This application belongs to the field of communications technologies, and specifically, relates to a core network system BACKGROUND
A Service-Based Architecture (SBA) is introduced in a 5th Generation (5G) communications system. SBA-based design is performed on both a control plane and a management plane of a 5G core network, but a control plane SBA is different from a management plane SBA. For example, the control plane SBA still retains a modular design principle of a conventional core network, and the management plane SBA is designed in a more purely SBA-based manner. The control plane SBA is different from the management plane SBA, which is not conducive to integration or interaction between different domains of the core network.
Embodiments of this application provide a core network system.
According to a first aspect, a core network system is provided, including: a first network function and a second network function, where the first network function and the second network function are connected through a core network service-based architecture SBA bus, where the first network function is configured to provide an access control-related service; and the second network function is configured to provide a mobility management-related service and/or a network service support service.
In the core network system provided in the embodiments of this application, the first network function and the second network function are set, to separately set an access control function and other core network functions (such as a mobility management function and a network service support function). In this way, an SBA-based core network can be better integrated with an SBA-based management plane, to lay a foundation for integration of an SBA-based access network and the SBA-based core network.
The following clearly describes the technical solutions in the embodiments of this application with reference to the accompanying drawings in the embodiments of this application. Apparently, the described embodiments are some but not all of the embodiments of this application. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments of this application shall fall within the protection scope of this application.
The terms “first”, “second”, and the like in the specification and claims of this application are used to distinguish between similar objects instead of describing a specific order or sequence. It should be understood that the terms used in this way are interchangeable in appropriate circumstances, so that the embodiments of this application can be implemented in ab order other than the order illustrated or described herein. In addition, the objects distinguished by “first” and “second” usually belong to one category, and the number of objects is not limited. For example, there may be one or more first objects. In addition, in the specification and claims, “and/or” represents at least one of connected objects, and the character “/” typically represents an “or” relationship between the associated objects.
The following describes a 6th Generation (6G) communications system as an example, and 6G terms are used in most of the following descriptions. However, these technologies may also be applied to applications other than a 6G system application, for example, an evolved 5G system or a 7G system.
An embodiment of this application provides a core network system, including: a first network function and a second network function, where the first network function and the second network function are connected through a core network SBA bus.
The first network function may be configured to provide an access control-related service (or referred to as a function), for example, access, registration, and security services. In most of subsequent embodiments, the first network function is described by using an Access Control Function (ACF) as an example.
The second network function may be responsible for a service irrelevant to access control. For example, the second network function is configured to provide a mobility management-related service and/or a network service support service. For example, the second network function is configured to provide the mobility management-related service and the network service support service; the second network function is configured to provide the mobility management-related service; or the second network function is configured to provide the network service support service.
A network service (namely, a network sub-function) mentioned in this embodiment is usually an internal service of a core network, and is different from a service provided for a terminal. In most of subsequent embodiments, the second network function is described by using a Mobility management and service Support Function (MSF) as an example.
Actually, the core network system shown in
It should be noted that network functions mentioned in the embodiments of this application, such as the first network function, the second network function, and the third network function, are usually functional entities capable of implementing some functions or providing some services. Therefore, these network functions may be replaced with other technical terms. For example, the first network function is replaced with a technical term such as the ACF or a first network element, the second network function is replaced with a technical term such as the MSF or a second network element, and the third network function is replaced with a technical term such as the CMF or a third network element.
In the core network system provided in this embodiment of this application, the first network function and the second network function are set, to separately set an access control function and other core network functions (such as a mobility management function and a network service support function). In this way, an SBA-based core network can be better integrated with an SBA-based management plane, to lay a foundation for integration of an SBA-based access network and the SBA-based core network.
The following describes the “an SBA-based core network can be better integrated with an SBA-based management plane”. In this embodiment, a control plane SBA of the first network function may retain a modular design principle of a conventional core network (such as a 4G core network). Each network sub-function that can be implemented by the first network function is not a free combination of microservices, but is a set of specific network sub-functions standardized in a protocol. These network sub-functions are network functions related to access control, registration, and authentication and authorization. A management plane SBA of the second network function SBA is designed in a more purely SBA-based manner. The second network function can implement various internal network services (namely, network sub-functions). During network configuration, various internal network services (namely, network sub-functions) can be flexibly combined. In this embodiment of this application, the access control function and other core network functions are separately set, but are not centrally implemented by one network function (for example, all the functions are implemented by an Access and Mobility Management Function (AMF)), so that the SBA-based core network can be better integrated with the SBA-based management plane.
For example, the access control-related service provided by the first network function in the foregoing embodiments may include at least one of the following (1) to (8).
(1) A second interface (N2) control plane message is received, and the N2 control plane message is locally processed, or first target information in the N2 control plane message is sent to a first target network function. In this example, the first network function serves as a termination of an N2 control plane protocol (Termination of RAN CP interface). The first target network function mentioned in this example may be a network function other than the first network function in the core network system, for example, the second network function.
(2) Second target information is received from a second target network function, and an N2 control plane message including the second target information is sent to an access network device. In this example, the first network function serves as a termination of an N2 control plane protocol (Termination of RAN CP interface (N2)).
(3) An N2 control plane message is sent to the access network device. In this example, the N2 control plane message may be locally generated by the first network function.
(4) A ciphering and integrity protection service of a Non-Access Stratum (NAS) message. In this example, the first network function serves as a termination of a NAS protocol (Termination of NAS (N1)), and may perform ciphering and integrity protection and the like on a NAS message.
(5) A NAS connection management service. In this embodiment, the termination of the NAS protocol is the first network function, and therefore the NAS connection management service may also be implemented by the first network function.
(6) A registration management service.
(7) A security-related service. For example, the security-related service may include at least one of the following: an access authentication service; an access authorization service; a security anchor functionality; or a network slice-specific authentication and authorization service.
(8) A non-3rd Generation Partnership Project (non-3GPP) access support service.
For example, the mobility management-related service and/or the network service support service provided by the second network function in the foregoing embodiments may include at least one of the following (1) to (9).
(1) A reachability management service.
(2) A mobility management service.
(3) A terminal mobility event notification (UE mobility event notification) service.
(4) A lawful intercept service.
(5) A session management service support service, for example, providing transport for SM messages between a terminal (e.g. UE) and a Session Management Function (SMF), a transparent proxy for routing SM messages, and Evolved Packet Switched System (EPS) bearer Identifier (ID) allocation for interworking with an EPS
(6) A Short Message Service (SMS) support function, for example, providing transport for SMS messages between the terminal (e.g. the UE) and a Short Message Service Function (SMSF).
(7) A location service support function, for example, location services management for regulatory services, and providing transport for location services messages between the terminal (e.g., UE) and a Location Management Function (LMF) as well as between a Radio Access Network (RAN) and the LMF.
(8) A Cellular Internet of Things (CIoT) service support function, for example, support for control plane CIoT optimization, and support for user plane CIoT optimization.
(9) An external parameter configuration function, for example, provisioning of external parameters such as expected terminal (e.g., UE) behavior parameters or network configuration parameters.
As mentioned in the foregoing embodiments, the core network system provided in the embodiments of this application may further include the third network function (namely, the CMF), the third network function is connected to the core network SBA bus, and the third network function is configured to provide the terminal context management service.
In this embodiment, the third network function is additionally introduced for providing the terminal context management service, to better design an SBA architecture, so that some network functions (the ACF, the MSF, and the like) focus on their own logical functions and services.
In this embodiment, other network functions may be registered with the third network function, and then a terminal context may be requested from the third network function, or the third network function may be requested to update the terminal context. For example, the ACF or the MSF requests the terminal context from the third network function, or the ACF or the MSF requests the third network function to update the terminal context.
In this embodiment, the terminal context managed by the third network function mainly includes a context related to access and mobility management, for example, a terminal context of an original AMF in the conventional technology. It can be understood that the terminal context stored and managed by the third network function may further include terminal contexts generated and used by other network functions, for example, terminal contexts generated and stored by network functions such as an SMF or an access network device (for example, a base station).
For example, the first network function mentioned in the foregoing embodiments may be further configured to receive an uplink NAS message, and locally process the uplink NAS message, or send third target information in the uplink NAS message to a third target network function. For example, the first network function sends necessary information in a decrypted uplink NAS message to the third target network function through a service-based interface. The third target network function mentioned in this example may be a network function other than the first network function in the core network system, for example, the second network function.
In this embodiment, all NAS messages on an N1 interface may be directly sent by the access network device (for example, the base station) to the first network function, and the first network function decrypts the NAS messages, and then locally processes decrypted NAS messages or forwards the decrypted NAS messages to the second network function for processing.
For example, the first network function mentioned in the foregoing embodiments may be further configured to send a downlink NAS message to the terminal, where the downlink NAS message may be locally generated by the first network function.
For example, the second network function mentioned in the foregoing embodiments may be further configured to send fourth target information to the first network function, and the first network function is further configured to send a downlink NAS message including the fourth target information to the terminal. For example, the second network function sends, to the first network function through a service-based interface, plaintext information that needs to be sent to the terminal, and the first network function encrypts the information, and then forwards an encrypted downlink NAS message to the terminal.
In the foregoing embodiments, the first network function (the ACF) may serve as the termination of the NAS protocol, and the first network function may be responsible for ciphering and integrity protection of NAS messages. Therefore, an important function of an interface between the first network function and the second network function is as follows After decrypting an uplink NAS message, the first network function forwards necessary information to the second network function. The second network function may send, to the first network function, a message that needs to be sent to the terminal, and the first network function encrypts the message, and then forwards an encrypted message to the terminal through the access network device. An interaction process between the first network function and the second network function may be implemented based on a service-based interface.
The foregoing mainly describes main functions of the first network function, the second network function, and the third network function. The following describes interfaces provided by these network functions in several embodiments.
For example, an interface function related to NAS protocol transport on an NG Application Protocol (NGAP) interface in the conventional technology may be inherited by the ACF, and other interface functions on the NGAP interface are separately inherited by the first network function, the second network function, and the third network function.
In an example, the first network function provides at least one of interface functions in the following (1) to (9):
In the foregoing embodiments, in a case that a RAN does not support an SBA, an N2 interface function between a base station and the AMF in the conventional technology may be inherited by the first network function.
In an example, the second network function provides at least one of interface functions in the following (1) to (7):
In an example, the third network function provides at least one of interface functions in the following (1) and (2):
The following describes interface functions between the first network function, the second network function, the third network function, and other network functions. All the network functions mentioned herein may belong to the core network system provided in the embodiments of this application. The interfaces mentioned in the embodiments of this application may be SBA-based service-based interfaces or conventional interfaces.
As shown in
In this embodiment, an interface function between an NSSF and the AMF, an interface function between an AUSF and the AMF, an interface function between an NSSAAF and the AMF, and an interface function between a UDM and the AMF in the conventional technology may be all inherited by the ACF.
As shown in
In this embodiment, an interface function between an SMF and the AMF, an interface function between an NEF and the AMF, an interface function between an SMSF and the AMF, and an interface function between an LMF and the AMF in the conventional technology may be all inherited by the MSF.
As shown in
In this embodiment, an interface function between a PCF and the AMF in the conventional technology is inherited by the ACF and the MSF, and an interface function between an NWDAF and the AMF is inherited by the ACF and the MSF.
For example, an interface between a terminal radio capability management function (UE radio Capability Management Function (UCMF)) and the AMF in the conventional technology may be inherited by the CMF provided in the embodiments of this application.
The RAN is connected to a UPF through an N3 interface, the UPF is connected to a Data Network (DN) through an N6 interface, the UPF is connected to the SMF through an N4 interface, and the UPF further provides an N9 interface.
Step 1: UE sends a registration request to a RAN.
Step 2: The RAN performs an ACF selection operation.
Step 3: The RAN sends a registration request to a selected ACF
Step 4: The ACF sends a terminal context transfer (Namf_Communication_UEContextTransfer) message to a CMF
Step 5: The CMF sends a terminal context transfer response (Namf_Communication_UEContextTransfer response) to the ACF
Step 6. The ACF initiates an identification requester, and sends an identity request message to the UE to request a SUbscription Concealed Identifier (SUCI).
Step 7: The UE returns an identity response message including the SUCI to the ACF.
Step 8: The ACF performs an AUSF selection operation.
Step 9: The UE, the ACF, an AUSF, and a UDM perform an authentication/security operation.
Step 10. The ACF sends a registration status update (Namf_Communication_RegistrationStatusUpdate) message to the CMF.
Step 11: The UF and the ACF perform an identity request/response (PEH).
Step 12: The ACF initiates device identity check to an Equipment Identity Register (EIR) by calling N5g-eir_EquipmenIdentityCheck_Get.
Step 13: The ACF performs a UDM selection operation.
Step 14a-e. The ACF and a UDM perform the following operations: registration (Nudm_UECM_Registration); acquisition (Nudm_SDM_Get); subscription (Nudm_SDM_Subscribe); deregistration notification (Nudm_UECM_DeregistrationNotify), and unsubscription (Nudm_UECM_Unsubscribe).
Step 15: The ACF performs a PCF selection operation.
Step 16: The ACF and a PCF perform Access Management (AM) policy association establishment/modification.
Step 17: The ACF, an MSF, and an SMF perform a PDU session update/release operation (Nsmf_PDUSession_UpdateSMContext/Nsmf_PDUSession_RELEASESMContext).
Step 18: The ACF sends a registration accept to the UE.
Step 19: The UE returns a registration complete message to the ACF.
Step 20. Transmit an SDM message (Nudm_SDM_Info) between the ACF and the UDM.
Step 21: Transmit a UE Connection Management (CM) update message (Nudm_UECM_Update) between the ACF and the UDM.
Step 1: UE sends a PDU session establishment request messages to an MSF through an ACF
Step 2: The MSF performs an SMF selection operation.
Step 3. The MSF sends a session establishment management context request message to an SMF.
Step 4: The SMF obtains a session management-related subscription from a UDM.
Step 5: The SMF sends a session establishment management context response message to the MSF.
Step 6: Perform PDU session authentication/authorization.
Step 7: The SMF obtains a session management policy from a PCF and indicates the UPF to establish a core network-related session.
Step 8: The SMF sends an N1/N2 message transport message to the MSF.
Step 9. The MSF sends an N2 PDU session request message to a RAN (for example, a base station) through the ACF
Step 10. The MSF sends an N1 PDU session accept message to the terminal through the ACF.
Subsequently, data may be transmitted between the UE and the UPF.
The foregoing describes the embodiments of this application with reference to the accompanying drawings. However, this application is not limited to the foregoing implementations. The foregoing implementations are merely illustrative rather than restrictive. As instructed by this application, persons of ordinary skill in the art may develop many other manners without departing from principles of this application and the protection scope of the claims, and all such manners fall within the protection scope of this application.
Number | Date | Country | Kind |
---|---|---|---|
202110150353.X | Feb 2021 | CN | national |
The present application is a bypass continuation of International Application No. PCT/CN2022/074925, filed on Jan. 29, 2022, which claims priority to Chinese Patent Application No. 202110150353.X, filed on Feb. 3, 2021 The entire contents of each of the above-referenced applications are expressly incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/CN2022/074925 | Jan 2022 | US |
Child | 18229656 | US |