[go: up one dir, main page]

WO2019158033A1 - Procédé, équipement et système de contrôle de politique - Google Patents

Procédé, équipement et système de contrôle de politique Download PDF

Info

Publication number
WO2019158033A1
WO2019158033A1 PCT/CN2019/074804 CN2019074804W WO2019158033A1 WO 2019158033 A1 WO2019158033 A1 WO 2019158033A1 CN 2019074804 W CN2019074804 W CN 2019074804W WO 2019158033 A1 WO2019158033 A1 WO 2019158033A1
Authority
WO
WIPO (PCT)
Prior art keywords
network element
usage
psa
urr
management network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2019/074804
Other languages
English (en)
Chinese (zh)
Inventor
丁辉
时书锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of WO2019158033A1 publication Critical patent/WO2019158033A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • H04L12/1403Architecture for metering, charging or billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing

Definitions

  • the embodiments of the present invention relate to the field of communications technologies, and in particular, to a policy control method, device, and system.
  • an amount of real-time network control mechanism for regulating the amount of resources may be employed.
  • the usage monitoring can monitor one or a group of service data flows, and can also monitor the service data flow on the entire protocol data unit (PDU) session, and is not limited.
  • PDU protocol data unit
  • the service data stream can be monitored or monitored on a PDU Session Anchor (PSA) included in the PDU session. .
  • PSA PDU Session Anchor
  • the existing 5G system only supports the usage monitoring of the usage monitoring instance on one PSA included in the PDU session, and does not support simultaneous execution on multiple PSAs included in the PDU session.
  • the usage monitoring of the usage monitoring instance is not limited to one PSA included in the PDU session.
  • the embodiment of the present application provides a policy control method, device, and system, so as to implement performing usage monitoring on the same usage monitoring instance on multiple PSAs.
  • the embodiment of the present application adopts the following technical solutions.
  • the embodiment of the present application provides a policy control method, where the method is performed by a session management network element, and a PDU session managed by the session management network element includes a first PSA and a second PSA, and the session management network element A PSA sends a first usage report rule (Usage Report Rule, URR) corresponding to a monitoring key, and the method may include: receiving a Policy and Charging Control (PCC) from the policy control network element.
  • PCC Policy and Charging Control
  • the session management network element receives the policy.
  • the PDR and the URR corresponding to the monitoring key are sent, so that other PSAs perform usage monitoring according to the PDR and the URR.
  • the usage monitoring of the same usage monitoring instance corresponding to the same monitoring key is performed on multiple PSAs.
  • the embodiment of the present application provides a policy control method, where the method is performed by a session management network element, where a PDU session managed by the session management network element includes a first PSA and a second PSA, and the session management network element A PSA sends a first URR corresponding to the first monitoring key, and the method may include: the session management network element receiving the PCC rule from the policy control network element, and the policy for indicating that the PCC rule is executed on the second PSA.
  • the policy control information of the information, the PCC rule carries a first monitoring key; the session management network element sends a first PDR corresponding to the PCC rule and a second URR corresponding to the first monitoring key to the second PSA.
  • the session management network element receives the policy. Controlling, by the network element, the policy control information that carries the PCC rule and the information for indicating the policy corresponding to the PCC rule on the other PSAs included in the PDU session, the monitoring key carried according to the PCC rule, and the policy control information included.
  • the information indicating that the policy corresponding to the PCC rule is executed on the other PSAs is sent to the other PSAs of the PDU session and the URR corresponding to the monitoring key, so that other PSAs perform usage monitoring according to the PDR and the URR, thus implementing The usage monitoring of the same usage monitoring instance corresponding to the same monitoring key is performed on multiple PSAs.
  • the method further includes: determining, by the session management network element, packet detection information of the first PDR according to the service data flow template in the PCC rule, and determining a second URR for the first monitoring key; wherein the first PDR includes the identifier of the second URR .
  • the session management network element sends the PDR and the URR to the second PSA, the PDR is determined according to the PCC rule, and the URR is determined for the first monitoring key, so that the PDR is associated with the URR.
  • the first usage monitoring instance is an instance of the traffic data flow level usage monitoring, and thus, the foregoing scheme can be implemented in multiple PSAs. Perform usage monitoring on the same business data flow level usage monitoring instance.
  • the embodiment of the present application provides a policy control method, where the method is performed by a session management network element, and a PDU session managed by the session management network element includes a first PSA and a second PSA, and the session management network element A PSA sends a first URR corresponding to the first monitoring key, where the first monitoring key corresponds to a session-level usage monitoring instance;
  • the method may include: the session management network element receives policy control information from the policy control network element, where the policy control information is used Instructing to perform session level usage monitoring on the second PSA, or to indicate that session level usage monitoring is performed on all PSAs included in the PDU session; the session management network element sends a second URR corresponding to the first monitoring key to the second PSA, where The second URR is associated with at least one Packet Detection Rule (PDR) performed by the second PSA, and the service data matched by each PDR is included in the session level usage monitoring.
  • PDR Packet Detection Rule
  • the PDU session includes multiple PSAs
  • the session management network element has sent the URR corresponding to the monitoring key corresponding to the session-level usage monitoring instance to a PSA included in the PDU session.
  • the session management network element receives policy control sent by the network control network element to indicate that session level usage monitoring is performed on other PSAs included in the PDU session or is used to indicate that session level usage monitoring is performed on all PSAs included in the PDU session.
  • the information sends a new URR corresponding to the monitoring key corresponding to the session-level usage monitoring instance to the other PSAs of the PDU session, so that the other PSAs perform according to the URR and the at least one PDR associated with the URR.
  • the usage monitoring in this way, enables the usage monitoring of the same session level usage monitoring instance in multiple PSAs.
  • the method before the session management network element sends the second URR corresponding to the first monitoring key to the second PSA, the method further includes: the session management network element is the first monitoring key. Determine the second URR. In this manner, before the session management network element sends the second URR corresponding to the second monitoring key to the second PSA, the session management network element itself determines the second URR corresponding to the first monitoring key.
  • the policy control information sent by the policy control network element further includes: the first usage of the first monitoring key a threshold and a first indication indicating that the first usage threshold is not used to cover a usage threshold of the first monitoring key received before the session management network element; the session management network element determines a second URR for the first monitoring key, specifically: a session The management network element determines the usage threshold of the second URR according to the first usage threshold.
  • the policy control network element can re-allocate the usage threshold of the first monitoring key for the second PSA by using the policy control information, so that after the session management network element receives the policy control information, the first control network element sends the first new one according to the policy.
  • the usage threshold of the monitoring key determines the second URR of the first monitoring key.
  • the session management network element determines a second URR for the first monitoring key, specifically: a session management network.
  • the session management network element receives the cumulative usage of the first URR reported by the first PSA;
  • the session management network element determines the available usage threshold according to the cumulative usage of the first URR;
  • the management network element determines the usage threshold of the second URR according to the available usage threshold. In this manner, the session management network element may determine the usage threshold of the second URR according to the available usage threshold corresponding to the first monitoring key, and send the second URR to the second PSA.
  • the session management network element determines a second URR for the first monitoring key, specifically: the session management network.
  • the element determines whether there is a remaining usage threshold corresponding to the first monitoring key; if there is a remaining usage threshold, the session management network element determines the usage threshold of the second URR according to the remaining usage threshold; or;
  • the session management network element requests the first PSA to report the cumulative usage of the first URR; the session management network element receives the accumulated usage of the first URR reported by the first PSA; and the session management network element uses the cumulative usage of the first URR according to the usage.
  • the available usage threshold is determined and the usage threshold for the second URR is determined based on the available usage threshold.
  • the session management network element may determine the usage threshold of the second URR according to the remaining usage threshold corresponding to the first monitoring key, and send the second URR to the second PSA, or the remaining one corresponding to the first monitoring key.
  • the usage threshold of the second URR is determined according to the available usage threshold corresponding to the first monitoring key, and the second URR is delivered to the second PSA.
  • the method further includes: the session management network element updates the usage threshold of the first URR according to the available usage threshold; the session management network The element sends the updated first URR to the first PSA. In this manner, the session management network element may re-adjust the usage threshold of the first URR according to the available usage threshold corresponding to the first monitoring key.
  • the available usage threshold is the number of the session management network element received from the policy management network element. The difference between the usage threshold of a monitoring key and the cumulative usage of the first URR received by the session management network element.
  • the policy control information further includes a second usage threshold of the first monitoring key; the session management network element is The first monitoring key determines the second URR. Specifically, the session management network element determines the usage threshold of the second URR according to the second usage threshold. In this manner, the usage threshold of the first monitoring key may be re-issued by the policy control network element, so that the session management network element determines the usage threshold of the second URR according to the usage threshold of the first monitoring key, and sends the usage threshold to the second PSA. . It should be noted that, in the ninth possible design, the session management network element may further update the usage threshold of the first URR according to the second usage threshold, and deliver the updated first URR to the first PSA.
  • the method further includes: the session management network element requests the first PSA to report the first The cumulative usage of a URR receives the accumulated usage of the first URR reported by the first PSA; the session management network element sends a message to the policy control network element, wherein the message carries the indication of adding the second PSA and the cumulative usage of the first monitoring key The information, the cumulative usage of the first monitoring key includes the cumulative usage of the first URR.
  • the policy control network element re-delivers the usage threshold corresponding to the first monitoring key according to the usage quota of the usage quota and the cumulative usage of the first monitoring key.
  • the session management network element sends the first PDR and the first corresponding to the PCC rule to the second PSA.
  • the method further includes: the session management network element receives the cumulative usage of the URR of any PSA report included in the PDU session, and the session management network element reports the accumulation of the first monitoring key to the policy control network element.
  • the usage amount of the first monitoring key includes the cumulative usage of the URR reported by any PSA; or the session management network element receives the cumulative usage of the URR of any PSA report included in the PDU session, and the session management network element determines whether there is any The remaining usage threshold corresponding to the first monitoring key; if there is a remaining usage threshold, the session management network element updates the usage threshold of the URR reported by any PSA according to the remaining usage threshold; if there is no remaining usage threshold The session management network element reports the cumulative usage of the first monitoring key to the policy control network element; wherein, the first monitoring key is tired Includes any amount of the accumulated amount of PSA URR report, either of a first PSA is a PSA or the second PSA.
  • the session management network element After receiving the cumulative usage of the URR reported by the PSA, the session management network element sends the cumulative usage of the monitoring key corresponding to the URR to the policy control network element, so that the policy control network element re-issues the usage threshold corresponding to the monitoring key. Or, according to the remaining usage threshold corresponding to the first monitoring key, the URR usage threshold is adjusted, and the adjusted URR is re-issued to the PSA, and the cumulative usage of the monitoring key corresponding to the URR is not required to be reported to the policy control network. To reduce the power consumption of the network element by using the lowering policy, or to send the cumulative usage of the monitoring key corresponding to the URR to the policy control network element for policy control if the remaining usage threshold corresponding to the first monitoring key does not exist. The network element re-issues the usage threshold corresponding to the monitoring key.
  • the method further includes: the session management network element
  • the policy control network element sends the identifier of any PSA.
  • the identifier of the PSA is used to identify the PSA, so that the policy control network element can know which PSA is reported to be used, and provide a reference for the policy control network element to subsequently develop a monitoring policy.
  • the remaining usage threshold is received by the session management network element from the policy management network element. There is no usage threshold assigned to the URR in the usage threshold corresponding to the first monitoring key.
  • the embodiment of the present application provides a policy control method, where the method is performed by a policy control network element, where the policy control network element determines that a PDU session includes a first PSA and a second PSA, and the policy control network element determines the first PSA.
  • the method further includes: determining to perform usage monitoring on the first usage monitoring instance on the second PSA; and sending the PCC rule to the session management network element Policy control information; wherein the PCC rule carries a first monitoring key, and information for indicating a policy corresponding to the PCC rule being executed on the second PSA.
  • the policy control network element determines the PDU according to the policy control method provided by the embodiment of the present application, in a case that the PDU session includes multiple PSAs, and the PSA performs the usage monitoring of the usage monitoring instance corresponding to the monitoring key.
  • the other PSAs included in the session also perform the usage monitoring of the usage monitoring instance, and send the policy control information carrying the PCC rules to the session management network element, so that the session management network element carries the monitoring key carried by the PCC rule and the PCC rule.
  • the information indicating the policy corresponding to the PCC rule is performed on the other PSAs, and the PDR corresponding to the monitoring key is sent to the other PSAs of the PDU session, so that other PSAs perform usage monitoring according to the PDR and the URR, thereby realizing more The PSAs perform usage monitoring of the same usage monitoring instance corresponding to the same monitoring key.
  • the embodiment of the present application provides a policy control method, where the method is performed by a policy control network element, where the policy control network element determines that a PDU session includes a first PSA and a second PSA, and the policy control network element determines the first PSA.
  • the method further includes: determining to perform usage monitoring on the first usage monitoring instance on the second PSA; and sending the PCC rule to the session management network element, And policy control information for indicating information for executing a policy corresponding to the PCC rule on the second PSA; wherein the PCC rule carries the first monitoring key.
  • the policy control network element determines the PDU according to the policy control method provided by the embodiment of the present application, in a case that the PDU session includes multiple PSAs, and the PSA performs the usage monitoring of the usage monitoring instance corresponding to the monitoring key.
  • the other PSAs included in the session also perform the usage monitoring of the usage monitoring instance, and send the policy control information carrying the PCC rule and the information for indicating the policy corresponding to the PCC rule on the other PSA for the session management network element, so that the session is
  • the management network element sends the PDR and the URR corresponding to the monitoring key to other PSAs of the PDU session according to the monitoring key carried in the PCC rule and the information indicating the policy corresponding to the execution of the PCC rule on the other PSA, so that the other
  • the PSA performs usage monitoring based on the PDR and the URR, and implements usage monitoring of the same usage monitoring instance corresponding to the same monitoring key in multiple PSAs.
  • the embodiment of the present application provides a policy control method, where the method is controlled by a policy control network element, where the policy control network element determines that a PDU session includes a first PDU session anchor point PSA and a second PSA, and the policy control network element Determining the usage monitoring of the session-level usage monitoring instance corresponding to the first monitoring key on the first PSA; the method includes: determining to perform session-level usage monitoring on the second PSA; and sending the indication to the session management network element for indicating the second PSA Perform session level usage monitoring or policy control information indicating that session level usage monitoring is performed on all PSAs included in the PDU session.
  • the policy control network element determines the PDU according to the policy control method provided by the embodiment of the present application, in a case that the PDU session includes multiple PSAs, and the PSA performs the usage monitoring of the usage monitoring instance corresponding to the monitoring key.
  • the other PSAs included in the session also perform usage monitoring of the usage monitoring instance, and send to the session management network element to indicate that session level usage monitoring is performed on other PSAs included in the PDU session or to indicate all PSAs included in the PDU session.
  • the policy control information is performed on the session-level usage monitoring, so that the session management network element sends a new URR corresponding to the monitoring key corresponding to the session-level usage monitoring instance to the other PSAs of the PDU session according to the indication of the policy control information, so that The other PSA performs usage monitoring according to the URR and at least one PDR associated with the URR, and implements monitoring of the usage of the same session-level usage monitoring instance in multiple PSAs.
  • the policy control information further includes: a first usage threshold of the first monitoring key and a first indication, where the first indication is used to indicate The usage threshold is not used to cover the usage threshold of the first monitoring key provided to the session management network element before the policy control network element.
  • the policy control network element may re-allocate the usage threshold of the first monitoring key for the second PSA by using the policy control information, so that after the session management network element receives the policy control information, the first monitoring is automatically performed according to the policy.
  • the usage threshold of the key determines the second URR of the first monitoring key.
  • the first usage threshold is based on a usage quota of the first usage monitoring instance signed by the user, a cumulative usage of the first usage monitoring instance, and a policy.
  • the usage threshold of the first monitoring key that has been delivered by the control network element is determined.
  • the policy control information further includes: the policy control information further includes a second usage threshold of the second monitoring key; and the policy control network element Before the session management network element sends the policy control information, the method further includes: the policy control network element receives the message sent by the session management network element, where the message carries the indication of adding the second PSA and the accumulated usage of the first monitoring key.
  • the cumulative usage of the first monitoring key includes the cumulative usage of the URR reported by the first PSA.
  • the policy control network element may re-deliver the usage threshold of the first monitoring key according to the usage quota of the usage quota and the cumulative usage of the first monitoring key, so that the session management network element determines the usage threshold according to the usage threshold of the first monitoring key delivered.
  • the threshold of the second URR is used and issued to the second PSA.
  • the method further includes: the policy control network element receives the cumulative usage of the first monitoring key reported by the session management network element, where the cumulative usage of the first monitoring key includes the PDU session.
  • the policy control network element may re-issue the usage threshold of the first monitoring key according to the cumulative usage of the first monitoring key reported by the session management network element.
  • the method further comprises: the policy control network element receiving the identity of any of the PSAs.
  • the identifier of the PSA is used to identify the PSA, so that the policy control network element can know which PSA is reported to be used, and provide a reference for the policy control network element to subsequently develop a monitoring policy.
  • the embodiment of the present application provides a session management network element, where a PDU session managed by the session management network element includes a first PSA and a second PSA, and the session management network element sends a first monitoring key corresponding to the first PSA.
  • the first URR, the session management network element can implement the functions performed by the session management network element in the above aspects or in each possible design, and the functions can be implemented by hardware or by executing corresponding software through hardware.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the session management network element may include: a receiving unit, and a sending unit.
  • the receiving unit is configured to receive policy control information from the policy control network element; wherein the policy control information includes a PCC rule; the PCC rule carries a first monitoring key, and is used to indicate that the PCC is executed on the second PSA.
  • the receiving unit is configured to receive policy control information from the policy control network element, where the policy control information includes a PCC rule and information for indicating a policy corresponding to the PCC rule being executed on the second PSA;
  • the rule carries a first monitoring key
  • the sending unit is configured to send, to the second PSA, a first packet detection rule PDR corresponding to the PCC rule and a second URR corresponding to the first monitoring key.
  • the first monitoring key corresponds to the session-level usage monitoring instance
  • the receiving unit is configured to receive from the policy control network element to indicate that the session-level usage monitoring is performed on the second PSA, or is used to indicate that a policy control information for performing session level usage monitoring on all PSAs included in the PDU session;
  • a sending unit configured to send a second URR corresponding to the first monitoring key to the second PSA, where the second URR and the second PSA perform at least one
  • the packet detection rule is associated with the PDR, and the service data matched by each PDR is included in the session level usage monitoring.
  • the specific implementation manner of the session management network element may refer to the first aspect or the second aspect or the third aspect or the policy control method provided by any one of the possible designs of the first possible design to the thirteenth possible design.
  • the behavior of the session management network element is not repeated here.
  • the provided session management network element can achieve the same benefits as any of the possible aspects of the first aspect or the second aspect or the third aspect or the first possible design to the thirteenth possible design.
  • a session management network element including: a processor and a memory; the memory is configured to store a computer execution instruction, and when the session management network element is running, the processor executes the computer execution instruction stored by the memory a policy control method for causing the session management network element to perform any of the possible designs of the first aspect or the second aspect or the third aspect or the first possible design to the thirteenth possible design .
  • a ninth aspect a computer readable storage medium having instructions stored therein that, when executed on a computer, cause the computer to perform the first aspect or the second aspect or the third aspect or
  • the first possible design is to any of the possible designs in the thirteenth possible design of the strategy control method described.
  • a computer program product comprising instructions which, when run on a computer, cause the computer to perform the first aspect or the second aspect or the third aspect or the first possible design to the thirteenth Any of the possible designs may be designed to describe the policy control method.
  • a chip system comprising a processor and a communication interface, configured to support a session management network element to implement functions involved in the foregoing aspects, for example, supporting a session management network element to receive a policy control network element.
  • the policy control information including the PCC rule or the policy control information including the PCC rule and the information indicating the policy corresponding to the PCC rule on the second PSA, and the first PDR corresponding to the PCC rule is sent to the second PSA through the communication interface.
  • the chip system further includes a memory for storing program instructions and data necessary for the session management network element.
  • the chip system can be composed of chips, and can also include chips and other discrete devices.
  • a policy control network element determines that a PDU session includes a first PSA and a second PSA, and the policy control network element determines that the first usage amount corresponding to the first monitoring key is performed on the first PSA.
  • the policy control network element has the function of implementing the policy control network element in the method described in the fourth aspect or the fifth aspect or the sixth aspect. This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the policy control network element may include: a determining unit, a sending unit;
  • the determining unit is configured to determine to perform usage monitoring on the first usage monitoring instance on the second PSA; the sending unit is configured to send policy control information including the PCC rule to the session management network element; wherein, the PCC rule Carrying a first monitoring key, and information indicating a policy corresponding to the execution of the PCC rule on the second PSA.
  • the determining unit is configured to determine to perform usage monitoring on the first usage monitoring instance on the second PSA; the sending unit is configured to send the PCC rule to the session management network element, and to indicate the second The policy control information of the information of the policy corresponding to the PCC rule on the PSA; wherein the PCC rule carries the first monitoring key.
  • the determining unit is configured to determine to perform session level usage monitoring on the second PSA; the sending unit is configured to send, to the session management network element, to perform session level usage monitoring on the second PSA, or Policy control information indicating that session level usage monitoring is performed on all PSAs included in the PDU session.
  • the policy control network element For a specific implementation manner of the policy control network element, reference may be made to the behavior function of the policy control network element in the policy control method provided by the fourth aspect or the fifth aspect or the possible implementation manner of the sixth aspect, and details are not repeatedly described herein. Therefore, the provided policy control network element can achieve the same beneficial effects as the fourth aspect or the fifth aspect or the sixth aspect.
  • a policy control network element including: a processor and a memory; the memory is configured to store a computer execution instruction, and when the policy control network element is running, the processor executes the computer execution of the memory storage
  • the instructions are such that the policy control network element performs the policy control method as described in the above fourth aspect or the fifth aspect or the sixth aspect.
  • a computer readable storage medium having stored therein instructions that, when run on a computer, cause the computer to perform the fourth aspect or the fifth or sixth aspect described above The policy control method described.
  • a fifteenth aspect a computer program product comprising instructions, which when executed on a computer, cause the computer to perform the policy control method of any of the above fourth aspect or the fifth or sixth aspect .
  • a chip system includes a processor and a communication interface, and is configured to support a policy control network element to implement functions involved in the foregoing aspects, for example, supporting a policy control network element to determine on the second PSA. Performing the monitoring of the usage of the first usage monitoring instance, and transmitting the policy control information including the PCC rule to the session management network element through the communication interface, or including the PCC rule, and the policy for indicating that the PCC rule is executed on the second PSA.
  • the policy control information of the information; or the support policy control network element determines to perform session level usage monitoring on the second PSA, and sends to the session management network element through the communication interface to indicate that the session level usage monitoring is performed on the second PSA, or Policy control information for indicating session level usage monitoring on all PSAs included in the PDU session.
  • the chip system further includes a memory for storing program instructions and data necessary for the policy control network element.
  • the chip system can be composed of chips, and can also include chips and other discrete devices.
  • a policy control system comprising the session management network element according to any one of the seventh aspect to the eleventh aspect, The policy controls the network element and at least two PSAs.
  • FIG. 1 is a system architecture diagram provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of a 5G system architecture provided by an embodiment of the present application.
  • FIG. 3 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 4 is a flowchart of a policy control method according to an embodiment of the present application.
  • 4a is a flowchart of a PSA reporting cumulative usage provided by an embodiment of the present application.
  • FIG. 5 is a flowchart of still another method for controlling a policy according to an embodiment of the present application.
  • FIG. 6 is a flowchart of still another method for controlling a policy according to an embodiment of the present application.
  • FIG. 7 is a flowchart of still another method for controlling a policy according to an embodiment of the present application.
  • FIG. 8 is a flowchart of still another method for controlling a policy according to an embodiment of the present application.
  • FIG. 9 is a structural diagram of a session management network element according to an embodiment of the present application.
  • FIG. 10 is a structural diagram of a policy control network element according to an embodiment of the present application.
  • Usage monitoring Monitors the usage of network resources, such as monitoring the traffic of a service data stream, monitoring the usage of a group of service data flows, and even measuring the usage of all service data flows in a PDU session. Monitoring, no restrictions.
  • the user can sign a usage monitoring protocol with the operator.
  • the usage monitoring protocol specified by the user specifies the type of service data flow to be monitored and the volume limit or time limit for which the contract is used. For example, the user signs the service with the operator. When the protocol is used, the operator can select a separate usage monitoring of the network resources when accessing the Sohu video, and sign 1G traffic for accessing Sohu video.
  • the usage may refer to a traffic volume (Volumn), and may also refer to a time time, which is not limited.
  • the usage monitoring may be divided into two types of usage monitoring: service data flow level usage monitoring and session level usage monitoring according to different monitoring network resources monitored by usage.
  • Monitoring control instance includes user-contracted monitoring of usage of a service data flow, monitoring of a set of service data flows, and even monitoring of all service data flows in a PDU session.
  • the requirements and the signing information signed for this demand which regulates the scope of the monitored business data flow, and the corresponding contract information, such as the usage limit.
  • users can log in to Sohu video and sign 1G traffic for accessing Sohu video as an example of usage monitoring. They can also sign user access to Sina video and Sohu video, as well as access to Sina video and Sohu video.
  • the 1.5G traffic is used as an example of usage monitoring.
  • the usage monitoring instance can be divided into two levels of usage monitoring examples: a service data flow level usage monitoring instance and a session level usage monitoring instance.
  • the same usage monitoring instance can be assigned a monitoring key monitoring key, that is, an usage monitoring instance corresponds to a monitoring key.
  • the policy control function (PCF) can formulate corresponding policy control information according to the subscription information corresponding to the usage monitoring instance, and use the policy control information to monitor the usage of the user's service access.
  • the PCC rule is defined by the PCF and may include a service data flow template, where the service data flow template may include control information for service data flow detection, and may also include control information for service data flow charging, traffic steering, etc., not limit.
  • the PCF can issue a PCC rule to the Session Management Function (SMF).
  • the SMF determines the PDR, the QoS Enforcement Rule (QER), and the Forwarding Action Rule (FAR) according to the PCC rules. rule.
  • Usage monitoring information (Usage Monitoring Information): It is defined by the PCF. It usually includes the level indicator of the usage monitoring instance corresponding to the monitoring key and the monitoring key, and the usage threshold corresponding to the monitoring key.
  • the PCF can send usage monitoring information to the SMF, and the SMF determines the usage report rule (URR) rules corresponding to the monitoring key according to the Usage Monitoring Information.
  • the PCF may carry the PCC rule and the usage monitoring information in the policy control information and send the information to the SMF.
  • PDR A rule defined by the SMF for execution in a User Plane Function (UPF) may include packet detection information for detecting a traffic data flow, and rules related to QER, FAR, URR, and the like.
  • UPF User Plane Function
  • URR A rule established by the SMF to perform usage monitoring in the UPF, which may include a usage threshold.
  • the URR can be associated with the PDR. After detecting the service data flow according to the packet detection information in the PDR, the UPF can accumulate the detected usage of the service data flow and the URR associated with the PDR. When the accumulated usage reaches the usage threshold of the URR, The UPF reports the URR logo and cumulative usage to the SMF.
  • the association between the URR and the PDR may refer to: the PDR includes the identifier of the URR.
  • the policy control method provided by the embodiment of the present application can be applied to the network system shown in FIG. 1 , and the network system can be a 5G system supporting a multi-PSA PDU session, or a fourth generation (4th generation, 4G) (eg, an evolution).
  • An evolved packet system (EPS) mobile communication system may also be a mobile communication system that supports a multi-anchor user plane transmission path, and is not limited.
  • the network system may include: The access network device, the session management network element, the policy control network element, the split/combiner, the gateway network element, and the data network (DN), wherein the terminal in FIG. 1 can be used to connect to the wireless air interface.
  • the access network device deployed by the operator accesses the DN through the split/combiner and the gateway network element.
  • the access network device is mainly used to implement the wireless physical layer function, resource scheduling, radio resource management, and radio access control. Functions such as mobility management.
  • the session management network element can manage one or more gateway network elements, which are mainly used to implement session management functions such as establishing, releasing, and changing user plane transmission paths.
  • the policy control network element is mainly used to formulate information for service data flow detection, and control information such as policy, charging, and traffic steering.
  • the split/combiner is mainly used when the transmission path of the same user plane includes multiple anchor points.
  • the service data stream that is uploaded by the terminal through the user plane transmission path is distributed to different gateway network elements, or the service data streams delivered by different gateway network elements on the user plane transmission path are combined and sent to the terminal. It can be used as an anchor point on the user plane transmission path. It is mainly used to complete the routing and forwarding of user plane data, such as establishing a channel with the terminal (ie, user plane transmission path), and forwarding between the terminal and the DN on the channel. Data packets, as well as data packet filtering, data transmission/retransmission, rate control, and generation of accounting information for the terminal.
  • the DN can include network devices (such as servers, routers, etc.), and the DN is mainly used to provide more information for the terminal. Data service service. It should be noted that FIG.
  • Network elements such as: a mobile terminal for managing the mobility management network element, the data management contract information to the user management network element, etc., the present application is not limited in this embodiment.
  • the terminal in the network system may be a user equipment (UE), such as a mobile phone or a computer, or Cellular phone, cordless phone, session initiation protocol (SIP) phone, smart phone, wireless local loop (WLL) station, personal digital assistant (PDA), computer, laptop Computers, handheld communication devices, handheld computing devices, satellite wireless devices, wireless modem cards, set top boxes (STBs), customer premise equipment (CPE), and/or for use on wireless systems Other devices for communication.
  • UE user equipment
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistant
  • PDA personal digital assistant
  • STBs set top boxes
  • CPE customer premise equipment
  • the access network device may be an access network (AN)/radio access network (RAN) device, and a network composed of multiple 5G-AN/5G-RAN nodes, the 5G-AN/5G
  • the RAN node may be: an access point (AP), a next generation base station (NR node B, gNB), a transmission receive point (TRP), a transmission point (TP), or some other access. node.
  • the session management network element can be an SMF.
  • the policy control network element can be a PCF.
  • the gateway network element can be UPF.
  • the branch/combiner can be a branching point (BP) or an uplink classifier (UL CL), such as when a multi-homing manner is used to establish a multi-PSA PDU session.
  • BP branching point
  • UL CL uplink classifier
  • the shunt/combiner can be a BP.
  • the shunt/combiner can be a UL CL.
  • the mobility management network element can be an access and mobility function (AMF).
  • the data management network element can be Unified Data Management (UDM).
  • UDM Unified Data Management
  • the session management network element sends a URR corresponding to the monitoring key to the PSA included in the PDU session managed by the session management network element, and the PSA performs the usage monitoring of the usage monitoring instance corresponding to the monitoring key of the URR, if it is determined.
  • the newly added PSA of the PDU session also needs to perform the usage monitoring of the usage monitoring instance.
  • the policy control network element can allocate the same monitoring key to the newly added PSA, and send policy control to the session management network element for the newly added PSA.
  • the information is such that the session management network element determines the URR corresponding to the monitoring key for the newly added PSA, and sends the URR corresponding to the monitoring key to the newly added PSA to implement usage monitoring.
  • the implementation manner can be referred to the following FIG. 4 to FIG. 8 .
  • the communication device 200 includes at least one processor 201, a communication line 202, a memory 203, and at least one communication interface 204.
  • the processor 201 can be a central processing unit (CPU), an application specific integrated circuit (ASIC), or one or more integrated circuits configured to implement the embodiments of the present application.
  • CPU central processing unit
  • ASIC application specific integrated circuit
  • DSPs digital signal processors
  • FPGAs field programmable gate arrays
  • Communication line 202 can include a path for communicating information between the components described above.
  • the communication interface 204 uses devices such as any transceiver for communicating with other devices or communication networks, such as Ethernet, radio access network (RAN), wireless local area networks (WLAN), etc. .
  • devices such as any transceiver for communicating with other devices or communication networks, such as Ethernet, radio access network (RAN), wireless local area networks (WLAN), etc. .
  • RAN radio access network
  • WLAN wireless local area networks
  • the memory 203 can be a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (RAM) or other type that can store information and instructions.
  • the dynamic storage device can also be an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disc storage, and a disc storage device. (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures and can be Any other media accessed, but not limited to this.
  • the memory may be stand-alone and connected to the processor via communication line 202. The memory can also be integrated with the processor.
  • the memory 203 is used to store computer execution instructions for executing the solution of the present application, and is controlled by the processor 201 for execution.
  • the processor 201 is configured to execute computer executed instructions stored in the memory 203 to implement the policy control method provided by the following embodiments of the present application.
  • the computer-executed instructions in the embodiment of the present application may also be referred to as an application code, which is not specifically limited in this embodiment of the present application.
  • processor 201 may include one or more CPUs, such as CPU0 and CPU1 in FIG.
  • communication device 200 can include multiple processors, such as processor 201 and processor 207 in FIG. Each of these processors can be a single core processor or a multi-CPU processor.
  • a processor herein may refer to one or more devices, circuits, and/or processing cores for processing data, such as computer program instructions.
  • the communication device 200 can also include an output device 205 and an input device 206.
  • Output device 205 is in communication with processor 201 and can display information in a variety of ways.
  • the output device 205 can be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector. Wait.
  • Input device 206 is in communication with processor 201 and can receive user input in a variety of ways.
  • input device 206 can be a mouse, keyboard, touch screen device or sensing device, and the like.
  • the foregoing communication device 200 may be a general-purpose device or a dedicated device.
  • the communication device 200 can be a desktop, a portable computer, a web server, a PDA, a mobile handset, a tablet, a wireless terminal, an embedded device, or a device having a similar structure as in FIG.
  • the embodiment of the present application does not limit the type of the communication device 200.
  • the session management network element is the session management network element shown in FIG. 1
  • the policy control network element is the policy control network element shown in FIG. 1
  • the PSA is the gateway network element shown in FIG. 1 .
  • FIG. 4 is a flowchart of a policy control method according to an embodiment of the present disclosure, where the method is used to implement a first usage monitoring instance (such as a service data flow level usage monitoring instance) on multiple PSAs included in a PDU session. Usage monitoring.
  • the application scenario of the method is that the session management network element manages a PDU session, and the PDU session may include multiple PSAs, such as a first PSA and a second PSA, where the session management network element sends a first monitoring key corresponding to the first PSA.
  • First URR In this application scenario, step 401 to step 403 shown in FIG. 4 may be performed to implement the usage monitoring of the same service data flow level usage monitoring instance on multiple PSAs of the PDU session.
  • Step 401 The policy control network element determines to perform usage monitoring on the first usage monitoring instance on the second PSA.
  • the second PSA may be a new PSA on the PDU session.
  • the policy control network element may determine, according to the preset configuration, performing usage monitoring on the first usage monitoring instance on the second PSA, where the preset configuration may be used to specify which services are allowed to access the first usage monitoring instance.
  • Gateway network element If the policy control network element queries the preset configuration, and determines that the second PSA is included in the gateway network element specified by the preset configuration, it is determined that the usage monitoring of the first usage monitoring instance is performed on the second PSA. For example, if the default configuration allows the user to access the service on the Sohu website on the UPF2, and the service on the Sohu website is within the service range monitored by the usage monitoring instance 1, it is determined that the UPF2 monitors the usage of the usage monitoring instance 1. .
  • the preset configuration may be pre-configured by the operator in the policy control network element, or may be obtained by the policy control network element from other network function entities when performing step 401, and is not limited.
  • the policy control network element first learns that the PDU session adds a second PSA, and then determines whether it is The usage monitoring of the first usage monitoring instance is performed on the second PSA. Specifically, the policy control network element learns that the PDU session adds a second PSA, and the session management network element sends an indication message carrying the newly added second PSA to the policy control network element, and after receiving the message, the policy control network element receives the message according to the message. The carried indication of adding the second PSA determines that the second PSA is added to the PDU session.
  • the indication of adding the second PSA may be used to indicate the second PSA, which may include, but is not limited to, the identifier of the second PSA, where the identifier of the second PSA may include the network function identifier (NF) of the second PSA. ID), or the Data Network Access Indentity (DNAI) of the second PSA, or the Internet Protocol Version 6 Prefix (IPV6 Prefix) corresponding to the second PSA, is not limited.
  • Step 402 The policy control network element sends policy control information to the session management network element, and the session management network element receives the policy control information sent by the policy control network element.
  • the policy control information includes, but is not limited to, a PCC rule, and the PCC rule carries a first monitoring key, and is used to indicate information for executing a policy corresponding to the PCC rule on the second PSA.
  • the policy control information information includes, but is not limited to, a PCC rule, and information for indicating a policy corresponding to the execution of the PCC rule on the second PSA, and the PCC rule may carry the first monitoring key.
  • the information used to indicate that the policy corresponding to the PCC rule is performed on the second PSA may be the identifier of the second PSA, and the related description of the identifier of the second PSA may be as described in step 401. ,No longer.
  • Step 403 The session management network element sends a first PDR corresponding to the PCC rule and a second URR corresponding to the first monitoring key to the second PSA.
  • the first PDR may include the service data flow packet detection information; the second URR may include a usage threshold, and the second URR is identified by the identifier of the second URR.
  • the first PDR and the second URR may be determined by the session management network element before step 403. For example, before step 403, the session management network element may determine, according to information indicating that the policy corresponding to the PCC rule is executed on the second PSA.
  • Performing a policy corresponding to the PCC rule on the second PSA triggering the session management network element to determine the packet detection information of the first PDR according to the service data flow template in the PCC rule, and determining a second URR for the first monitoring key, where the first The PDR includes an identifier of the second URR, and the first PDR is associated with the second URR.
  • the determining, by the session management network element, the packet detection information of the first PDR according to the service data flow template in the PCC rule may include: using the control information used for the service data flow detection in the service data flow template in the PCC rule as the packet detection information. Add (or match) to the first PDR.
  • the session management network element determining the second URR for the first monitoring key may be: the session management network element allocates a usage threshold to the first monitoring key, and includes the usage threshold in the second URR, that is, determining the first monitoring key.
  • the usage threshold of the corresponding second URR; at the same time, the session management network element may also assign an identifier to the second URR.
  • the identifier of the second URR may be the same as the first URR, or may be different, and is not limited.
  • the session management network element may further store the correspondence between the monitoring key and the URR, for example, the session management network element is determined by the first monitoring key.
  • the correspondence between the first monitoring key and the second URR may be saved.
  • the comparison relationship between the monitoring key and the URR saved by the session management network element includes: between the first monitoring key and the first URR and the second URR. Correspondence relationship.
  • the policy control network element determines to perform the service data flow level usage monitoring instance on the newly added PSA in the PDU session, and the service data flow usage monitoring instance and the other included in the PDU session
  • the policy control network element sends a PCC rule to the session management network element and information for indicating the usage monitoring of the service data flow usage monitoring instance on the newly added PSA, and the session management network element receives the information.
  • the PDR and the URR corresponding to the monitoring key are sent to the newly added PSA, so that the newly added PSA is based on the PDR and The monitoring of the URR is performed by the monitoring key, so as to implement the monitoring of the usage of the same service data flow level monitoring instance in multiple PSAs.
  • determining, by the session management network element, the second URR for the first monitoring key may include any one of the following (1) to (4):
  • the policy control information further includes a first usage threshold of the first monitoring key and a first indication, where the first indication is used to indicate that the first usage threshold is not used to cover the usage threshold of the first monitoring key received before the session management network element.
  • the session management network element determines the usage threshold of the second URR according to the first usage threshold.
  • the first usage threshold may be determined according to the usage quota of the first usage monitoring instance signed by the user, the cumulative usage of the first usage monitoring instance, and the usage threshold of the first monitoring key that has been delivered by the policy control unit, for example, the user may be calculated.
  • the difference between the usage limit of the first usage monitoring instance of the contract and the cumulative usage of the first usage monitoring instance and the usage threshold of the first monitoring key delivered by the policy control unit, and a partial threshold or a total usage threshold of the difference As the second usage threshold.
  • the usage quota of the first usage monitoring instance signed by the user and the cumulative usage of the first usage monitoring instance may be included in the subscription information of the user, and the subscription information of the user may be obtained by the policy control network element from the UDM after the PDU session is established.
  • the user's subscription information can be used to describe the usage quota of the user for the first usage monitoring instance and the cumulative usage of the first usage monitoring instance.
  • the determining, by the session management network element, the usage threshold of the second URR according to the first usage threshold may include: the session management network element adopts the partial usage threshold or the total usage threshold of the first usage threshold as the usage threshold of the second URR.
  • the session management network element For example, if the first usage threshold of the first monitoring key delivered by the policy control network element is 500M, the usage threshold of the first monitoring key delivered by the policy control network element received by the session management network element is 200M, and the session management is performed. After the network element has determined the URR1 (200M) according to the 200M usage threshold of the first monitoring key, the session management network element does not replace the 200M with the 500M after receiving the 500M usage threshold of the first monitoring key.
  • the usage threshold (eg, 300M) less than or equal to 500M is used as the usage threshold of the new URR2 corresponding to the first monitoring key.
  • the policy control network element may further maintain a correspondence between the second PSA and the first usage threshold of the first monitoring key, to indicate that the policy control network element is determining to execute the first usage monitoring instance in the second PSA.
  • the first usage threshold of the first monitoring key delivered during the usage monitoring.
  • the session management network element requests the first PSA to report the cumulative usage of the first URR, and the session management network element receives the cumulative usage of the first URR reported by the first PSA, and determines the available usage threshold according to the cumulative usage of the first URR. And determining the usage threshold of the second URR based on the available usage threshold.
  • the available usage threshold may be the difference between the usage threshold of the first monitoring key received by the session management network element from the policy management network element and the accumulated usage of the first URR received by the session management network element.
  • the first PSA reports the first usage of the first URR
  • the session management network element receives the accumulated usage of the first URR reported by the first PSA, according to the saved monitoring key and the URR.
  • determining that the first URR is corresponding to the first monitoring key, and calculating a difference between the usage threshold of the first monitoring key and the cumulative usage of the first URR delivered by the policy control network element, and the difference is used as the first monitoring key
  • the available usage threshold is the difference between the usage threshold of the first monitoring key received by the session management network element from the policy management network element and the accumulated usage of the first URR received by the session management network element.
  • the determining, by the session management network element, the usage threshold of the second URR according to the available usage threshold may include: the session management network element uses the partial usage threshold or the total usage threshold of the available usage threshold as the usage threshold of the second URR.
  • the session management network element may further update the first URR according to the available usage threshold, and deliver the updated first URR to the first PSA.
  • the session management network element has a threshold fragmentation function, that is, the session management network element has a function of allocating a partial usage threshold value of the usage threshold of the monitoring key delivered by the policy control network element to the URR. .
  • the session management network element may send the usage threshold of less than or equal to 300M (for example, 200M) as the usage threshold of the second URR to the second PSA, and update the usage threshold of the first URR with the remaining 100M in the 300M, and The updated first URR is reassigned to the first PSA.
  • 300M for example, 200M
  • the session management network element determines whether there is a remaining usage threshold corresponding to the first monitoring key
  • the session management network element determines the usage threshold of the second URR according to the remaining usage threshold; or the session management network element reports the first to the first PSA if there is no remaining usage threshold.
  • the remaining usage threshold may be a usage threshold that is not allocated to the URR in the usage threshold corresponding to the first monitoring key received by the session management network element from the policy management network element, if the session management network element receives the usage management network element from the policy management network element. If all the usage thresholds in the usage threshold corresponding to the first monitoring key are assigned to the URR, there is no remaining usage threshold. Otherwise, there is a remaining usage threshold.
  • the available usage threshold is as described in the method (2) and will not be described again.
  • the session management network element may also update the usage threshold of the first URR according to the available usage threshold, and send the updated first URR to the first PSA.
  • the usage threshold of the first monitoring key that is sent to the session management network element by the policy control network element is 500M
  • the usage threshold of the URR sent by the session management network element to the first PSA is 300M
  • the first monitoring is performed at this time.
  • the remaining usage threshold of the key is 200M
  • the session management network element may use the usage threshold of the 200M as the usage threshold of the second URR, or a part of the 200M may be used as the usage threshold of the second URR. If the usage threshold of the first monitoring key that is sent to the session management network element by the policy control network element is 500M, and the usage threshold of the URR sent by the session management network element to the first PSA is 500M, the first monitoring key is not available.
  • the management network element may send the usage threshold of less than or equal to 300M (for example, 200M) as the usage threshold of the second URR to the second PSA, and update the usage threshold of the first URR with 100M in 300M, and the updated first The URR is reassigned to the first PSA.
  • 300M for example, 200M
  • the policy control information further includes a second usage threshold of the first monitoring key; the session management network element determines the usage threshold of the second URR according to the second usage threshold.
  • the second usage threshold may be determined according to the usage quota of the first usage monitoring instance signed by the user, the cumulative usage of the first usage monitoring instance, and the usage threshold of the first monitoring key that has been delivered by the policy control unit;
  • the difference between the usage quota of the first usage monitoring instance signed by the user and the cumulative usage of the first usage monitoring instance and the usage threshold of the first monitoring key delivered by the policy control unit may be calculated.
  • a partial threshold or an all usage threshold is used as the second usage threshold.
  • the cumulative usage of the first monitoring key may include the cumulative usage of the first URR reported by the first PSA.
  • the session management network element may request the first PSA to report the cumulative usage of the first URR and receive the first URR of the first PSA report after receiving the policy control information from the policy control network element after determining to add the second PSA.
  • the accumulated usage is used, and the cumulative usage of the first monitoring key is sent to the policy control network element.
  • the session management network element may send the cumulative usage of the first monitoring key to the policy control network element when the message carrying the indication of adding the second PSA is sent to the policy control network element, where the first monitoring key is used.
  • the accumulated usage may be carried in the same message as the indication of adding the second PSA, or may be carried in different messages, and is not limited.
  • the determining, by the session management network element, the usage threshold of the second URR according to the second usage threshold may include: determining, by the session management network element, a usage threshold that is less than or equal to the second usage threshold as a usage threshold of the second URR.
  • the session management network element may also update the usage threshold of the first URR according to the second threshold, and send the updated first URR to the first PSA.
  • the PSA and the URR may perform the usage monitoring according to the PDR and the URR, and the PSA may also go to the session management network.
  • the unit actively reports the cumulative usage of the URR, so that the session management network element receives the cumulative usage of the URR, and executes the usage reporting process shown in FIG. 4a; or performs step 404 and steps 408-415.
  • the usage reporting process may include:
  • Step 404 The PSA included in the PDU session reports the cumulative usage of the URR to the session management network element.
  • the PSA in the step 404 is any PSA included in the PDU session, and may be the first PSA or the second PSA. Specifically, when the PDR associated with the URR detects that the accumulated usage of the service data flow is close to or reaches the usage threshold of the URR, the PSA may report the cumulative usage of the URR to the session management network element.
  • Step 405 The session management network element receives the cumulative usage of the URR reported by the PSA, and determines whether there is a remaining usage threshold corresponding to the first monitoring key. If the remaining usage threshold corresponding to the first monitoring key exists, step 406- Step 407; otherwise, step 408 is performed.
  • the remaining usage threshold may be a usage threshold that is not allocated to the URR in the usage threshold corresponding to the first monitoring key received by the session management network element from the policy management network element.
  • the PSA may also carry the URR identifier when reporting the cumulative usage of the URR to the session management network element, and the session management network element may determine the PSA report according to the correspondence between the monitoring key and the URR and the URR identifier saved by the session management network element.
  • the URR is associated with the monitoring key. If the URR is the first monitoring key, the calculation policy controls the difference between the usage threshold of the first monitoring key and the cumulative usage of the URR. If the difference is zero, then It is determined that there is no remaining usage threshold corresponding to the first monitoring key; otherwise, there is a remaining usage threshold corresponding to the first monitoring key.
  • Step 406 The session management network element updates the usage threshold of the URR reported by the PSA according to the remaining usage threshold, and sends the updated URR to the PSA.
  • the session management network element updates the usage threshold of the URR reported by the PSA according to the remaining usage threshold.
  • the session management network element may use the partial usage threshold or the total usage threshold of the remaining usage threshold as the new usage threshold of the URR.
  • Step 407 The PSA performs usage monitoring according to the updated URR.
  • Step 408 The session management network element reports the cumulative usage of the first monitoring key to the policy control network element.
  • the cumulative usage of the first monitoring key may include the cumulative usage of the URR corresponding to the first monitoring key.
  • the cumulative usage of the first monitoring key may include the cumulative usage of the URR reported by the PSA.
  • monitoring key1 corresponds to URR1 and URR3, where the cumulative usage of URR1 is 100M and the cumulative usage of URR3 is 200M, the cumulative usage of monitoring key1 is 300M.
  • the session management network element may also send the identity of the PSA to the policy control network element.
  • the identity of the PSA For the identifier of the PSA, reference may be made to the description of the identifier of the second PSA, and details are not described herein.
  • Step 409 The policy control network element receives the cumulative usage of the first monitoring key reported by the session management network element, and determines whether there is an allowable usage threshold corresponding to the first usage monitoring instance; if there is an allowable usage threshold corresponding to the first usage monitoring instance Steps 410 - 412 are performed; otherwise, steps 413 - 415 are performed.
  • the allowable usage threshold corresponding to the first usage monitoring instance may be allocated to the first monitoring key according to the usage quota of the first usage monitoring instance signed by the user, the cumulative usage of the first usage monitoring instance, and the policy control network element (but not).
  • the usage threshold for receiving the cumulative usage response information of the first monitoring key, the cumulative usage of the first usage monitoring instance may include the cumulative usage of the first monitoring key. For example, it can be determined that the usage quota of the first usage monitoring instance signed by the user and the cumulative usage of the first usage monitoring instance and the policy control network element have been allocated to the first monitoring key (but the cumulative usage response of the first monitoring key is not received). If the difference is zero, it is determined that there is no allowable usage threshold corresponding to the first usage monitoring instance; otherwise, there is an allowable usage threshold corresponding to the first usage monitoring instance.
  • the accumulated usage response information may include a cumulative usage of the first monitoring key.
  • the usage monitoring instance 1 corresponds to the monitoring key1. Assume that the usage quota for the usage monitoring instance 1 is 500M and the cumulative usage is 200M.
  • the policy control NE determines that the PSA1 performs the usage monitoring of the usage monitoring instance 1.
  • the usage threshold of the monitoring key1 is set to 100 M.
  • the PSA2 performs the usage monitoring of the usage monitoring instance 1 and the usage threshold of the monitoring key1 is set to 200 M.
  • the policy control NE receives the monitoring reported by the session management NE. When the cumulative usage of key1 is 50M and the identifier of PSA1, it is determined that PSA1 reports the cumulative usage of URR.
  • the usage threshold of monitoring key assigned to PSA2 is 200M, which belongs to the usage threshold of the policy control network element but has not received the cumulative usage response message.
  • Step 410 The policy control network element determines a new usage threshold of the first monitoring key according to the allowed usage threshold, and delivers a new usage threshold of the first monitoring key to the session management network element.
  • Step 411 The session management network element receives the new usage threshold of the first monitoring key, updates the usage threshold of the URR according to the new usage threshold of the first monitoring key, and sends the updated URR to the PSA.
  • Step 412 The PSA performs usage monitoring according to the updated URR.
  • Step 413 The policy control network element determines to stop monitoring the usage of the first monitoring key, and sends a stop notification to the session management network element.
  • the stop notification is used to notify the session management network element to stop monitoring the usage of the first monitoring key.
  • Step 414 The session management network element receives the stop notification, and sends a delete request or a stop request to the PSA.
  • the deletion request may be used to request the PSA to delete the URR corresponding to the first monitoring key, and the stop request may be used to request the PSA to stop monitoring the usage of the URR corresponding to the first montoring key.
  • Step 415 The PSA receives the deletion request, deletes the URR corresponding to the first monitoring key according to the deletion request, or receives the stop request, and stops monitoring the usage of the URR corresponding to the first monitoring key according to the stop request.
  • the deleting the URR corresponding to the first monitoring key may refer to: deleting the URR from its associated PDR. Specifically, the identifier of the URR can be deleted from the PDR associated with the URR.
  • the session management network element may re-allocate the usage threshold of the URR to the PSA, or may send the cumulative usage of the monitoring key corresponding to the URR to the policy control network element.
  • the policy control network element re-issues the usage threshold corresponding to the monitoring key.
  • FIG. 4a only illustrates the process of reporting the amount of PSA.
  • a scheme for simultaneously reporting the usage of two or more PSAs is also supported.
  • the execution process may be described with reference to FIG. 4a. .
  • FIG. 5 is a flowchart of a method for controlling a policy according to an embodiment of the present disclosure.
  • the method is used to perform usage monitoring on an instance of a session level usage monitoring on multiple PSAs included in a PDU session.
  • the application scenario of the method is that the session management network element manages a PDU session, and the PDU session may include multiple PSAs, such as a first PSA and a second PSA, where the first PSA performs the first usage monitoring instance corresponding to the first monitoring key.
  • Usage monitoring, the first usage monitoring instance is a session-level usage monitoring instance.
  • step 501 to step 503 shown in FIG. 5 may be performed to implement the usage monitoring of the same session-level usage monitoring instance on multiple PSAs included in the PDU session.
  • Step 501 The policy control network element determines to perform session level usage monitoring on the second PSA.
  • the step 501 can be referred to the step 401 and will not be described again.
  • Step 502 The policy control network element sends policy control information to the session management network element, and the session management network element receives the policy control information sent by the policy control network element.
  • the policy control information may be used to indicate that session level usage monitoring is performed on the second PSA, or to perform session level usage monitoring on all PSAs included in the PDU session.
  • the policy control information may include the identifier of the second PSA or the PDU session identifier used to identify the PDU session.
  • the policy control information includes the identifier of the second PSA, it is used to indicate that the session level usage monitoring is performed on the second PSA.
  • the policy control information includes the identity of the PDU session, it is used to perform session level usage monitoring on all PSAs included in the PDU session.
  • the identifier of the second PSA can be referred to the related description in FIG. 4, and details are not described herein again.
  • Step 503 The session management network element sends a second URR corresponding to the first monitoring key to the second PSA.
  • the second URR is associated with all the PDRs that are executed on the second PSA.
  • the second URR is not associated with the PDR, that is, the second URR can be associated with the second URR, unless the service data indicating that the PDR matches is not included in the session level usage monitoring.
  • the matching service data performed on the PSA includes all PDR associations in the session level usage monitoring.
  • the second URR may include a usage threshold, and the second URR is identified by the identity of the second URR.
  • the second URR may be determined by the session management network element prior to step 503. For example, before step 503, the session management network element may perform policy control information for performing session level usage monitoring on the second PSA, or for performing session level usage monitoring on all PSAs included in the PDU session. It is determined that session level usage monitoring is also performed at the second PSA and a second URR is determined for the first monitoring key.
  • the session management network element may determine the second URR for the first monitoring key by using any one of the methods (1) to (4) shown in FIG. 4, and details are not described herein.
  • the policy control network element determines to perform session level usage monitoring on the PSA added in the PDU session, and the session level usage monitoring is also performed on other PSAs included in the PDU session.
  • the policy control network element sends, to the session management network element, information indicating that session level usage monitoring is performed on the newly added PSA or session level usage monitoring is performed on all PSAs included in the PDU session, and the session management network element receives the information.
  • the URR corresponding to the monitoring key is sent to the newly added PSA, so that the newly added PSA performs usage monitoring according to the URR corresponding to the monitoring key, so as to implement the monitoring of the usage of the same session-level usage monitoring instance in multiple PSAs.
  • the PSA after receiving any PSA (PSA and URR) in the PSA and the URR, the PSA can also perform the usage monitoring according to the PDR and the URR, and the PSA can also go to the session management network.
  • the unit actively reports the cumulative usage of the URR to perform the usage reporting process shown in FIG. 4a; or performs step 404 and steps 408-step 415, and details are not described herein.
  • FIG. 4 and FIG. 5 only describe the execution of the service data flow level usage monitoring instance or the session level usage monitoring instance in the first PSA and the second PSA included in the PDU session. It is understandable that For the process of performing the same usage monitoring instance and simultaneously performing the two or more PSAs included in the PDU session, reference may also be made to the foregoing solution, and details are not described herein.
  • FIG. 4 and FIG. 5 respectively illustrate the traffic data level usage monitoring and the session level usage monitoring. In practical applications, the schemes of FIG. 4 and FIG. 5 can also be combined to implement multiple PSAs included in the PDU session. Perform business traffic usage monitoring instances and session-level usage monitoring instances.
  • the session management network element is the SMF of FIG. 2, and the policy control network element is the PCF of FIG. 2, and the service data flow usage monitoring instance and the session-level usage monitoring instance are simultaneously executed on the two PSAs of the UPF1 and the UPF2 included in the PDU session.
  • the data flow usage monitoring instance corresponds to the monitoring key1 and the session-level usage monitoring instance corresponding to the monitoring key2.
  • FIG. 6 is a flowchart of a policy control method according to an embodiment of the present application. As shown in FIG. 6, the method includes:
  • Step 601 The user establishes a PDU session through the UPF1, and the PCF determines, according to the preset configuration, the usage monitoring of the usage monitoring instance 1 and the usage monitoring of the usage monitoring instance 2 in the UPF1.
  • the usage monitoring instance 1 is a service data flow level usage monitoring instance, and the usage monitoring instance 2 corresponds to a session level usage monitoring instance.
  • the process of determining the usage monitoring of the quantity monitoring instance 1 and the quantity monitoring of the quantity monitoring instance 2 in the UPF1 according to the preset configuration may refer to the above steps 401 and 501, and details are not described herein.
  • Step 602 The PCF formulates the PCC rule 1, the PCC rule 2, the usage monitoring information 1 and the usage monitoring information 2 according to the subscription information of the user, and sends the PCC rule 1, the PCC rule 2, the usage monitoring information 1, and the usage monitoring information 2 to the SMF. And an indication of performing PCC Rule 3, PCC Rule 4 on UPF2 and performing session level usage monitoring on all PSAs of the PDU session or on UPF1.
  • the subscription information of the user may be obtained by the PCF from the UDM when the step 601 is performed.
  • the subscription information of the user may include the subscription information of the service data flow level and the subscription information of the PDU session level, and the subscription information of the service data flow level includes the monitoring key_a, Service data flow level indication (SDF Level Indication), and usage quota (Voume limit and / or Time limit); PDU session level information includes PDU session level indication, and usage limit (Voume limit and / or Time limit) ).
  • the cumulative usage monitoring information includes usage information at the service data flow level and usage information at the PDU session level; usage information at the service data flow level includes monitoring key_a, service data flow level indication, and cumulative usage (Voume usage and/or Time usage).
  • the usage information of the PDU session level includes a PDU session level indication and a cumulative usage (Voume usage and/or Time usage).
  • the monitoring key_a corresponds to the usage monitoring instance; the service data flow level indication is used to indicate that the usage monitoring instance corresponding to the monitoring key_a is the service data flow level usage monitoring instance, and the PDU session level indication is used to indicate that the PDU session level information corresponds to the session level usage. Monitor instances.
  • the PCC rule 1 includes a monitoring key1
  • the PCC rule 2 includes a monitoring key2.
  • Both PCC Rule 1 and PCC Rule 2 do not set an indication that the amount detected by the PCC rule is excluded from the session level usage, that is, the PCF decision PCC Rule 1 and the PCC Rule 2 usage are accumulated to the session level usage monitoring.
  • the usage monitoring information 1 corresponds to the usage monitoring example 1, including [monitoring key1, PCC rule indication, usage threshold threshold1].
  • the usage monitoring information 2 corresponds to the corresponding usage monitoring instance 2, including [monitoring key 2, session level indication, usage threshold threshold 2].
  • the PCC rule indication may be a service data flow level indication, and is used to indicate that the monitoring key1 corresponds to the service data flow level usage monitoring instance.
  • the indication that the PCC rule 3 and the PCC rule 4 are executed in the UPF2 may be the identifier of the UPF1, and the indication that the session level usage monitoring is performed on all the PSAs of the PDU session or on the UPF1 may be the identifier of the PDU session.
  • the indication of the session-level usage monitoring on the PSAs of the PDU session or the UPF1 may not be performed in the step 602.
  • the policy for performing session level usage monitoring on all PSAs configured on the SMF may be sent by the PCF to the SMF before step 602.
  • Step 603 The SMF receives the PCC rule 1, the PCC rule 2, the usage monitoring information 1 and the usage monitoring information 2, and performs the PCC rule 3, the PCC rule 4 indication in the UPF2, and executes the session level on all PSAs of the PDU session or on the UPF1. Instructions for usage monitoring.
  • Step 604 The SMF formulates PDR1 according to PCC rule 1, formulates PDR2 according to PCC rule 2, formulates URR1 according to usage monitoring information 1, and formulates URR2 according to usage monitoring information 2.
  • the PDR1 includes the packet detection information corresponding to the service data flow template of the PCC rule 1.
  • PDR2 includes packet detection information corresponding to the service data flow template in PCC Rule 2.
  • Monitoring key1 corresponds to URR1, URR1 usage threshold threshold1* is less than or equal to threshold1; monitoring key2 corresponds to URR2, URR2 usage threshold is less than or equal to threshold2*, URR1 is associated with PDR1, and URR2 is associated with PDR1 and PDR2.
  • the SMF may perform the PCC rule 1 and the PCC rule 4 on the UPF 1 according to the indication that the PCC rule 3 and the PCC rule 4 are executed in the UPF 2 and the session level usage monitoring is performed on all PSAs of the PDU session or on the UPF 1 .
  • the monitoring policy, as well as performing session level usage monitoring on UPF1, triggers SMF to perform step 604.
  • Step 605 The SMF sends PDR1, PDR2, URR1, and URR2 to the UPF1.
  • Step 606 UPF1 performs usage monitoring according to PRR1 and PRR1 associated URR1, and performs usage monitoring according to PDR2, PDR1, and PDR1 and PDR2 associated URR2.
  • the UPF1 performs the usage monitoring according to the URR1 associated with the PDR1 and the PDR1. After the usage monitoring is performed according to the URR2 associated with the PDR2, the PDR1, and the PDR1 and the PDR2, the UPF1 can also report the cumulative usage to the SMF, and the process shown in Figure 4a is performed. .
  • Step 607 The SMF adds a PSA (such as UPF2) to the PDU session.
  • a PSA such as UPF2
  • the PDU session is a session established on the UPF1, and the UPF1 and the UPF2 are different UPFs, both of which are managed by the SMF.
  • the SMF adds a PSA to the PDU session.
  • the process of adding a PSA to the PDU session is not described.
  • the SMF can save the correspondence between the PDU session and the UPF on the PDU session.
  • Step 608 The SMF sends an event notification to the PCF to notify the PCF to add a PSA to the PDU session.
  • the event notification may include an identifier of the UPF2 and an identifier of the PDU session.
  • the identifier of the UPF2 is used to identify the UPF2, and the identifier of the UPF2 may be the NF ID of the UPF2 or the DNAI of the UPF2, and may also be the IPV6Prefix corresponding to the UPF2, and is not limited.
  • Step 609 The PCF receives the event notification, and determines, according to the preset configuration, the usage monitoring of the usage monitoring instance 1 and the usage monitoring instance 2 in the UPF2.
  • the PCF determines, according to the preset configuration, the process of performing the usage monitoring of the usage monitoring instance 1 in the UPF2 and the monitoring of the usage of the usage monitoring instance 2, refer to the foregoing steps 401 and 501, and no further details are provided.
  • Step 610 The PCF formulates the PCC rule 3, the PCC rule 4, the usage monitoring information 3, and the usage monitoring information 4 according to the subscription information of the user.
  • the service controlled by the PCC rule 3 belongs to the service monitored by the usage monitoring instance 1 .
  • the PCF still assigns the monitoring key 1 to the usage monitoring instance 1 and the monitoring key 1 includes the monitoring key 1 Monitoring key1 monitored business.
  • the services monitored by the PCC rule 3 and the PCC rule 4 belong to the service monitored by the usage monitoring instance 2, and the usage of the PCF decision PCC rule 3 and the PCC rule 4 needs to be accumulated to the session level, and the PCC rule is not set for the PCC rule 3 and the PCC rule 4. 3 and the indication that the amount detected by PCC Rule 4 is excluded from the session level usage.
  • the usage monitoring information 3 includes [monitoring key1, PCC rule indication, execution indication 1, new usage threshold threshold1*]; the usage monitoring information 4 includes [monitoring key2, session level indication, execution indication 2, and a new usage threshold threshold2 *].
  • the execution indication 1 may be used to indicate that the new usage threshold corresponding to the monitoring key1 is the usage threshold that is newly allocated to the monitoring key1, and the old usage threshold is not overwritten, that is, the usage threshold corresponding to the previously issued monitoring key1 is not replaced.
  • the execution indication 2 can be used to indicate that the new usage threshold corresponding to the monitoring key 2 is the usage threshold that is newly allocated to the monitoring key 2, and cannot override the old usage threshold, that is, the usage threshold corresponding to the previously issued monitoring key 2 is not replaced.
  • the new usage threshold threshold1* can be calculated according to the usage quota in the subscription information of the service data flow level, the cumulative usage in the usage information of the service data flow level, and the threshold usage threshold threshold1. For example, threshold1* can be less than or Equal to the usage limit - cumulative usage - threshold1.
  • the new threshold2* can be calculated according to the usage limit in the session-level subscription information, the cumulative usage in the session-level usage information, and the delivered usage threshold threshold2, for example, threshold2* can be less than or equal to the usage limit.
  • threshold2* can be less than or equal to the usage limit.
  • - Cumulative usage - threshold2. For example, if the usage limit is 1000M and the cumulative usage is 500M, the usage threshold of the monitoring key1 corresponding to the usage monitoring example 1 is 100M, the new threshold2* can be less than or equal to 1000M-500M-100M 400M, such as Can be 200M.
  • step 610 can be performed during the entire lifetime of the PDU session including two PSAs of UPF1 and UPF2.
  • Step 611 The PCF sends the PCC rule 3, the PCC rule 4, the usage monitoring information 3, and the usage monitoring information 4 to the SMF, and executes the indication of the PCC rule 3 and the PCC rule 4 in the UPF2.
  • step 602 if the PCF does not issue an indication that all PSAs in the PDU session perform session level usage monitoring or the SMF does not configure a policy for performing session level usage monitoring in all PSAs, then in step 611, the PCF further The indication of performing session level usage monitoring on the UPF2 or performing session level usage monitoring on all PSAs included in the PDU session is issued.
  • Step 612 The SMF receives an indication that the PCC rule 3, the PCC rule 4, the usage monitoring information 3, the usage monitoring policy 4, the PCC rule 3, and the PCC rule 4 are executed on the UPF 2.
  • Step 613 The SMF formulates PDR3 according to PCC Rule 3, formulates PDR4 according to PCC Rule 4, formulates URR3 according to usage monitoring information 3, formulates URR4 according to usage monitoring information 4, and transmits PDR3, PDR4 and its associated URR3, URR4 to UPF2.
  • the PDR3 includes packet detection information corresponding to the service data flow template in the PCC rule 3.
  • PDR4 includes packet detection information corresponding to the service data flow template in PCC Rule 4.
  • Monitoring key1 corresponds to URR3, and monitoring key2 corresponds to URR4.
  • PDR3 is associated with URR3, and PDR3 and PDR4 are associated with URR4. That is, URR3 is associated with all PDRs executed in UPF2 unless the service data matched by the PDR needs to be deducted from session-level usage monitoring.
  • the SMF determines, according to the execution indication 1 in the usage monitoring information 3, that the PCF newly delivers the usage threshold for the monitoring key1, determines the URR3 usage threshold threshold1** according to the new usage threshold threshold1* of the monitoring key1, and assigns an identifier to the URR3. , where threshold1** can be less than or equal to threshold1*. Similarly, the SMF determines that the PCF newly sends the usage threshold for the monitoring key 2 according to the execution indication 2 in the usage monitoring information 4, and determines the URR4 usage threshold threshold2** according to the new usage threshold threshold2* of the monitoring key2, and allocates the URR4 threshold. Identification, where threshold2** can be less than or equal to threshold2*.
  • the SMF performs the usage monitoring on the monitoring key1 on the UPF2 according to the monitoring key1 in the PCC rule 3 and the indication executed by the PCC rule 3 on the UPF2, and performs the session according to all the PSAs included in the PDU session delivered in step 602.
  • the indication of the level usage monitoring determines that after the monitoring of the monitoring key 2 is performed on the UPF 2, the SMF is triggered to perform step 613.
  • threshold1** is less than threshold1*
  • the SMF can save the remaining amount after threshold1*-threshold1**
  • threshold2** is less than threshold1*
  • the SMF can save the remaining after threshold2*-threshold2** Dosage.
  • the SMF also saves the correspondence between the URR and the monitoring key.
  • the correspondence between the URR and the monitoring key stored in the SMF is: the monitoring key1 corresponds to URR1, URR3, and the monitoring key2 corresponds to URR2 and URR4.
  • the values of UUR ID1 and UUR ID3 may be the same or different, and UUR ID2 and UUR ID4 may be the same or different.
  • Step 614 UPF2 performs usage monitoring according to PRR3 and PRR3 associated URR3, and performs usage monitoring according to PDR3, PDR4, and PDR3 and PDR4 associated URR4.
  • the UPF2 may also report the accumulated usage to the SMF, and perform the process shown in FIG. 4a, and details are not described herein.
  • FIG. 7 is a flowchart of a policy control method according to an embodiment of the present application. As shown in FIG. 7, the method includes:
  • Step 701 is the same as step 601, step 702 is the same as step 602, step 703 is the same as step 603, step 704 is the same as step 604, step 705 is the same as step 605, step 706 is the same as step 606, step 707 is the same as step 607. Step 708 is the same as step 608, and step 709 is the same as step 609, and details are not described herein again.
  • Step 710 The PCF formulates the PCC rule 3 and the PCC rule 4 according to the subscription information of the user.
  • the PCC rule 3 detects that the service is controlled by the usage monitoring instance 1 .
  • the service belongs to the business monitored by monitoring key1.
  • the services monitored by the PCC rule 3 and the PCC rule 4 belong to the service monitored by the usage monitoring instance 2, and the usage of the PCF decision PCC rule 3 and the PCC rule 4 needs to be accumulated to the session level, and the PCC rule is not set for the PCC rule 3 and the PCC rule 4. 3 and the indication that the amount detected by PCC Rule 4 is excluded from the session level usage.
  • step 710 can be performed during the entire lifetime of the PDU session including two PSAs of UPF1 and UPF2.
  • Step 711 The PCF sends the PCC Rule 3, the PCC Rule 4 to the SMF, and the PCC Rule 3 and the PCC Rule 4 are executed in the UPF2.
  • step 702 if the PCF does not issue an indication that all PSAs in the PDU session perform session level usage monitoring or the SMF does not configure a policy for performing session level usage monitoring in all PSAs, then in step 711, the PCF further The instructions for performing session level usage monitoring on UPF2 or performing session level usage monitoring on all PSAs are issued.
  • Step 712 The SMF receives the PCC Rule 3, the PCC Rule 4, and an indication that the PCC Rule 3 and the PCC Rule 4 are executed on the UPF 2.
  • Step 713 If the SMF has the threshold fragmentation capability, the SMF determines whether there is a remaining usage threshold corresponding to the monitoring key1 and a remaining usage threshold corresponding to the monitoring key2, if there is a remaining usage threshold corresponding to the monitoring key1 and a remaining amount corresponding to the monitoring key2 If the SMF does not have the threshold fragmentation capability, the SMF obtains the usage report from the UPF1, and step 714 is performed.
  • the remaining usage threshold corresponding to the monitoring key1 is the difference between the usage threshold of the monitoring key1 received from the PCF before the SMF and the usage threshold that the SMF has allocated for the URR1; the remaining usage threshold corresponding to the monitoring key2 is received from the PCF before the SMF. The difference between the usage threshold of the monitoring key2 and the usage threshold that the SMF has allocated for the URR2.
  • the SMF obtains the cumulative usage of the URR1 and the cumulative usage of the URR2 from the UPF1, and the SMF may send the usage request to the UPF1, requesting to obtain the cumulative usage corresponding to the URR1, and the cumulative usage corresponding to the URR2, where the request may include the identifier of the URR1 and URR2 identifier; after receiving the request, UPF1 sends the cumulative usage of URR1 and the cumulative usage of URR2 to the SMF.
  • Step 714 The SMF determines the available usage threshold threshold1* corresponding to the monitoring key1, determines the URR3 according to the threshold1*, and determines the available usage threshold threshold2* corresponding to the monitoring key2, determines the URR4 according to the threshold2*, and determines the PDR3 according to the PCC rule 3, according to PCC Rule 4 determines PDR4.
  • the available usage threshold corresponding to the monitoring key1 is the difference between the usage threshold of the monitoring key1 received from the PCF before the SMF and the total usage total reported by the URR1, or the usage threshold of the last time the SMF is allocated to the URR1 and the URR1.
  • the available usage threshold corresponding to the monitoring key2 is the difference between the usage threshold of the monitoring key2 received from the PCF before the SMF and the total usage total reported by the URR2, or the usage threshold of the last time the SMF is allocated for the URR2 and the URR2 report. The difference in the usage threshold.
  • the available usage threshold corresponding to the monitoring key1 is threshold1-Uasge_Volume1.
  • the URR3 may include the identifier of the URR3 and the usage threshold threshold1** corresponding to the monitoring key1, and the threshold1** may be less than or equal to the threshold1*, that is, a part or all of the available usage threshold corresponding to the monitoring key1 is used as the usage threshold of the URR3.
  • URR4 may include the identifier of URR4 and the usage threshold threshold2** corresponding to monitoring key2, where threshold1** may be less than or equal to threshold1*, that is, part or all of the available usage threshold corresponding to monitoring key2 is used as the amount of URR4. Threshold.
  • the PDR3 carries the packet detection information corresponding to the service data flow template in the PCC rule 3; the PDR4 carries the packet detection information corresponding to the service data flow template in the PCC rule 4.
  • PDR3 is associated with URR3, and PDR3 and PDR4 are associated with URR4 (ie, URR3 is associated with all PDRs executed in UPF2 unless the PDR-matched service data needs to be deducted from session-level usage monitoring).
  • Step 715 The SMF formulates the PDR3 according to the PCC rule 3 issued by the PCF, formulates the PDR4 according to the PCC rule 4, determines the URR3 according to the remaining usage threshold corresponding to the monitoring key1, and determines the URR4 according to the remaining usage threshold corresponding to the monitoring key2.
  • PDR3 is associated with URR3
  • PDR3 and PDR4 are associated with URR4 (ie, URR3 is associated with all PDRs executed in UPF2 unless the PDR-matched service data needs to be deducted from session-level usage monitoring).
  • the SMF also saves the correspondence between the URR and the monitoring key.
  • the correspondence between the URR and the monitoring key stored in the SMF is: the monitoring key1 corresponds to URR1, URR3, and the monitoring key2 corresponds to URR2 and URR4.
  • the values of UUR ID1 and UUR ID3 may be the same or different, and UUR ID2 and UUR ID4 may be the same or different.
  • Step 716 The SMF sends PDR3, PDR4 and its associated URR3, URR4 to UPF2.
  • Step 717 UPF2 performs usage monitoring according to PRR3 and PDR3 associated URR3, and performs usage monitoring according to PDR3, PDR4, and PDR3 and PDR4 associated URR4.
  • the UPF2 can also report the accumulated usage to the SMF, and the process shown in FIG. 4a is executed, and details are not described herein again.
  • the SMF may further update the usage threshold corresponding to URR1 and the usage threshold corresponding to URR2, and send updated URR1 and URR2 to UPF1, for example, may be less than or equal to the available matching corresponding to monitoring key1.
  • the usage threshold threshold1*-URR3 usage threshold threshold1** is used as the updated URR1 usage threshold threshold1***, and similarly, threshold2*-threshold2** is used as the updated URR2 usage threshold threshold2***.
  • the SMF can use 100M of the available 150M as the usage threshold of URR3, which is 50% of the 150M. As the usage threshold of URR1, it is re-issued to UPF1.
  • FIG. 8 is a flowchart of a policy control method according to an embodiment of the present disclosure. As shown in FIG. 8, the method includes:
  • Step 801 is the same as step 601
  • step 802 is the same as step 602
  • step 803 is the same as step 603
  • step 804 is the same as step 604
  • step 805 is the same as step 605
  • step 806 is the same as step 606
  • step 807 is the same as step 607. ,No longer.
  • Step 808 The SMF sends an event notification to the PCF, notifying the PCF to add a PSA to the PDU session, and sending the cumulative usage corresponding to the URR1 and the cumulative usage corresponding to the URR2 to the PCF.
  • the event notification includes an identifier of the UPF2 and an identifier of the PDU session.
  • the identifier of the UPF2 is as described in FIG. 6 and will not be described again.
  • Step 809 The PCF receives the event notification, and determines, according to the preset configuration, the usage monitoring of the usage monitoring instance 1 and the usage monitoring instance 2 in the UPF2.
  • Step 810 The PCF formulates the PCC rule 3, the PCC rule 4, the usage monitoring information 3, and the usage monitoring information 4 according to the subscription information of the user.
  • the service controlled by the PCC rule 3 belongs to the service monitored by the usage monitoring instance 1 .
  • the PCF still assigns the monitoring key 1 to the usage monitoring instance 1 and the monitoring key 1 includes the monitoring key 1 Monitoring key1 monitored business.
  • the services monitored by the PCC rule 3 and the PCC rule 4 belong to the service monitored by the usage monitoring instance 2, and the usage of the PCF decision PCC rule 3 and the PCC rule 4 needs to be accumulated to the session level, and the PCC rule is not set for the PCC rule 3 and the PCC rule 4. 3 and the indication that the amount detected by PCC Rule 4 is excluded from the session level usage.
  • the usage monitoring information 3 includes [monitoring key1, PCC rule indication, new usage threshold threshold1*]; the usage monitoring information 4 includes [monitoring key2, session level indication, and new usage threshold threshold2*].
  • the new usage threshold threshold1* can be calculated according to the usage quota in the subscription information of the service data flow level, the cumulative usage in the usage information of the service data flow level, and the cumulative usage of the URR1, for example, threshold1* can be less than or Equal to the usage limit - cumulative usage - the cumulative usage of URR1.
  • the new threshold2* can be calculated according to the usage limit in the session-level subscription information, the cumulative usage in the session-level usage information, and the cumulative usage of URR2.
  • the PCF can also record the correspondence between the monitoring key_a and the monitoring key 1.
  • step 810 may perform the entire lifetime of the two PSAs of the PDU session including UPF1 and UPF2.
  • Step 811 The PCF sends the PCC rule 3, the PCC rule 4, the usage monitoring information 3, and the usage monitoring information 4 to the SMF, and performs an instruction of the PCC rule 3, the PCC rule 4, and an instruction to perform the session level usage monitoring on the UPF2 in the UPF2.
  • step 802 does not issue an indication that all PSAs in the PDU session perform session level usage monitoring or does not configure a policy for performing session level usage monitoring on all PSAs in the SMF, then in step 811, the PCF is performed. It also issues instructions for performing session level usage monitoring on UPF2 or performing session level usage monitoring on all PSAs.
  • Step 812 The SMF receives an indication that the PCC rule 3, the PCC rule 4, the usage monitoring information 3, the usage monitoring policy 4, the PCC rule 3 and the PCC rule 4 are executed on the UPF 2, and the session level usage monitoring is performed on the UPF 2.
  • the SMF determines, according to the monitoring key1 in the PCC rule 3 and the indication executed by the PCC rule 3 on the UPF2, that the monitoring key1 is monitored on the UPF2, the session-level usage monitoring is performed in the UPF2, or the session is performed in all the PSAs.
  • the indication or configuration of the level usage monitoring determines the usage monitoring of the monitoring key2 on the UPF2.
  • the SMF determines that both UPF1 and UPF2 monitor the usage of monitoring key1 and monitoring key2.
  • Step 813 The SMF formulates PDR3 according to PCC Rule 3, formulates PDR4 according to PCC Rule 4, determines URR3 according to usage monitoring information 3, and determines URR4 according to usage monitoring information 4, and updates URR1 and URR2.
  • the PDR3 that is defined by the SMF according to the PCC rule 3 is used to filter out the services monitored by the monitoring key1.
  • the PDR4 defined by the PMF3 and PCC rules defined by the SMF according to the PCC3 rule is used to filter the services monitored by the monitoring key2.
  • the PDR3 carries the packet detection information corresponding to the service data flow template in the PCC rule 3; the PDR4 carries the packet detection information corresponding to the service data flow template in the PCC rule 4.
  • the URR3 may include the identifier of the URR3 and the usage threshold threshold1** corresponding to the monitoring key1
  • the URR4 may include the identifier of the URR4 and the usage threshold threshold2** corresponding to the monitoring key2, the threshold1** is less than the threshold1*, and the threshold2** is less than the threshold2 *.
  • the usage monitoring information of the service data flow level only indicates that a new usage threshold threshold1* is defined for the monitoring key1, which does not indicate which threshold is used by the threshold1*, so for the SMF, the monitoring key1
  • the UPF that performs the usage monitoring can share the new usage threshold threshold1*. Therefore, the SMF uses a part of the new usage threshold threshold1* as the usage threshold of the URR3, and the other part is used as the usage threshold of the updated URR1.
  • a part of the new usage threshold threshold2* is used as the usage threshold of the URR4, and the other part is used as the usage threshold of the updated URR2.
  • PDR3 is associated with URR3, and PDR3 and PDR4 are associated with URR4. That is, URR3 is associated with all PDRs executed in UPF2 unless the PDR-matched service data needs to be deducted from session-level usage monitoring.
  • Step 814 The SMF sends PDR3, PDR4 and its associated URR3 and URR4 to the UPF2, and sends the updated URR1 and URR2 to the UPF1.
  • Step 815 UPF2 performs usage monitoring according to PDR3 and its associated URR3, and PDR3, PDR4, and URR4.
  • UPF1 performs usage monitoring based on PDR1, updated URR1, and PDR1, PDR2, and updated URR2.
  • the UPF1 and the UPF2 can also report the accumulated usage to the SMF, and the process shown in FIG. 4a is executed, and details are not described herein again.
  • the solution provided by the embodiment of the present application is mainly introduced from the perspective of interaction between the network elements.
  • the foregoing session management network element and the policy control network element include corresponding hardware structures and/or software modules for executing respective functions.
  • the present application can be implemented in a combination of hardware or hardware and computer software in combination with the elements and algorithm steps of the various examples described in the embodiments disclosed herein. Whether a function is implemented in hardware or computer software to drive hardware depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods to implement the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present application.
  • the embodiment of the present application may divide the function module of the session management network element and the policy control network element according to the foregoing method example.
  • each function module may be divided according to each function, or two or more functions may be integrated into one.
  • Processing module can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of the module in the embodiment of the present application is schematic, and is only a logical function division, and the actual implementation may have another division manner.
  • FIG. 9 is a schematic diagram showing a possible composition of a session management network element involved in the foregoing embodiment, where a PDU session managed by the session management network element includes a first PSA. And the second PSA, the session management network element sends the first URR corresponding to the first monitoring key to the first PSA.
  • the session management network element may include: a receiving unit 91, a sending unit 92, and a determining unit 93.
  • the receiving unit 91 is configured to receive policy control information from the policy control network element, where the policy control information includes a PCC rule; the PCC rule carries a first monitoring key, and is used to indicate that the policy corresponding to the PCC rule is executed on the second PSA.
  • the sending unit 92 is configured to send, to the second PSA, a first PDR corresponding to the PCC rule and a second URR corresponding to the first monitoring key.
  • the receiving unit 91 is configured to receive, from the policy control network element, policy control information including a PCC rule and information for indicating a policy corresponding to the PCC rule on the second PSA, and a sending unit 92, configured to send to the second PSA.
  • policy control information including a PCC rule and information for indicating a policy corresponding to the PCC rule on the second PSA
  • a sending unit 92 configured to send to the second PSA.
  • the first PDR corresponding to the PCC rule and the second URR corresponding to the first monitoring key is configured to send to the second PSA.
  • the first monitoring key corresponds to the session-level usage monitoring instance
  • the receiving unit 91 is configured to receive, from the policy control network element, to perform session-level usage monitoring on the second PSA, or to indicate all included in the PDU session.
  • the policy control information of the session level usage monitoring is performed on the PSA; the sending unit 92 is configured to send the second URR corresponding to the first monitoring key to the second PSA.
  • the determining unit 93 is configured to determine, according to the service data flow template in the PCC rule, the packet detection of the first PDR before the sending unit 92 sends the first PDR corresponding to the PCC rule and the second URR corresponding to the first monitoring key to the second PSA. Information, and determining a second URR for the first monitoring key; wherein the first PDR includes an identification of the second URR.
  • the determining unit 93 is configured to determine a second URR for the first monitoring key before the sending unit 92 sends the second URR corresponding to the first monitoring key to the second PSA.
  • the policy control information sent by the policy control network element further includes: a first usage threshold of the first monitoring key and a first monitoring received before the first usage threshold is not used to cover the session management network element.
  • the first indication of the usage threshold of the key, the determining unit 93 is configured to determine the usage threshold of the second URR according to the first usage threshold.
  • the determining unit 93 is configured to determine an available usage threshold according to the accumulated usage of the first URR; the session management network element determines the usage threshold of the second URR according to the available usage threshold.
  • the determining unit 93 is configured to determine the usage threshold of the second URR according to the remaining usage threshold in the presence of the remaining usage threshold.
  • the session management network element provided by the embodiment of the present application is used to execute the foregoing policy control method, so that the same effect as the above policy control method can be achieved.
  • the session management network element may include a processing module and a communication module, and the processing module is configured to control and manage the action of the session management network element.
  • the communication module is used to support communication between the session management network element and other network entities, such as communication with the functional modules or network entities shown in FIG.
  • the session management network element may further include a storage module for storing program code and data of the server.
  • the processing module can be a processor or a controller. It is possible to implement or carry out the various illustrative logical blocks, modules and circuits described in connection with the present disclosure.
  • the processor can also be a combination of computing functions, for example, including one or more microprocessor combinations, a combination of a DSP and a microprocessor, and the like.
  • the communication module can be a transceiver, a transceiver circuit, or a communication interface.
  • the storage module can be a memory.
  • the processing module is a processor
  • the communication module is a communication interface
  • the storage module is a memory
  • the session management network element involved in the embodiment of the present application may be the communication device shown in FIG.
  • FIG. 10 is a schematic diagram showing a possible composition of a policy control network element involved in the foregoing embodiment, where the policy control network element determines that a PDU session includes a first PSA and The second PSA, the policy control network element determines that the usage monitoring of the first usage monitoring instance corresponding to the first monitoring key is performed on the first PSA.
  • the policy control network element may include: a determining unit 100, a sending unit 101, and a receiving unit 102.
  • the determining unit 100 is configured to determine to perform usage monitoring on the first usage monitoring instance on the second PSA; the sending unit 101 is configured to send policy control information including a PCC rule to the session management network element, where the PCC rule carries the first monitoring key And information for indicating a policy corresponding to the execution of the PCC rule on the second PSA.
  • the determining unit 100 is configured to determine to perform usage monitoring on the first usage monitoring instance on the second PSA; the sending unit 101 is configured to send the PCC rule to the session management network element, and to indicate that the performing is performed on the second PSA The policy control information of the information of the policy corresponding to the PCC rule; wherein the PCC rule carries the first monitoring key.
  • the determining unit 100 is configured to determine to perform session level usage monitoring on the second PSA; the sending unit 101 is configured to send, to the session management network element, an indication to perform session level usage monitoring on the second PSA, or to indicate in the PDU Policy control information for performing session level usage monitoring on all PSAs included in the session.
  • the receiving unit 102 is configured to receive, after the sending unit 101 sends the policy control information to the session management network element, a message that is sent by the session management network element and carries the information of adding the second PSA and the accumulated usage of the first monitoring key.
  • the receiving unit 102 is further configured to: after the sending unit 101 sends the policy control information to the session management network element, receive, by the session management network element, the first amount of the cumulative usage of the URR including the first PSA or the second PSA report included in the PDU session. The cumulative amount of monitoring key.
  • the policy control network element provided by the embodiment of the present application is used to execute the foregoing policy control method, so that the same effect as the above policy control method can be achieved.
  • the policy control network element may include a processing module and a communication module, and the processing module is configured to control and manage the action of the policy control network element.
  • the communication module is used to support communication of policy control network elements with other network entities, such as with the functional modules or network entities shown in FIG.
  • the policy control network element may further include a storage module for storing program code and data of the policy control network element.
  • the processing module can be a processor or a controller. It is possible to implement or carry out the various illustrative logical blocks, modules and circuits described in connection with the present disclosure.
  • the processor can also be a combination of computing functions, for example, including one or more microprocessor combinations, a combination of a DSP and a microprocessor, and the like.
  • the communication module can be a transceiver, a transceiver circuit, or a communication interface.
  • the storage module can be a memory.
  • the processing module is a processor
  • the communication module is a communication interface
  • the storage module is a memory
  • the policy control network element involved in the embodiment of the present application may be the communication device shown in FIG.
  • the above embodiments it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • a software program it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions.
  • the computer program instructions When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present application are generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transmission to another website site, computer, server or data center via wired (eg coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (eg infrared, wireless, microwave, etc.).
  • the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device that includes one or more servers, data centers, etc. that can be integrated with the media.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)) or the like.
  • a magnetic medium eg, a floppy disk, a hard disk, a magnetic tape
  • an optical medium eg, a DVD
  • a semiconductor medium such as a solid state disk (SSD)

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Selon un mode de réalisation, la présente invention se rapporte au domaine technique des communications et concerne, plus particulièrement, un procédé, un équipement et un système de contrôle de politique mettant en œuvre une surveillance d'utilisation d'une même instance de surveillance d'utilisation sur une pluralité d'ancrages de session PDU (PSA). Le procédé comprend les éléments suivants : une session d'unité de données de protocole (PDU) gérée par un élément de réseau de gestion de session comprend un premier PSA et un second PSA, et l'élément de réseau de gestion de session reçoit des informations de contrôle de politique d'un élément de réseau de contrôle de politique après l'envoi, par l'élément de réseau de gestion de session, d'une première règle de rapport d'utilisation (URR) correspondant à une première clé de surveillance au premier PSA, les informations de contrôle de politique comprenant une règle de contrôle de politique et de facturation (PCC), ladite règle de PCC portant la première clé de surveillance et une indication utilisée pour indiquer une politique qui correspond à la règle PCC exécutée sur le second PSA ; l'élément de réseau de gestion de session envoie un premier PDR correspondant à la règle de PCC et un second URR correspondant à la première clé de surveillance.
PCT/CN2019/074804 2018-02-13 2019-02-11 Procédé, équipement et système de contrôle de politique Ceased WO2019158033A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810150431.4A CN110149603B (zh) 2018-02-13 2018-02-13 一种策略控制方法、设备及系统
CN201810150431.4 2018-02-13

Publications (1)

Publication Number Publication Date
WO2019158033A1 true WO2019158033A1 (fr) 2019-08-22

Family

ID=67588146

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/074804 Ceased WO2019158033A1 (fr) 2018-02-13 2019-02-11 Procédé, équipement et système de contrôle de politique

Country Status (2)

Country Link
CN (1) CN110149603B (fr)
WO (1) WO2019158033A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4262273A4 (fr) * 2021-02-09 2024-03-20 Samsung Electronics Co., Ltd. Dispositif et procédé de récupération d'informations perdues dans un système de communication sans fil

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112449358B (zh) * 2019-08-30 2022-05-24 华为技术有限公司 一种统计业务流量的方法和装置
CN114747194B (zh) * 2019-11-29 2025-04-04 华为技术有限公司 上行pdr的生成方法、装置及系统
CN113365285B (zh) * 2020-03-03 2024-06-25 华为技术有限公司 一种确定策略控制网元的方法、装置和系统
CN113382375B (zh) * 2020-03-09 2022-10-25 华为技术有限公司 通信方法、装置及系统
CN113747483B (zh) * 2020-05-29 2023-07-07 华为技术有限公司 业务流的用户量统计方法、装置及系统
WO2021258330A1 (fr) * 2020-06-24 2021-12-30 Huawei Technologies Co., Ltd. Mécanisme de gestion d'instructions pcc à commande de charge et de politique prédéfinie efficace pour systèmes de communication
CN113938852B (zh) * 2020-07-14 2025-08-15 中兴通讯股份有限公司 一种数据流量监控方法、smf网元、psa网元和可读存储介质

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102883342A (zh) * 2011-07-11 2013-01-16 中兴通讯股份有限公司 一种用量监控方法及系统
WO2018006017A1 (fr) * 2016-07-01 2018-01-04 Idac Holdings, Inc. Procédés permettant de prendre en charge une continuité de session session par session

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8514793B2 (en) * 2008-10-31 2013-08-20 Interdigital Patent Holdings, Inc. Method and apparatus for monitoring and processing component carriers
CN102104859A (zh) * 2009-12-21 2011-06-22 中兴通讯股份有限公司 离线计费方法及系统
US10009751B2 (en) * 2015-12-28 2018-06-26 Cisco Technology, Inc. Virtual mobility anchor for network sharing
CN107580371A (zh) * 2016-07-04 2018-01-12 中兴通讯股份有限公司 信息、数据发送方法及装置、接入网和系统

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102883342A (zh) * 2011-07-11 2013-01-16 中兴通讯股份有限公司 一种用量监控方法及系统
WO2018006017A1 (fr) * 2016-07-01 2018-01-04 Idac Holdings, Inc. Procédés permettant de prendre en charge une continuité de session session par session

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Procedures for the 5G System; Stage 2 (Release 15)", 3GPP TS 23. 502 V15. 0. 0, 22 December 2017 (2017-12-22), pages 1 - 258, XP055624857 *
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; System Architecture for the 5G System; Stage 2 (Release 15)", 3GPP TS 23. 501 V15. 0. 0, 22 December 2017 (2017-12-22), XP055625589 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4262273A4 (fr) * 2021-02-09 2024-03-20 Samsung Electronics Co., Ltd. Dispositif et procédé de récupération d'informations perdues dans un système de communication sans fil

Also Published As

Publication number Publication date
CN110149603B (zh) 2020-07-07
CN110149603A (zh) 2019-08-20

Similar Documents

Publication Publication Date Title
WO2019158033A1 (fr) Procédé, équipement et système de contrôle de politique
JP6821061B2 (ja) ポリシー制御方法、ネットワーク要素、およびシステム
US11582350B2 (en) Policy charging control and session management interaction method, apparatus, and system
US20200366567A1 (en) Method, Device and System for Ensuring Service Level Agreement of Application
EP3890398B1 (fr) Procédé, appareil et système de rapport d'utilisation de données
CN112398675B (zh) 网元分配方法及装置
US12101435B2 (en) Charging method and apparatus for network system handover utilizing a 4G and 5G data charging function entity
CN112019363B (zh) 确定业务传输需求的方法、设备及系统
WO2021146926A1 (fr) Procédé, dispositif et système de transmission de données
CN110519809A (zh) 管理pdu会话的方法、装置和系统
WO2018121178A1 (fr) Procédé, dispositif, et système d'ajustement de ressources
CN110557265A (zh) 一种组播方法及装置
WO2020187324A1 (fr) Procédé et appareil de communication
WO2019158032A1 (fr) Procédé, dispositif et système de commande de politique
CN114747194B (zh) 上行pdr的生成方法、装置及系统
WO2020221300A1 (fr) Procédé et appareil de traitement de session d'unité de données de protocole, et dispositif électronique
CN112242877B (zh) 数据传输方法、装置及系统
CN114828120B (zh) 通信方法、设备、系统及存储介质
WO2016192011A1 (fr) Procédé de commande de congestion et dispositif d'élément de réseau
WO2020011173A1 (fr) Procédé et appareil de gestion de relocalisation
WO2021233063A1 (fr) Procédé et appareil de commande de politique
WO2024208098A1 (fr) Procédé et dispositif de facturation
WO2021046746A1 (fr) Procédé, dispositif et système de rapport d'informations de gestion de session
BR112016028298B1 (pt) Método operacional em um dispositivo solicitante e dispositivo solicitante, e método operacional em um dispositivo local e dispositivo local

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19754317

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19754317

Country of ref document: EP

Kind code of ref document: A1