Selection of a network slice instantiation for transmitting uplink packets
11716631 · 2023-08-01
Assignee
Inventors
Cpc classification
H04W88/06
ELECTRICITY
H04W48/16
ELECTRICITY
H04W28/0215
ELECTRICITY
International classification
H04W16/02
ELECTRICITY
H04W28/02
ELECTRICITY
H04W48/16
ELECTRICITY
Abstract
A method for transmitting in a communication network uplink data from an application module in a user terminal. The method includes: determining, by said user terminal, if a correspondence exists between an application module providing at least one uplink packet and at least one rule designating a network slice instantiation to be used for transmitting uplink packets in the communication network; and in response to a determination by said user terminal that the application module providing at least one uplink packet corresponds to a rule designating a network slice instantiation to be used for transmitting the uplink packet in the communication network, transmitting said at least one uplink packet from the user terminal to an entity for access to a user plane of the designated network slice instantiation.
Claims
1. A method for transmitting uplink data by a user terminal, the method comprising the following acts: verifying, by a communication module of the user terminal, if a correspondence exists between an application module of the user terminal and at least one rule stored by the user terminal and designating a network slice instantiation to be used for transmitting uplink packets in a communication network; and in response to a positive verification, by said communication module of the user terminal, that the application module, which provides at least one uplink packet, corresponds to a rule designating a network slice instantiation to be used for transmitting the at least one uplink packet in the communication network, transmitting, by said communication module of the user terminal, said at least one uplink packet from the user terminal to an entity of the communication network that provides access to a user plane of the designated network slice instantiation.
2. The method as claimed in claim 1, the method further comprising the user terminal receiving, during a prior phase of attachment of the user terminal to a default network slice instantiation, an attachment acknowledgment message from an entity for access to a control plane of the default network slice instantiation, said attachment acknowledgement message containing said at least one rule designating a network slice instantiation.
3. The method as claimed in claim 1, the method further comprising the user terminal further receiving, from an entity of the communication network, a message containing said at least one rule designating a network slice instantiation.
4. The method as claimed in claim 1, in which said at least one rule contains at least one parameter from among a destination address of the packets, a transport protocol, a source port, a destination port, an application protocol, an item of information of location of the terminal or a time slot of application of the rule, the determination of the correspondence between the application module providing at least one uplink packet and said at least one rule comprising verifying the applicability of said parameter.
5. The method as claimed in claim 1, in which said at least one rule comprises a parameter of duration of validity, the method further comprising: verifying, by the user terminal, the parameter of duration of validity of said at least one rule; and when it has been verified that the duration of validity of said at least one rule has expired, transmitting, to an entity for access to a control plane of a default network slice instantiation, a request for obtaining a message for updating said at least one rule.
6. The method as claimed in claim 1, wherein, when the application module providing at least one uplink packet corresponds to a rule designating a network slice instantiation to which the user terminal is not attached, the user terminal transmits an attachment request to an entity for access to a control plane of the designated network slice instantiation, said at least one uplink packet being transmitted subsequent to receipt of an attachment acknowledgment message originating from the entity for access to the control plane.
7. The method as claimed in claim 1, further comprising determining, by the user terminal, whether the application module provides at least one uplink packet belonging to a new data stream, the act of verifying by said communication module of the user terminal of the correspondence between the application module and at least one rule being performed after that it has been determined by the user terminal that the at least one uplink packet provided by the application module belongs to a new data stream; and the method further comprises, in response to a positive verification by the communication module of the user terminal that the at least one uplink packet provided by the application module does not belong to a new data stream, transmitting said at least one uplink packet from the user terminal to an entity for access to the user plane of the network slice instantiation used for at least one previous uplink packet of the data stream to which the at least one uplink packet belongs.
8. The method as claimed in claim 1, wherein the method further comprises, when the terminal is attached to a network slice instantiation and if the user terminal does not exchange any payload data packet with an entity for access to the user plane of said network slice instantiation during a determined time span, transmitting from the user terminal a detachment request to an entity for access to a control plane of said network slice instantiation.
9. The method as claimed in claim 8, in which the detachment request relates to a default network slice instantiation and is transmitted to an entity for access to a control plane of said default network slice instantiation, the method furthermore comprising: verifying a parameter of duration of validity contained in said at least one rule; and when the duration of validity of said at least one rule has expired, transmitting, from the user terminal to the entity for access to the control plane of the default network slice instantiation, a request for attachment to the default network slice instantiation and, subsequent to receipt of an attachment acknowledgment message, a request for updating said at least one rule.
10. A user terminal comprising a transmitter, a receiver, a memory and a processor, wherein the processor is configured to verify if a correspondence exists between an application module of the user terminal and at least one rule stored in the memory and designating a network slice instantiation in a communication network in which uplink packets are to be transmitted; and wherein the transmitter is configured to, in response to a positive verification that the application module, which provides at least one uplink packet corresponds to a rule of said at least one rule designating a network slice instantiation, transmit said at least one uplink packet to an entity of the communication network that provides access to a user plane of the designated network slice instantiation.
11. The user terminal as claimed in claim 10, wherein the receiver is configured to receive, during a prior phase of attachment of the user terminal to a default network slice instantiation, an attachment acknowledgment message from an entity for access to a control plane of the default network slice instantiation, said attachment acknowledgement message containing said at least one rule designating a network slice instantiation.
12. The user terminal as claimed in claim 10, wherein the receiver is configured to receive, from an entity of the communication network, a message containing said at least one rule designating a network slice instantiation.
13. The user terminal as claimed in claim 10, in which said at least one rule contains at least one parameter from among a destination address of the packets, a transport protocol, a source port, a destination port, an application protocol, an item of information of location of the terminal or a time slot of application of the rule, the processor being further configured to verify the applicability of said parameter when verifying if a correspondence exists between an application module providing at least one uplink packet and at least one rule designating a network slice instantiation in a communication network in which uplink packets are to be transmitted.
14. The user terminal as claimed in claim 10, in which said at least one rule comprises a parameter of duration of validity, the processor being further configured to verify the parameter of duration of validity of said at least one rule; and when it has been verified by the processor that the duration of validity of said at least one rule has expired, the transmitter is configured to transmit, to an entity for access to a control plane of a default network slice instantiation, a request for obtaining a message for updating said at least one rule.
15. The user terminal as claimed in claim 10, wherein the transmitter is further configured to, when the processor determines that the application module providing at least one uplink packet corresponds to a rule designating a network slice instantiation to which the user terminal is not attached, transmit an attachment request to an entity for access to a control plane of the designated network slice instantiation, the at least one uplink packet being transmitted subsequent to the receipt by the receiver of an attachment acknowledgment message originating from the entity for access to the control plane.
16. The user terminal as claimed in claim 10, wherein the processor is further configured to verify whether the application module provides at least one uplink packet belonging to a new data stream, the determination by the processor of the correspondence between the application module providing at least one uplink packet and at least one rule being performed after it has been verified by the processor that the at least one uplink packet provided by the application module belongs to a new data stream; and the transmitter being configured to, when the processor has verified that the at least one uplink packet provided by the application module does not belong to a new data stream, transmit said at least one uplink packet to an entity for access to the user plane of the network slice instantiation used for at least one previous uplink packet of the data stream to which the at least one uplink packet belongs.
17. The user terminal as claimed in claim 10, wherein the transmitter is further configured to, when the user terminal is attached to a network slice instantiation and if the user terminal does not exchange any payload data packet with an entity for access to the user plane of said network slice instantiation during a determined time span, transmit a detachment request to an entity for access to a control plane of said network slice instantiation.
18. The user terminal as claimed in claim 17, in which the detachment request relates to a default network slice instantiation and is transmitted to an entity for access to a control plane of said default network slice instantiation, the processor being further configured to verify a parameter of duration of validity contained in said at least one rule and the transmitter being further configured to, when the duration of validity of said at least one rule has expired, transmit, to the entity for access to the control plane of the default network slice instantiation, a request for attachment to the default network slice instantiation and, subsequent to receipt of an attachment acknowledgment message, a request for updating said at least one rule.
19. A communication network comprising: a first network entity configured to provide access to a user terminal at a control plane of a network slice instantiation implemented in the communication network; and a second network entity configured to provide said user terminal with access to a user plane of the network slice instantiation, so as to allow dispatching of an uplink packet in said user plane of the network slice instantiation; wherein the first network entity comprises a transmitter configured to transmit to the user terminal a message containing at least one rule designating a network slice instantiation in the communication network, to be used by the user terminal to transmit at least one uplink packet from an application module of the user terminal after the user terminal has verified that said application module providing at least one uplink packet corresponds to one of said at least one rule.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) Other characteristics and advantages of the invention will become apparent on reading in the description detailed hereinafter of particular embodiments, given by way of nonlimiting examples, and of the appended figures in which:
(2)
(3)
DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS
(4) Reference is first made to
(5) In this figure is represented, on the one hand, a user terminal UE, which can be a mobile terminal, a smartphone, a computer with a radio interface or any other type of equipment capable of communicating with a wired or radio access network.
(6) This terminal UE comprises, on the one hand, an application module APP (or indeed several, a single module being illustrated in
(7) The module APP can consist of a purely software module (such as a mobile software application) or of a module composed of a processor associated with a memory in which are stored code instructions that may correspond to a mobile software application.
(8) The module COM comprises in particular an transmitter/receiver (radio for a mobile terminal UE), able to receive downlink data packets originating from the network and to transmit uplink data packets from the module APP to the network, as well as a processor associated with a memory able to store code instructions executable by the processor to process the data received from the network or from the module APP, for example to encapsulate the data packets according to a transmission protocol before their transmission by the transmitter/receiver or to select a network slice instantiation of a communication network for the transmission of these packets, as will be seen further on.
(9) Moreover, a mobile telecommunications network is represented here according to the principle of network slicing, here with three network slice instantiations S0,S1,S2 purely by way of nonlimiting illustration.
(10) Each network slice instantiation comprises a certain number of entities at the level of the control plane (for signaling) and of the user plane (for transmitting payload data), in particular a first so-called entity for access to the user plane of the instantiation, allowing the exchange of payload data between the instantiation and the communication module COM of the terminal UE, and a second so-called entity for access to the control plane of the instantiation, allowing the exchange of signaling messages between the instantiation and the communication module COM of the terminal UE.
(11) These two entities can take the form of a base station (such as an eNodeB), that may optionally be decomposed into a user plane part and a control plane part according to the type of network slice instantiation used. These entities thus have a communication module (typically exhibiting a radio transmitter/receiver associated with a processor and memory means capable of storing software instructions executable by this processor so as to process the data to be transmitted by the transmitter/receiver) which is able to receive requests or messages from the terminal UE and is configured to prepare and dispatch messages to the communication module COM of the terminal UE.
(12) In the particular case of the network illustrated in
(13) The method may optionally start with a prior step E10 of attachment of the terminal UE to a network slice instantiation S0, termed the default instantiation. In the course of this step E10: the communication module COM of the terminal UE transmits (step E11) an attachment request to the entity ANCP.sub.0, which forwards this request to the entity CNCP.sub.0. Subsequent to the receipt of this request, the entity CNCP.sub.0 triggers exchanges (step E12) of messages with the module COM of the terminal UE so as to identify the terminal UE, to authenticate its user and to set up security parameters (encryption, integrity control, etc.) in a manner known per se. Once the identification, the authentication and the setting up of the security parameters are validated, the entity CNCP.sub.0 can then return (step E13) a message of acknowledgment of the attachment to the module COM of the terminal UE, so as to confirm to the terminal UE its attachment to the instantiation S0.
(14) Such an acknowledgment message may contain an address or an identifier making it possible to address the terminal UE through the instantiation S0 from a network external to the operator's communication network, and in particular the Internet network. It may entail in particular an IP address or an IP prefix (here denoted IP.sub.0) when the instantiation S0 is based on the IP transmission protocol. Hereinafter the case of IP addresses will be considered, although the invention is not limited to the IP protocol alone.
(15) Insofar as the attachment to the instantiation S0 constitutes the first attachment to an instantiation of the telecommunications network, this acknowledgment message can advantageously furthermore contain a set of filtering rules R1,R2, . . . , Rn indicating to the module COM which instantiation to use for which type of uplink traffic.
(16) These rules Ri are typically constructed by the entity CNCP.sub.0, as a function of the constraints of the network operator, before being able to be transmitted to the terminal UE, by way of the entity ANCP.sub.0 in the signaling plane of the instantiation S0. Alternatively, these rules Ri can be constructed by the entity ANCP.sub.0 (that is to say at the level of the network access component of the instantiation S0), if this entity ANCP.sub.0 is entitled to influence the steering of the uplink packets toward this or that network slice instantiation and has the information to do so.
(17) These rules Ri may for example be encoded in the form of an XML file. They are intended to be evaluated with respect to the packets Pi that the module APP dispatches to the module COM for transmission to the network, and comprise one or more criterion(criteria) such as the destination IP address (or a slot of destination IP addresses) of the packets, the transport protocol, the source port, the destination port or the application protocol, inter alia.
(18) These rules Ri may optionally pertain to parameters related to the environment of the terminal UE, such as a geographical or topological area (for example expressed in the form of a list of PLMN IDs or of TAIs), the time of day, etc.
(19) These rules Ri furthermore advantageously comprise a parameter of duration of validity (or a date or time of expiry) and each one designates an instantiation S0,S1,S2 to be used for a packet corresponding to the rule.
(20) These rules Ri may be generated as a function of the user's profile (for example general-public user, company, civil security, etc.) and may thus differ from one user to another. Accordingly, the entity CNCP.sub.0 can comprise, or interact with, a user database containing the profile of each user who has subscribed to the communication network (similarly to a conventional HSS database), this profile comprising an item of information corresponding to the type of user. The entity CNCP.sub.0 is then configured to provide series of specific rules for each type of user. Alternatively, the rules R1,R2 . . . can form an integral part of a user's profile.
(21) Moreover, these rules Ri may be prioritized with respect to one another so as to allow the selection of a single instantiation when several instantiations correspond to one and the same uplink packet.
(22) By way of example, an XML file describing rules Ri may thus take the following form:
(23) TABLE-US-00001 <?xml version=“1.0” encoding=“UTF-8”?> <Slicing> <Rule Name=“R1”> <RulePriority>1</RulePriority> <ipFlow> <flowDescription> <protocol>TCP</protocol> <DestinationIpAddress> <ipV4Address>172.20.32.12</ipV4Address> <ipV4Mask>32</ipV4Mask> </DestinationIpAddress> <DestinationPortNumber> <port>1000</port> </DestinationPortNumber> </flowDescription> </ipFlow> <Slice> <SliceID>1</SliceID> </Slice> </Rule> <Rule Name=“R2”> <RulePriority>2</RulePriority> <ipFlow> <flowDescription> <protocol>TCP</protocol> <DestinationIpAddress> <ipV4Address>172.22.0.0</ipV4Address> <ipV4Mask>16</ipV4Mask> </DestinationIpAddress> </flowDescription> </ipFlow> <ValidityArea> <TAI>52291</TAI> <TAI>29956</TAI> </ValidityArea> <TimeOfDay> <TimeStart>08:00</TimeStart> <TimeStop>20:00</TimeStop> </TimeOfDay> <Slice> <SliceID>2</SliceID> </Slice> </Rule> </Slicing>
(24) In this XML file, two rules R1 and R2 are defined, rule R1 having priority over rule R2, these two rules designating two distinct instantiations to be used (identified by “SlideID”) as a function of a transmission protocol (TCP), of a slot of destination addresses, of a destination port number for rule R1, of a validity area and of a time slot of validity for rule R2.
(25) On completion of this step E10, the terminal UE is attached to the network slice instantiation S0 and can transmit and receive data for services offered via this instantiation S0. It has furthermore advantageously received a set of rules R1,R2, . . . , Rn that it has stored.
(26) The communication module COM receives thereafter (step E20) data originating from the module APP, typically in the form of a first packet Pi, to be dispatched to the mobile network.
(27) The communication module COM then undertakes the verification (step E30) of the correspondence between the packet Pi and one of the rules R1,R2, . . . , Rn stored by the terminal UE, stated otherwise if one of the filtering criteria defined in one of these rules is fulfilled by the packet Pi. In the eventuality that several rules were to correspond to the packet Pi, it is possible to take only the first of these rules into account if indeed the list of rules R1,R2, . . . , Rn is ordered, or to choose a rule expressly designated as having priority with respect to the others.
(28) If it turns out that this verification is negative, and therefore that no rule Ri corresponds to the packet Pi to be transmitted, the default instantiation S0 can be used (step E40) for the exchanges of packets between the terminal UE and the telecommunications network within the framework of the service initiated by the first packet Pi.
(29) In particular, this first packet Pi is dispatched (step E41) by the module COM, in the form of an uplink IP packet with the address IP.sub.0 as source address, to the entity ANUP.sub.0 of the instantiation S0, which forwards this packet to the entity CNUP.sub.0 so that the latter forwards it to an external network for which the packet Pi is intended.
(30) In response to this first uplink IP packet, one or more downlink IP packet(s) (i.e. originating from the external network via the entity CNUP.sub.0) may thereafter be received (step 42) via the entity ANUP.sub.0, these packets being transmitted to the terminal UE by means of the address IP.sub.0 which has been allocated to it, used as destination address of these packets, allowing a conventional routing of such packets from the external network to the entity CNUP.sub.0, and then the handling of these packets by the instantiation S0.
(31) Similar exchanges of uplink and downlink packets can then place thereafter (step 43) so as to provide the desired service to the terminal UE through the network slice instantiation S0.
(32) If it turns out that this verification is positive, and therefore that a correspondence has been found between the packet Pi and one of the stored rules Ri, the module COM uses (step E50) the instantiation Si designated by the rule Ri corresponding to the packet in order to transmit this packet.
(33) Considered here is the case where a correspondence has been found with a rule R1 designating the instantiation S1, which is not the instantiation S0 to which this terminal is attached by default.
(34) The terminal UE attaches firstly to this instantiation S1, by way of its module COM which dispatches (step E51) a request for attachment to the entity ANCP.sub.1 of this instantiation S1, by means of radio access parameters (for example provided in the rule R1, this may also be parameters provided by the terminal UE itself when the access network is common to several network slice instantiations at the level of the network core). The receipt of this attachment request triggers a phase of identification, authentication and setting up of security parameters (step E52) by means of exchanges of messages between the module COM and the entity CNCP.sub.1 of this instantiation Si and, in case of validation of the procedures, the dispatching of a message of acknowledgment of attachment of the entity CNCP.sub.1 to the module COM (step E53), similarly to steps E11,E12 and E13 described above.
(35) At this juncture, the terminal UE is attached to the network slice instantiation S1, which has allocated it an address specific to the use of this instantiation S1 (here the address IP1).
(36) The module COM of the terminal UE can then use this instantiation S1 to exchange packets with the network, by transmitting (step E54) the first packet Pi in the form of an uplink IP packet with the address IP.sub.1 as source address, to the entity ANUP.sub.1 of the instantiation S1, while receiving (step E55) in return one or more downlink IP packet(s) (i.e. originating from the external network via the entity CNUP.sub.1) using the address IP.sub.1 as destination address, such exchanges of uplink and downlink packets being able to continue thus (step E56), similarly to steps E41, E42 and E43 described above, in order to provide the desired service to the terminal UE via the instantiation S1.
(37) It is thus seen that the module COM may remain attached simultaneously to several instantiations S0,S1, . . . , and this may be the case when it has several data streams to be exchanged with the network for several applications executed by the modules(s) APP which correspond to several rules Ri.
(38) The module COM can advantageously trigger the detachment of the terminal UE from one of the instantiations to which it is attached, typically when it does not exchange any payload data packet with the user plane of this instantiation (that is to say that it does not receive from the module APP any uplink packet to be dispatched to this instantiation and that it does not receive any downlink packet intended for the module APP from this instantiation) during a determined time span (for example of the order of 10 min). In this case, the module COM dispatches a detachment request to the entity ANCP.sub.i of the instantiation Si concerned, which forwards this request to the entity CNCP.sub.i so that the latter undertakes, in a manner known per se, the detachment of the terminal UE, and returns a detachment acknowledgment message to the module COM on completion of this procedure. The terminal UE thus remains attached only to the instantiations Si of the network that it actually uses.
(39) According to one embodiment, once attached to the default instantiation S0, the terminal UE remains attached to this instantiation S0, even were it to be used hardly or not at all for the transmission of payload data packets, so as to allow the dispatch at any moment of signaling messages of the entity CNCP.sub.0 to the module COM, and in particular of a message of updating of the correspondence rules Ri, containing new rules Ri to be stored in the terminal UE or instructions for modifying the rules Ri already stored previously, or indeed for deleting certain rules Ri that have become obsolete.
(40) According to another embodiment, even if the terminal UE were to be attached to a default instantiation S0, it can nevertheless detach itself from this instantiation S0 (for example by means of the detachment procedure described above, triggered by the module COM in the absence of receipt of any payload data packet originating from or destined for this instantiation S0 during a determined time span). In the latter case, on completion of an expiry time of the set of rules Ri, the module COM may advantageously again request attachment to the instantiation S0, according to the procedure of step E10, so as to obtain updated rules Ri.
(41) Reference is now made to
(42) Initially, the module COM receives a data packet Pi from the module APP (step E20 already discussed previously).
(43) Subsequent to the receipt of this packet, the module COM can undertake the verification to check whether this packet Pi belongs to a new stream (step E22). This verification can be carried out by the consultation by the module COM of a stored table of active streams, storing for each active stream parameters such as the source and destination addresses and port numbers used, as well as protocol used, so as to compare these stored parameters with the corresponding parameters of the packet Pi.
(44) If this verification is not conclusive, and if therefore the packet Pi is not the first packet of a new data stream, the instantiation Sk to be used to transmit this packet Pi is defined as being the instantiation Si, already used to transmit the previous packets Pi-1 of the same stream, which instantiation is then used again (step E24) to transmit this packet Pi (i.e. by dispatching this packet Pi to the entity ANUP.sub.i of this instantiation Si).
(45) If this verification is conclusive, and if therefore the packet Pi is indeed a first packet of a new data stream, the module COM can then advantageously verify (step E26) whether the terminal UE has stored valid correspondence rules Ri, that is to say which have not yet expired. In the case where the expiry of a rule Ri automatically brings about its erasure from the memory where it is stored, this verification consists simply in verifying the presence, or otherwise, of a rule Ri in memory of the terminal UE.
(46) If the terminal UE does not have any valid correspondence rule Ri in memory, for example because it has not been attached beforehand to a default instantiation S0, the module COM can trigger the attachment of the terminal UE to the default instantiation S0 (for example by means of a conventional network search scheme), similarly to step E10 described above, so as to obtain from the entity CNCP.sub.0 up-to-date correspondence rules Ri (step E28).
(47) If the terminal UE has valid correspondence rules Ri in memory, or else after having obtained them as indicated previously, the module COM can then undertake the verification (step E30) of a correspondence between the packet Pi and one of these correspondence rules. Accordingly, an iterative scheme can be employed to verify the correspondence between the packet Pi and the succession of stored rules R1,R2, . . . , Rn until it finds a possible correspondence.
(48) If no correspondence is found by the module COM, the instantiation Sk to be used to dispatch the packet Pi is defined as being the default instantiation S0 (step E31′). If a correspondence is found with a rule Rj by the module COM, the instantiation Sk to be used to dispatch the packet Pi is defined as being the instantiation Sj designated by this rule Rj (step E33′).
(49) At this juncture, the module COM can verify (step E35′) whether the terminal UE is already attached to the instantiation Sk designated for the dispatching of the packet Pi, in particular whether this instantiation has been designated by a rule Rk corresponding to the packet Pi (this may be the case also if the attachment of the terminal UE to a default instantiation S0 has not been undertaken beforehand).
(50) If such is the case, and if therefore the terminal UE has already obtained an address IPk for this instantiation Sk, the packet Pi can be dispatched directly (step E40′) to the entity ANUPk of this instantiation Sk, similarly to step E41 described above.
(51) If such is not the case, the module COM triggers the attachment of the terminal UE to this instantiation Sk before dispatching the packet Pi via this instantiation Sk (step E50′), similarly to step E50 described above.
(52) Of course, the invention is not limited to the exemplary embodiments hereinabove described and represented, on the basis of which it will be possible to provide for other modes and other embodiments, without however departing from the scope of the invention.
(53) Thus, the IP protocol has been used in the embodiments described above, but any other network routing protocol can be employed.
(54) Moreover, although
(55) Moreover, although network slice instantiations with user plane and control plane separated at the access network level have been described above, the invention also applies to network slice instantiations in which these two planes are merged at the access network level, in which case the entities ANCP.sub.0 and ANUP.sub.0 may form just a single same entity, that can typically be implemented in the form of a base station or of an eNodeB.
(56) As regards the network slice instantiations comprising a distinct network core component, the entity CNCP.sub.0 in charge of the control plane of this network core can be implemented by means of a first network item of equipment having identical or similar functionalities to those of a mobility management entity (MME in English) or control of the policy and charging rules (PCRF in English) according to the LTE standard (4G), or indeed both these entities combined, while the entity CNUP.sub.0 in charge of the user plane of this network core can be implemented by means of a second network item of equipment having identical or similar functionalities to those of a gateway S-GW according to this same LTE standard (4G).
(57) Moreover, the dispatching of correspondence rules Ri was described above as being able to be performed during the attachment of the terminal UE to a default network slice instantiation S0 or on request emanating from the terminal UE subsequent to the verification of the expiry of the stored rules, this verification being able to be triggered by the receipt of an uplink packet from the module APP. The dispatching of these rules can also be done spontaneously by the entity CNCP.sub.0 of this default instantiation S0, provided that the terminal UE is actually attached to this default instantiation S0, for example subsequent to an updating of these rules in the network.
(58) Furthermore, although
(59) An exemplary embodiment of the present remedies the drawbacks of the prior art. Although the present disclosure has been described with reference to one or more examples, workers skilled in the art will recognize that changes may be made in form and detail without departing from the scope of the disclosure and/or the appended claims.