aware PLMN selection capability (capability slice aware-PLMN) information is information for notifying that the UE (101) can select a PLMN based on the slice information or that the terminal can select a PLMN based on the slice information when roaming.
  • This slice aware PLMN selection capability (capability slice aware-PLMN) information may be an independent information element (IE), may be part of a 5GMM information element, or may include specific bits or indicators.
  • IE independent information element
  • the AMF (111-2) sends a request message to the UDM (151).
  • This request message informs the network that the UE (101) has the processing capability to select a PLMN based on network slice information, and is a process in which the AMF (111-2) of the network requests the UDM (151) for necessary information to support the slice information requested by the UE (101).
  • UDM (151) requests a security protection request message to AF (xx) or a network function that provides security protection.
  • the information that UDM (151) sends to AF (xx) or a network function that provides security protection may include information such as S-NSSAI (single network slice selection assistance information), VPLMN information, matching information between S-NSSAI and VPLMN, and priority thereof.
  • the UDM (151) transmits information of the S-NSSAI supporting the service of the UE (101), and information of the visited PLMMs, i.e., VPLMNs, that can support the corresponding S-NSSAI, i.e., the network slice, to the AUSF (141).
  • VPLMNs there may be a list of such VPLMNs, information on whether the VPLMNs support the network slice from which the UE (101) wants to receive service, and if there are multiple VPLMNs that can provide the network slice, for example, if there are multiple VPLMNs that support the network slice corresponding to the NSSAI (for example, NSSAI-a) (for example, if there are multiple VPLMNs that can support S-NSSAI-a, such as VPLMN-1, VPLMN-2, VPLMN-3, and VPLMN-4).
  • NSSAI-a for example, if there are multiple VPLMNs that can support S-NSSAI-a, such as VPLMN-1, VPLMN-2, VPLMN-3, and VPLMN-4).
  • these VPLMNs can be given priorities based on the amount of resources (radio resources, core network resources, etc.) that can be provided to the UE.
  • this priority information can be transmitted to the UE (101) by determining priorities based on the resources provided by the VPLMNs while sending information on VPLMNs (i.e., a list of VPLMNs: e.g., VPLMN-1, VPLMN-2, VPLMN-3, VPLMN-4, etc.) that are mapped 1:n (1:1 mapping is also possible) with slice information (e.g., SNSSAI-a).
  • the information transmitted may be VPLMN-1, VPLMN-2, VPLMN-3, VPLMN-4 mapped to SNSSAI-a and priority information for each of VPLMN-1, VPLMN-2, VPLMN-3, VPLMN-4.
  • priorities were given to VPLMNs based on charging, etc., but according to one embodiment of the present disclosure, priorities can be given based on services to be provided to terminals, particularly, network slice information.
  • priority may be given to a VPLMN based on how well it can provide a network slice (e.g., amount of resources available).
  • slice information, VPLMN information, and priority information of VPLMNs can be provided together.
  • the UE (101) by providing a plurality of VPLMN information in the slice information, that is, information of VPLMNs in a 1 (slice information):n (information of VPLMNs) relationship for a slice from which a service is to be received, the UE (101) can receive service according to slice-aware priority information among the VPLMNs.
  • the UDM (151) provides information on VPLMNs and priorities according to the degree of slice provision of the VPLMNs, it is possible to enable the UE (101) to select a PLMN according to the degree of slice provision. Then, in process 523, the UDM (151) can transmit slice information, whether to provide slice-related service, and S-NSSAI information to the AF (xx) or a network function that provides security protection. Or, as another embodiment, the UDM (151) can transmit a security protection request (request security protection) message to the AUSF (141).
  • a security protection request request security protection
  • This security protection request (request security protection) message includes information on the S-NSSAI that supports the service, the corresponding S-NSSAI, the visited PLMM that can support the network slice, that is, information on the VPLMNs, and this information can be security protected by the AUSF (141) thereafter.
  • the AF(xx) or network function providing security protection can secure the message based on the application security key, security key, or security credential information held by the UE(101).
  • the AF(xx) or network function that provides security protection sends a response security protection message to the UDM(151). That is, the UDM(151) assigns slice-aware priorities to the VPLMNs based on S-NSSAI information, S_NSSAI, that is, information on VPLMNs that can provide network slices, and information related to slices that the VPLMNs can provide (e.g., resource, data rate, etc.), that is, the UDM(151) assigns priorities based on the information related to slices that the VPLMNs can provide (e.g., resource, data rate, etc.), and sends the messages to the AF(xx) or network function that provides security protection. The AF(xx) or network function that provides security protection then transmits the corresponding information to the UDM(151).
  • S_NSSAI S-NSSAI information
  • S_NSSAI information on VPLMNs that can provide network slices
  • information related to slices that the VPLMNs can provide e.g.,
  • UDM (151) transmits roaming information to AMF (111-2).
  • S-NSSAI information S-NSSAI information, matching information of VPLMNs, and priority information according to S-NSSAI provision of the corresponding VPLMN are transmitted together.
  • This S-NSSAI information, information of VPLMNs, and priority information according to the degree of slice provision of the VPLMN can be transmitted in a secured manner through encryption, integrity protection, etc.
  • AMF (111-2) sends a registration accept message to UE (101).
  • AMF (111-2) can also send matching information of S-NSSAI and VPLMNs, and priority information of VPLMNs according to the level of S-NSSAI provision to UE (101).
  • the UE (101) stores S-NSSAI, VPLMN information, and priority information together. This information can be used to determine the priority of PLMN selection in the process of performing PLMN selection by the UE (101).
  • the UE (101) can select a PLMN, and at this time, when selecting a PLMN, the UE (101) can select a PLMN that supports a service when roaming based on slice information, that is, information on VPLMNs that provide S-NSSAI and slices, and priority information that is determined according to the degree of slice provision for the VPLMN that provides the slice.
  • the UE (101) sends a registration complete message to the AMF (111-2).
  • the UE (101) may also send a slice-aware PLMN indication to the AMF (111-2).
  • the UE (101) may inform the network that the UE (101) has the ability to select a PLMN based on slice information.
  • step 581 the UE (101) sends a registration request to the AMF (111-2) of another PLMN.
  • AMF (111-3) sends a registration accept message to UE (101).
  • FIG. 6 is a diagram showing the configuration of a terminal according to one embodiment of the present disclosure.
  • the terminal of the present disclosure may include a transceiver (610), a memory (620), and a processor (630).
  • the processor (630), the transceiver (610), and the memory (620) of the terminal may operate according to the communication method of the terminal described above.
  • the components of the terminal are not limited to the examples described above.
  • the terminal may include more or fewer components than the components described above.
  • the processor (630), the transceiver (610), and the memory (620) may be implemented in the form of a single chip.
  • the transceiver (610) is a general term for the terminal's receiving unit and the terminal's transmitting unit, and can transmit and receive signals with a base station or a network entity.
  • the signals transmitted and received with the base station can include control information and data.
  • the transceiver (610) can be configured with an RF transmitter that up-converts and amplifies the frequency of a transmitted signal, and an RF receiver that low-noise amplifies and down-converts the frequency of a received signal.
  • this is only one embodiment of the transceiver (610), and the components of the transceiver (610) are not limited to the RF transmitter and RF receiver.
  • the transceiver (610) may include a wired or wireless transceiver and may include various configurations for transmitting and receiving signals.
  • the transceiver (610) can receive a signal through a wireless channel and output it to the processor (630), and transmit a signal output from the processor (630) through the wireless channel.
  • the transceiver (610) can receive a communication signal and output it to the processor, and transmit the signal output from the processor to a network entity through a wired or wireless network.
  • the memory (620) can store programs and data required for the operation of the terminal. In addition, the memory (620) can store control information or data included in a signal obtained from the terminal.
  • the memory (620) can be composed of a storage medium such as a ROM, a RAM, a hard disk, a CD-ROM, and a DVD, or a combination of storage media.
  • the processor (630) can control a series of processes so that the terminal can operate according to the embodiment of the present disclosure described above.
  • the processor (630) can include at least one processor.
  • the processor (630) can include a CP (communication processor) that performs control for communication and an AP (application processor) that controls upper layers such as application programs.
  • CP communication processor
  • AP application processor
  • FIG. 7 is a diagram illustrating a configuration of a network entity according to one embodiment of the present disclosure.
  • a network entity of the present disclosure may include a transceiver (710), a memory (720), and a processor (730).
  • the processor (730), the transceiver (710), and the memory (720) of the network entity may operate according to the communication method of the network entity described above.
  • the components of the network entity are not limited to the examples described above.
  • the network entity may include more or fewer components than the components described above.
  • the processor (730), the transceiver (710), and the memory (720) may be implemented in the form of a single chip.
  • the network entity may include network functions (NFs), such as the AMF, SMF, PCF, NEF (Network Exposure Function), UDM, and UPF described above.
  • NFs network functions
  • the transceiver (710) is a general term for the receiving unit of a network entity and the transmitting unit of a network entity, and can transmit and receive signals with a terminal or another network entity. At this time, the transmitted and received signals can include control information and data. To this end, the transceiver (710) can be configured with an RF transmitter that up-converts and amplifies the frequency of a transmitted signal, and an RF receiver that low-noise amplifies and frequency-down-converts a received signal. However, this is only one embodiment of the transceiver (710), and the components of the transceiver (710) are not limited to the RF transmitter and RF receiver.
  • the transceiver (710) can include a wired or wireless transceiver, and can include various configurations for transmitting and receiving signals.
  • the transceiver (710) can receive a signal through a communication channel (e.g., a wireless channel) and output it to the processor (730), and transmit a signal output from the processor (730) through the communication channel.
  • a communication channel e.g., a wireless channel
  • the transceiver (710) can receive a communication signal and output it to the processor, and transmit the signal output from the processor to a terminal or other network entity through a wired or wireless network.
  • the memory (720) can store programs and data required for the operation of the network entity. In addition, the memory (720) can store control information or data included in a signal obtained from the network entity.
  • the memory (720) can be configured as a storage medium or a combination of storage media such as a ROM, a RAM, a hard disk, a CD-ROM, and a DVD.
  • the processor (730) may control a series of processes so that the network entity may operate according to the embodiments of the present disclosure described above.
  • the processor (730) may include at least one processor.
  • the methods according to the embodiments described in the claims or specification of the present disclosure may be implemented in the form of hardware, software, or a combination of hardware and software.
  • a computer-readable storage medium storing one or more programs (software modules) may be provided.
  • the one or more programs stored in the computer-readable storage medium are configured for execution by one or more processors in an electronic device.
  • the one or more programs include instructions that cause the electronic device to execute methods according to the embodiments described in the claims or specification of the present disclosure.
  • These programs may be stored in a random access memory, a non-volatile memory including a flash memory, a read only memory (ROM), an electrically erasable programmable read only memory (EEPROM), a magnetic disc storage device, a compact disc-ROM (CD-ROM), digital versatile discs (DVDs) or other forms of optical storage devices, a magnetic cassette. Or, they may be stored in a memory composed of a combination of some or all of these. In addition, each configuration memory may be included in multiple numbers.
  • ROM read only memory
  • EEPROM electrically erasable programmable read only memory
  • CD-ROM compact disc-ROM
  • DVDs digital versatile discs
  • each configuration memory may be included in multiple numbers.
  • the program may be stored in an attachable storage device that is accessible via a communications network, such as the Internet, an Intranet, a local area network (LAN), a wide area network (WAN), or a storage area network (SAN), or a combination thereof.
  • the storage device may be connected to a device performing an embodiment of the present disclosure via an external port. Additionally, a separate storage device on the communications network may be connected to a device performing an embodiment of the present disclosure.
  • the components included in the disclosure are expressed in the singular or plural form depending on the specific embodiment presented.
  • the singular or plural expressions are selected to suit the presented situation for the convenience of explanation, and the present disclosure is not limited to the singular or plural components, and even if a component is expressed in the plural form, it may be composed of the singular form, or even if a component is expressed in the singular form, it may be composed of the plural form.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente divulgation concerne un système de communication 5G ou 6G permettant de prendre en charge des débits de transmission de données supérieurs. La présente divulgation concerne un procédé et un dispositif de prise en charge, dans un système de communication sans fil, d'un terminal qui effectue une communication de données à l'aide d'une tranche de réseau.
PCT/KR2024/004222 2023-04-07 2024-04-02 Procédé et dispositif pour prendre en charge un découpage en tranches de réseau pour un terminal itinérant dans un système de communication sans fil WO2024210448A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020230046403A KR20240150295A (ko) 2023-04-07 2023-04-07 무선통신 시스템에서 로밍 단말을 위한 네트워크 슬라이싱을 지원하는 방법 및 장치
KR10-2023-0046403 2023-04-07

Publications (1)

Publication Number Publication Date
WO2024210448A1 true WO2024210448A1 (fr) 2024-10-10

Family

ID=92972161

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2024/004222 WO2024210448A1 (fr) 2023-04-07 2024-04-02 Procédé et dispositif pour prendre en charge un découpage en tranches de réseau pour un terminal itinérant dans un système de communication sans fil

Country Status (2)

Country Link
KR (1) KR20240150295A (fr)
WO (1) WO2024210448A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20200128978A (ko) * 2019-05-07 2020-11-17 삼성전자주식회사 무선 통신 시스템에서 세션 연속성을 제공하기 위한 방법 및 장치
KR20200139151A (ko) * 2018-04-05 2020-12-11 퀄컴 인코포레이티드 사용자 장비 라디오 능력 시그널링의 최적화
KR20210036958A (ko) * 2018-08-01 2021-04-05 비보 모바일 커뮤니케이션 컴퍼니 리미티드 제어 방법, 단말 및 네트워크측 요소
KR20230035073A (ko) * 2020-07-31 2023-03-10 비보 모바일 커뮤니케이션 컴퍼니 리미티드 정보 구성 방법, 정보 구성 장치 및 통신 장치

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20200139151A (ko) * 2018-04-05 2020-12-11 퀄컴 인코포레이티드 사용자 장비 라디오 능력 시그널링의 최적화
KR20210036958A (ko) * 2018-08-01 2021-04-05 비보 모바일 커뮤니케이션 컴퍼니 리미티드 제어 방법, 단말 및 네트워크측 요소
KR20200128978A (ko) * 2019-05-07 2020-11-17 삼성전자주식회사 무선 통신 시스템에서 세션 연속성을 제공하기 위한 방법 및 장치
KR20230035073A (ko) * 2020-07-31 2023-03-10 비보 모바일 커뮤니케이션 컴퍼니 리미티드 정보 구성 방법, 정보 구성 장치 및 통신 장치

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on enhancement of network slicing; Phase 3 (Release 18)", 3GPP STANDARD; 3GPP TR 23.700-41, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, no. V18.0.0, 21 December 2022 (2022-12-21), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, pages 1 - 167, XP052234757 *

Also Published As

Publication number Publication date
KR20240150295A (ko) 2024-10-15

Similar Documents

Publication Publication Date Title
WO2022235117A1 (fr) Procédé et appareil de prise en charge d'acquisition d'informations de système par un terminal distant de liaison latérale sur un relais de liaison latérale
WO2022240153A1 (fr) Procédé et appareil de commande d'une session pdu
WO2023146252A1 (fr) Procédé et appareil de prise en charge de service d'urgence et de service de priorité dans un système de communication sans fil
WO2023080748A1 (fr) Procédé et dispositif de prise en charge de découpage de réseau efficace dans un système de communication sans fil
WO2023059036A1 (fr) Procédé et dispositif de communication dans un système de communication sans fil prenant en charge un service de système volant sans pilote embarqué
WO2024210448A1 (fr) Procédé et dispositif pour prendre en charge un découpage en tranches de réseau pour un terminal itinérant dans un système de communication sans fil
WO2024172567A1 (fr) Procédé et dispositif de communication sans fil utilisant une tranche de réseau
WO2025037886A1 (fr) Appareil et procédé de prise en charge de mobilité de terminal dans un système de communication sans fil
WO2024147508A1 (fr) Procédé et dispositif pour prendre en charge l'établissement d'une session pdu sur une tranche de réseau dans un réseau de communication
WO2024035135A1 (fr) Procédé et appareil de gestion de session de service informatique périphérique dans un système de communication sans fil
WO2024101895A1 (fr) Procédé et dispositif d'autorisation basés sur une upf dans un système de communication sans fil
WO2024248374A1 (fr) Système et procédé de sélection de nf pour une gestion d'accès et de mobilité dans une architecture basée sur un service
WO2024072135A1 (fr) Procédés de gestion de données ciot pour un id de session pdu invalide
WO2022235081A1 (fr) Contrôle d'admission de tranche de réseau sur la base de la disponibilité d'un quota au niveau d'un appareil à fonction nsacf dans un réseau sans fil
WO2024210401A1 (fr) Procédé et appareil d'émission-réception d'informations de capacité d'ue associées à un positionnement de liaison latérale dans un système de communication sans fil
WO2023136507A1 (fr) Procédé et dispositif de radiocommunication, appareil électronique et support de stockage
WO2024101949A1 (fr) Connexion de nœud répéteur à un réseau
WO2024035005A1 (fr) Procédé et appareil de transmission multi-trajet sécurisée de services de proximité dans un système de communication sans fil
WO2024147642A1 (fr) Procédés et appareil pour mettre en œuvre une mobilité déclenchée par une couche inférieure dans un système de communication sans fil
WO2024147661A1 (fr) Procédé et dispositif pour prendre en charge un changement de tranche de réseau en tenant compte d'un quota de tranches de réseau
WO2023085707A1 (fr) Procédé et appareil de transmission de données en fonction de la qualité de service dans un système de communication sans fil
WO2022240191A1 (fr) Procédé et appareil de services de proximité dans un réseau de télécommunication
WO2024172591A1 (fr) Procédé et appareil de configuration et de signalisation de multiples événements de déclenchement de rapport de mesure dans un système de communication
WO2023249383A1 (fr) Procédé et nœud de configuration dans un système de communication prenant en charge un accès et une liaison terrestre intégrés (iab)
WO2023075374A1 (fr) Procédé et dispositif d'exemption de limitations de débit binaire de tranche de réseau dans un système de communication sans fil

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 24785154

Country of ref document: EP

Kind code of ref document: A1