Method and apparatus for selecting an access and mobility management function in a mobile communication system

ABSTRACT

The present disclosure relates to a communication technique of fusing a 5G communication system for supporting higher data transmission rate beyond a 4G system with an IoT technology and a system thereof, and provides an intelligent service based on the 5G communication technology and the IoT related technology. A method of a terminal in a wireless communication system includes receiving, from an AMF, a first message including first information for identifying the AMF, the first information being assigned upon a successful registration to a first access; determining whether a second access is located in a same PLMN of the first access; and transmitting, to an access network entity of the second access, a second message requesting registration to the second access and including second information for identifying the AMF, in case that the second access is located in the same PLMN of the first access.

PRIORITY

The present application is a continuation of U.S. application Ser. No.15/866,091, which was filed in the U.S. Patent and Trademark Office onJan. 9, 2018, and claims priority under 35 U.S.C. § 119(a) to KoreanPatent Application Serial No. 10-2017-0002945, which was filed in theKorean Intellectual Property Office on Jan. 9, 2017, the entiredisclosure of each of which is incorporated herein by reference.

BACKGROUND 1. Field of the Disclosure

The present disclosure relates generally to an apparatus and method forselecting an access and mobility management function (AMF).

2. Description of the Related Art

To meet an increasing demand for radio data traffic, efforts have beenmade to develop an improved 5th Generation (5G) communication system ora pre-5G communication system. The 5G communication system or the pre-5Gcommunication system may be referred to as a beyond 4G networkcommunication system or a post LTE system.

To achieve a high data transmission rate, the 5G communication system isconsidered to be implemented in a very high frequency (mmWave) band(e.g., 60 GHz band).

To relieve path loss of a radio wave and increase a transfer distance ofthe radio wave in the very high frequency band, in the 5G communicationsystem, beamforming, massive multiple input, multiple output (mMIMO),full dimensional MIMO (FD-MIMO), array antennas, analog beam-forming,and large scale antenna technologies have been discussed.

Further, to improve a network of the 5G communication system,technologies such as an evolved small cell, an advanced small cell, acloud radio access network (cloud RAN), an ultra-dense network, a deviceto device communication (D2D), a wireless backhaul, a moving network,cooperative communication, coordinated multi-points (CoMPs), andreception interference cancellation have been developed.

In addition, in the 5G system, hybrid frequency shift keying (FSK) andquadrature amplitude modulation (QAM) (FQAM) and sliding windowsuperposition coding (SWSC), which are advanced coding modulation (ACM)schemes, and a filter bank multi carrier (FBMC), a non-orthogonalmultiple access (NOMA), and a sparse code multiple access (SCMA), whichare advanced access technologies, etc., have been developed.

Additionally, the Internet has evolved from a human-centered connectionnetwork through which a human being generates and consumes informationto an Internet of things (IoT) network that transmits/receivesinformation between distributed components, i.e., things, and processesthe information.

Internet of everything (IoE) technology in which the big data processingtechnology, etc., is combined with the IoT technology by connection witha cloud server, etc., has also emerged.

To implement the IoT, technology elements, such as a sensing technology,wired and wireless communication and network infrastructure, a serviceinterface technology, and a security technology, have been required.Recently, technologies such as a sensor network, machine to machine(M2M), and machine type communication (MTC) for connecting betweenthings have been researched.

In an IoT environment, an intelligent Internet technology (IT) servicethat creates a new value in human life by collecting and analyzing datagenerated in the connected things may be provided. The IoT may apply forfields, such as a smart home, a smart building, a smart city, a smartcar or a connected car, a smart grid, health care, smart appliances, andan advanced healthcare service, by fusing and combining existing IT withvarious industries.

Therefore, various attempts have been made to apply the 5G communicationsystem to the IoT network. For example, 5G communication technologies,such as the sensor network, M2M, and MTC, have been implemented bydifferent techniques, such as beamforming, MIMO, and an array antenna.

The application of a cloud RAN as the big data processing technologydescribed above may also be considered as an example of the fusing of 5Gcommunication technology with IoT technology.

With the development of 5G communication technology, a method isrequired for providing an efficient service in the 5G mobilecommunication environment by allowing a user to quickly find networkproviding services that are desired by the user equipment, when the userequipment initially accesses the 5G network.

SUMMARY

Accordingly, the present disclosure is made to address at least theproblems and/or disadvantages described above and to provide at leastthe advantages described below.

An aspect of the present disclosure is to provide a method and anapparatus for finding a network node providing services desired by auser equipment (UE) in a 5G mobile communication system, when the UEinitially accesses a 5G network. To this end, we propose a method formanaging network deployment information and a method for transmitting aninitial access request message with a detailed proposal technology.

In addition, even when the service provided to the user equipment ismodified after the initial access, a network node providing thecorresponding service may be found in a similar manner.

Embodiments of the present disclosure are directed to the provision of amethod for separately managing a mobility restriction area for eachnetwork slice used by a terminal, in allocating and managing themobility restriction area for a service control according to mobility ofthe terminal. A mobile communication service provider may configuredifferent network slices for each service provided to the terminal, andmay provide different restriction areas for each network slice. Inaddition, an operation of requesting, by the terminal, a data service inconsideration of the mobility restriction areas allocated to eachnetwork slice or considering the mobility restriction area when asession for the corresponding network slice is established in theterminal in a core network of the 5G system is proposed. In addition, anoperation of locating a network slice capable of establishing a sessionat a current location of the terminal based on the mobility restrictionarea and establishing the session when the terminal is using multiplenetwork slices is proposed.

Embodiments of the present disclosure are directed to the provision of amethod for selecting an appropriate AMF to solve problems of makingrouting of NAS signaling unnecessarily complicated when a selection ofthe AMF is wrong according a relationship between a PLMN serving N3IWFin a non-3 gpp access and a PLMN that a terminal accesses in a 3 gppaccess, as a method for effectively selecting an AMF for an accessaccessing a 5G network later when the terminal access to the 5G networkthrough another access in a case in which the UE capable of the non-3gpp access and the 3 gpp access accesses the 5G network through oneaccess.

In addition, according to the existing LTE network configuration, sincethe base station selects an MME using GUMMEI as routing informationwhich is an ID of the MME allocating GUTI to a terminal while the basestation selects the MME and the MME allocating the GUTI shouldcontinuously have context information of the corresponding terminal forthe selection, the selection of the MME increases stickiness orpersistence with information of UE such that the problem in which it isdifficult to manage a network such as network update in the MME or thelike. Therefore, the present disclosure introduces a method for reducingthe stickiness or persistence with the information of the UE.

Objects of the present disclosure are not limited to the above-mentionedobjects. That is, other objects that are not mentioned may be obviouslyunderstood by those skilled in the art to which the present disclosurepertains from the following description.

In accordance with an aspect of the present disclosure, a method isprovided for a terminal in a wireless communication system. The methodincludes receiving, from an access and mobility management function(AMF), a first message including first information for identifying theAMF, the first information being assigned upon a successful registrationto a first access; determining whether a second access is located in asame public land mobile network (PLMN) of the first access; andtransmitting, to an access network entity of the second access, a secondmessage requesting registration to the second access and includingsecond information for identifying the AMF, in case that the secondaccess is located in the same PLMN of the first access. The secondinformation includes at least a part of the first information and isused by the access network entity of the second access to select theAMF.

In accordance with another aspect of the present disclosure, a terminalis provided for use in a wireless communication system. The terminalincludes a transceiver; and a controller coupled with the transceiverand configured to

-   -   receive, from an access and mobility management function (AMF),        a first message including first information for identifying the        AMF, the first information being assigned upon a successful        registration to a first access, determine whether a second        access is located in a same public land mobile network (PLMN) of        the first access, and transmit, to an access network entity of        the second access, a second message requesting registration to        the second access and including second information for        identifying the AMF, in case that the second access is located        in the same PLMN of the first access. The second information        includes at least a part of the first information and is used by        the access network entity of the second access to select the        AMF.

In accordance with another aspect of the present disclosure, a method isprovided for an access network entity of a first access in a wirelesscommunication system. The method includes receiving, from a terminal, amessage requesting registration to the first access and including firstinformation for identifying an access and mobility management function(AMF), in case that the first access is located in the same PLMN of asecond access; and selecting the AMF based on the first information. Thefirst information includes at least a part of the second information.The second information for identifying the AMF is received by theterminal from the AMF, the second information being assigned upon asuccessful registration to the second access.

In accordance with another aspect of the present disclosure, an accessnetwork entity of a first access is provided for use in a wirelesscommunication system. The access network entity includes a transceiver;and a controller coupled with the transceiver and configured to receive,from a terminal, a message requesting registration to the first accessand including first information for identifying an access and mobilitymanagement function (AMF), in case that the first access is located inthe same PLMN of a second access; and select the AMF based on the firstinformation. The first information includes at least a part of thesecond information. The second information for identifying the AMF isreceived by the terminal from the AMF, the second information beingassigned upon a successful registration to the second access.

BRIEF DESCRIPTION OF THE DRAWINGS

The above and other aspects, features, and advantages of certainembodiments of the present disclosure will be more apparent from thefollowing detailed description taken in conjunction with theaccompanying drawings, in which:

FIG. 1 illustrates a system including a terminal, a RAN, and a corenetwork (CN) node, according to an embodiment of the present disclosure;

FIG. 2 illustrates a CN node obtaining information, according to anembodiment of the present disclosure;

FIG. 3 illustrates an information exchange between common core networkfunctions (CCNFs), according to an embodiment of the present disclosure;

FIG. 4 illustrates a method for CCNFs to register information in acentral server, according to an embodiment of the present disclosure;

FIG. 5 illustrates a method for rerouting a message transmitted by aterminal through a RAN, according to an embodiment of the presentdisclosure;

FIG. 6 illustrates a method for rerouting a message transmitted by aterminal to a CCNF and transmitting a response to a RAN, according to anembodiment of the present disclosure;

FIG. 7 illustrates a method for rerouting a message transmitted by aterminal to a CCNF and transmitting a response to an original CCNF,according to an embodiment of the present disclosure;

FIG. 8 is a signal flow diagram illustrating a method of rerouting aterminal initial access request message according to an embodiment ofthe present disclosure;

FIG. 9 is a signal flow diagram illustrating a method of a core networknode information registration, a selection, and a discovery, accordingto an embodiment of the present disclosure;

FIG. 10 is a signal flow diagram illustrating a method of rerouting anon-access stratum (NAS) message according to an embodiment of thepresent disclosure;

FIG. 11 illustrates a cellular network structure using a common AMF,wherein a public land mobile network (PLMN) of a 3rd GenerationPartnership Project (3GPP) access and a PLMN of a non-3GPP interworkingfunction (N3IWF) are the same, when a terminal is connected through a3GPP access and a non-3GPP access, according to an embodiment of thepresent disclosure;

FIG. 12 illustrates a cellular network structure using different AMFs,wherein a PLMN of a 3GPP access and a PLMN of N3IWF are different, whena terminal is connected through a 3GPP access and a non-3GPP access,according to an embodiment of the present disclosure;

FIG. 13 is a signal flow diagram illustrating a method of selecting anAMF, when a terminal connected to a 3GPP access accesses a 5G networkthrough a non-3GPP access, according to an embodiment of the presentdisclosure;

FIG. 14 is a signal flow diagram illustrating a method of selecting anAMF, when a terminal connected to a 3GPP access accesses a 5G networkthrough a non-3GPP access, according to an embodiment of the presentdisclosure;

FIG. 15 is a signal flow diagram illustrating a method of selecting anAMF, when a terminal connected to a non-3GPP access accesses a 5Gnetwork through a 3GPP access, according to an embodiment of the presentdisclosure;

FIG. 16 is a signal flow diagram illustrating a method of selecting anAMF, when a terminal connected to a non-3GPP access accesses a 5Gnetwork through a 3GPP access, according to an embodiment of the presentdisclosure;

FIG. 17 illustrates a network structure between a RAN node and AMFs,according to an embodiment of the present disclosure;

FIG. 18 is a signal flow diagram illustrating a method of selecting, bya RAN node, an appropriate AMF, when a terminal transmits an initial NASmessage, according to an embodiment of the present disclosure;

FIG. 19 is a signal flow diagram illustrating a method of selecting, bya session management function (SMF), an AMF to transmit paging to aterminal in an IDLE mode, according to an embodiment of the presentdisclosure;

FIG. 20 illustrates a terminal according to an embodiment of the presentdisclosure;

FIG. 21 illustrates a base station according to an embodiment of thepresent disclosure; and

FIG. 22 illustrates an AMF according to an embodiment of the presentdisclosure.

DETAILED DESCRIPTION

Hereinafter, various embodiments of the present disclosure will bedescribed in detail with reference to the accompanying drawings.However, the present disclosure is not limited to the embodimentsdisclosed herein but may be implemented in various forms.

Like reference numerals may denote like elements in the accompanyingdrawings. Further, detailed descriptions related to well-known functionsor configurations will be omitted to avoid obscuring the subject matterof the present disclosure.

In describing embodiments of the present disclosure, an advanced evolveduniversal terrestrial radio access (E-UTRA) (or referred to as long termevolution-Advanced (LTE-A)) system supporting carrier aggregation (CA)will be mainly described. However, the present disclosure may be appliedto other communication systems having similar technical backgrounds andchannel forms without departing from the scope of the presentdisclosure, which may be determined by those skilled in the art to whichthe present disclosure pertains. For example, the present disclosure mayalso be applied to a multicarrier high speed packet access (HSPA) systemsupplying carrier aggregation.

In describing the exemplary embodiments of the present disclosure in thepresent specification, a description of technical contents which arewell known to the art to which the present disclosure belongs and arenot directly connected with the present disclosure will be omitted. Thisis to more clearly transfer a gist of the present disclosure by omittingan unnecessary description.

Some components may be exaggerated, omitted, or schematicallyillustrated in the accompanying drawings. Further, the size of eachcomponent does not exactly reflect its real size. In each drawing, thesame or corresponding components are denoted by the same referencenumerals.

Various advantages and features of the present disclosure and methodsaccomplishing the same will become apparent from the following detaileddescription of embodiments with reference to the accompanying drawings.However, the present disclosure is not limited to the embodimentsdisclosed herein but will be implemented in various forms. Theembodiments have made disclosure of the present disclosure complete andare provided so that those skilled in the art can easily understand thescope of the present disclosure. Therefore, the present disclosure willbe defined by the scope of the appended claims. Like reference numeralsthroughout the description denote like elements.

Each block or signal of the flow charts and combinations of the flowcharts may be performed by computer program instructions. Because thesecomputer program instructions may be mounted in processors for a generalcomputer, a special computer, or other programmable data processingapparatuses, these instructions executed by the processors for thecomputer or the other programmable data processing apparatuses createdevices performing the functions described in the flow charts.

Because computer program instructions may also be stored in a computerusable or computer readable memory of a computer or other programmabledata processing apparatuses in order to implement the functions in aspecific scheme, the computer program instructions stored in thecomputer usable or computer readable memory may also producemanufacturing articles including instructions for performing thefunctions described in the flow charts.

Because the computer program instructions may also be mounted on thecomputer or the other programmable data processing apparatuses,instructions performing a series of operation steps on the computer orthe other programmable data processing apparatuses to create processesexecuted by the computer to thereby execute the computer or the otherprogrammable data processing apparatuses may also provide steps forperforming the functions described in the flow charts.

In addition, each block may indicate some of modules, segments, or codesincluding one or more executable instructions for executing a specificlogical function(s). Further, functions mentioned in the blocks occurregardless of a sequence in some alternative embodiments. For example,two blocks that are contiguously illustrated may be simultaneouslyperformed in fact or be performed in a reverse sequence depending oncorresponding functions.

Herein, the term “unit” indicates software or hardware components, suchas a field-programmable gate array (FPGA) and an application-specificintegrated circuit (ASIC). However, the meaning of the “unit” is notlimited to software or hardware. For example, a “unit” may be configuredto be in a storage medium that may be addressed and may also beconfigured to be reproduced one or more processor. Accordingly, a “unit”may include components such as software components, object orientedsoftware components, class components, and task components andprocessors, functions, attributes, procedures, subroutines, segments ofprogram code, drivers, firmware, microcode, circuit, data, database,data structures, tables, arrays, and variables. The functions providedin the components and the “units” may be combined with a smaller numberof components, and the “units” or may be further separated intoadditional components and “units”. In addition, the components and the“units” may also be implemented to reproduce one or more centralprocessing units (CPUs) within a device or a security multimedia card.

First Embodiment

In describing a first embodiment, a slice, a service, a network slice, anetwork service, an application slice, an application service, and thelike may be used in combination.

FIG. 1 illustrates a mobile communication network and an initial accessstructure of user equipment. A RAN 102 corresponding to a first node ofa wireless section may have a connection with a node of a CN 105,regardless of whether a terminal (or UE) 101 is connected or not.

Referring to FIG. 1 as an example, the RAN 102 is connected to a commoncore network function(s) (CCNF) 1 and a CCNF2, respectively. The CCNF isa representative network function of a core network (CN) connected tothe RAN, and may be one network function or a set of several networkfunctions. If the terminal 101 requests an initial access to a mobilecommunication network (e.g., an initial attach request or an initialaccess request), the RAN 102 receiving the corresponding requesttransmits the corresponding message to the appropriate CCNF. Referringto FIG. 1 as an example, the RAN 102 receiving an initial access requestmessage from the terminal 101 transmits the corresponding message to theCCNF1, and a connection between the UE 101 and the CCNF1 is setup by anauthorization procedure. A detailed procedure will be described withreference to FIG. 8.

The CCNF receiving the initial access request message of the terminal101 identifies whether the corresponding CCNF can provide a service thatthe UE wants. For this purpose, three information is used, which isillustrated in FIG. 2. The CCNF identifies and verifies whether thecorresponding CCNF is a node capable of providing a service that theterminal wants based on UE request information included in the initialaccess request message of the terminal 101, UE subscription informationstored in a database 210 of the mobile communication network, and policy(e.g., local policy, or operator policy, or PLMN policy) information ofa mobile communication network operator. The provider policy informationmay be stored and used by the CCNF, or may be received from anothernetwork function (e.g., a policy control function 212) that stores auser policy. The UE request information may include a network slice(service) type that a user wants, an application slice (service) type, aservice provider providing a slice (service), priority of each slice(service), and location information of a user. If there are severalservices that a user wants, the UE request information may include onevalue representing the services. This representative value may be storedin the terminal 101, the RAN 102, and the core network 105, so that theRAN 102 and the core network 105 may interpret which services the onevalue transmitted by the terminal 101 corresponds to. This one value maybe preconfigured in the terminal 101, or the terminal 101 may receiveand use the corresponding information after connecting to the network.At this time, the user request information may be information that isexplicitly input by the user (e.g., a service that a user wants) and maybe automatically included according to a protocol design (e.g., trackingarea, cell id information, etc., indicating location information of auser). The UE subscription information includes at least one of anetwork slice (service) type that may be used by the terminal 101, anapplication slice (service) type that the terminal 101 may use, a slice(service) provider providing a service, a slice (service) type that theterminal 101 uses, an area (region) where each slice (service) type maybe provided, an area (region) where each slice (service) type should notbe provided, and priority of each slice (service). Based on these typesof information, the CCNF determines a final service to be provided tothe terminal 101. The final slice (service) to be provided to theterminal 101 confirmed by the network may be the same as or differentfrom the terminal request slice (service) included in the initial accessrequest message transmitted by the terminal 101.

When the CCNF receiving the initial access request message verifies thatit is an appropriate node for providing the service to the terminal 101,CCNF transmits an initial access request acknowledgment (e.g., aninitial attach response or an initial access response) message to theterminal 101. The initial access request acknowledgment message mayinclude information indicating the final service information confirmedby the network to be provided to the terminal 101. The terminal 101receiving the corresponding message identifies that the network accessrequest of the terminal 101 is processed well and identifies whatservice is available in the future. If the CCNF is not appropriate, itshould find another suitable CCNF that is capable of providing a serviceto the terminal 101. There are two methods for finding other CCNFs, andFIGS. 3 and 4 illustrate each method.

In order for the CCNF to find other CCNFs, the CCNF should know whatservices other CCNFs provide.

FIG. 3 illustrates a method in which several CCNFs that exist in anetwork, and illustrates a method for knowing function informationprovided by each CCNF by allowing each CCNF to directly exchangeinformation with each other. In this case, the connection between therespective CCNFs may be a direct connection or an indirect connectionvia another network function. If a function that a specific CCNFprovides is changed, the change should be informed to the other CCNFs.For example, if the CCNF2 provides services 1 and 2 and thenadditionally provides service 3, this information should be informed toeach of neighboring CCNF1, CCNF3, and CCNF4 that are connected to theCCNF2. The CCNFs receiving the corresponding information update theneighboring CCNF information that they manage. To inform theinformation, a method for transmitting a message and anevent-subscription method are provided. For example, if the CCNF1receiving the initial access message of the user terminal determinesthat it is not able to support the final service to be provided to theterminal 101, based on the verification of FIG. 2, the CCNF1 maydetermine that the CCNF2 can support the corresponding final servicebased on other CCNF information that the CCNF1 manages.

On the other hand, FIG. 4 illustrates a method for registering eachprovision function to a central server, not a method in which each CCNFdirectly exchanges information. For example, the CCNF1, CCNF2, CCNF3,and CCNF4 each register their provision functions to the central server(i.e., a network function repository (NRF) 450). With this method, theCCNFs do not need to know the functions of the neighboring CCNFs.Accordingly, when the CCNF1 receives the initial access message of theuser terminal 101 and determines that it is not capable of supportingthe final service to be provided to the terminal 101, through theverification process of FIG. 2, it asks the NRF 450 for a CCNF suitableto support the corresponding final service. Based on the information ofthe registered CCNF, the NRF 450 determines that CCNF2 is a suitablenode and provides the CCNF1 with the information of the CCNF2.

Through the process so far, the appropriate CCNF capable of providingthe final service is found, and the CCNF1 should transmit the initialaccess request message received from the terminal to CCNF2. There arethree possible transmission methods, and each method is illustrated inFIGS. 5, 6, and 7.

FIG. 5 illustrates a method for transmitting a request message of theterminal 101 from the CCNF1 to the CCNF2 through the RAN 102. The CCNF1sends a redirection request message 530 to the RAN 102. The redirectionrequest message includes the information of the CCNF2 and may include aninitial request message (e.g., an initial attach request) received fromthe terminal 101. The RAN 102 receiving the corresponding redirectionmessage 530 transmits the initial request message of the terminal to theCCNF2 using the CCNF2 information. The CCNF2 receiving the correspondingmessage processes the received message and transmits a response message(e.g., an initial attach response) 540 to the terminal 101.

FIG. 6 illustrates a method for directly transmitting a redirectionrequest message from the CCNF1 to the CCNF2. The CCNF1 transmits theredirection request message 630 to the CCNF2. The redirection messagemay include terminating point information (e.g., an NG2 signaling Id) ofthe RAN 102 connected to the terminal 101, and the initial requestmessage received from the terminal 101. The CCNF2 receiving thecorresponding message processes the message, and transmits a responsemessage 640 to the terminal 101 at the corresponding point using theterminating point information of the RAN 102.

Similar to FIG. 6, FIG. 7 illustrates a method for directly transmittinga message from the CCNF1 to the CCNF2. The difference from FIG. 6 isthat when the CCNF2 transmits the response message 740, it transmits theresponse message 740 via the CCNF1. The redirection request message 730transmitted from the CCNF1 to the CCNF2 may include the initial requestmessage received from the terminal 101. The CCNF2 receiving thecorresponding message processes the message and transmits the responsemessage 740 to the CCNF1. At this time, the CCNF2 may include theterminating point information to be communicated with the RAN 102 in thefuture. The CCNF1 receiving the response message 740 transmits thecorresponding message to the RAN 102. The CCNF2 may transmit theterminating point information 750 to communicate with the RAN 102 in thefuture. The RAN 102 transmits the response message 740 to the terminal101 and may establishes a connection 750 with the CCNF2 using the CCNF2terminating point information.

That is, the CCNF1 transmits the message to the CCNF2 using one of thethree methods shown in FIGS. 5, 6, and 7.

FIG. 8 illustrates the overall procedure of the embodiment described sofar. When the user terminal 801 has a minimum access to a network, itsends an initial access request message in step 810. The initial accessrequest message may include information such as a service type (NSSAI)desired by the terminal 801. A RAN 802 receiving the message selects theappropriate CCNF1 based on the NSSAI information and transmits themessage in step 820. For example, this process is described above withreference to FIG. 1. In step 830, the CCNF1 authenticates whether theterminal 801 may access the corresponding PLMN. If authentication issuccessful, the network authenticates which service is available to theterminal. The final providing service is determined based on serviceinformation, subscription information, and provider policy informationrequested by the terminal 801. For example, this process is describedabove with reference to FIG. 2. The CCNF1 then determines if it mayprovide the final providing service. If CCNF1 determines that is mayprovide the final providing service, the CCNF1 transmits the initialattach response to the RAN and skips steps 850 to 870. The initialattach response may include the Accepted NSSAI, which identifies thefinal service information. However, if the CCNF1 determines that is anode that cannot provide the final provision service (840), the CCNF1finds a CCNF capable of providing the final provision service (850). Forexample, the finding method may be determined based on the informationthat the CCNF1 already has (as illustrated in FIG. 3), or may bedetermined by a method for using an NRF (as illustrated in FIG. 4). Ifthe method of FIG. 3 is used, because the CCNF1 determines a capableCCNF itself, there is no additional message flow. However, if the methodof FIG. 4 is used, a message flow as illustrated in FIG. 9 may beperformed.

Referring to FIG. 9, each CCNF registers its service provisioncapability in an NRF 905, which is the central server, in steps 910,913, and 915. The NRF 905 stores and manages a profile of each CCNF. Ifthe CCNF has changed its capability, it transmits an update message tothe NRF 905 to keep the capability information managed by the NRF 905 upto date. In step 920, the CCNF1 transmits a network function (NF)request message to the NRF 905. The NF request message may include therequired function of the CCNF that the CCNF1 wants to find. Based on theCCNF profile information, the NRF 905 finds the CCNF that the CCNF1wants (e.g., CCNF2), and transmits the information included in the NFresponse in step 950. The NF information may include an address of thecorresponding node (e.g., an Internet protocol (IP) address or UniformResource Locator (URL) information), an address of a node group of thesame type having the corresponding capability (e.g., an IP address or aURL information representing the group), and a group ID. The CCNF1 maystore the information transmitted to the NRF 905 for a certain periodand reuse the stored information until the value of the correspondinginformation has expired. That is, when the same type of node informationhaving the same capability is required in the near future, the storedinformation may be used without asking the NRF 905 again. Steps 930,940, 960, and 970 may be optionally performed. In step 930, for the NRF905 may confirm that the CCNF2 may provide the corresponding service,before the NRF 905 responds to the CCNF1 in step 950. The messageincluding the capability to request the message of the step 930 may betransmitted. Alternatively, the NRF 905 may ask what capability thereis, not including the requesting capability. In response to the query,the CCNF2 may include its own capability information in step 940, or maytransmit the presence or absence of the capability requested in step930. In step 960, the NRF 905 informs that the CCNF1 may be connected toCCNF2. In step 960, the CCNF1 information and a token for authenticationmay be included. Additionally, the token information may be included instep 950. When accessing the CCNF2 in the future, the CCNF1 may transmita message, including the corresponding token. Thereafter, the CCNF2 is anode at which the NRF 905 authenticates the CCNF1 by comparing with thetoken information received in advance, and may perform communication byauthenticating a node to which a service may be provided.

Referring again to FIG. 8, the message redirection corresponding to step860 may be performed by the methods described in FIGS. 5, 6, and 7.

FIG. 10 illustrates a detailed message flow. Group A of FIG. 10 is areroute method through the RAN described in FIG. 5. A value included instep 1011 of Group A of FIG. 10 includes information of the CCNF2, whichis a node to which a RAN 1002 should reroute the message. The CCNF2information may be an address or an id of the CCNF2, or an address or anID of the group to which the CCNF2 belongs. Based on this information,the RAN 1002 finds the CCNF2 connected to the RAN 1002 and reroutes themessage. In addition, if an NSSAI received from a terminal is changed instep 830 of FIG. 8, the changed NSSAI may be included. If step 830 ofFIG. 8 is performed, security information indicating that thecorresponding terminal is authenticated may also be included in step1011. In addition, the terminal information and the subscriberinformation may be included. The RAN 1002 transmits a message to theCCNF2 in step 1012. If security information is included, the CCNF2 mayconfirm that the corresponding terminal has already been authenticatedand may skip performing additional authentication. The CCNF2 receivesand processes the terminal request message in step 1012, and transmits,to the RAN 1002, the message transmitted to the RAN including the NASresponse in step 1013, if necessary. For example, step 1013 correspondsto step 870 of FIG. 8. In FIG. 8, the NAS response may be the initialattach response. Group B of FIG. 10 corresponds to FIG. 6. In step 1021,the CCNF1 directly transmits a reroute message to the CCNF2. The reroutemessage of step 1021 may include the terminating point information ofthe RAN 1002. In addition, if the NSSAI received from the terminal ischanged in step 830 of FIG. 8, the changed NSSAI may be included. Forexample, step 1021 corresponds to step 870 of FIG. 8. Group C of FIG. 10corresponds to FIG. 7. If the NSSAI received from the terminal ischanged in step 830 of FIG. 8, the changed NSSAI may be included in step1031. The CCNF2 receiving the reroute message transmits a response tothe CCNF1 in step 1032, and the CCNF1 forwards the response to the RANin step 1033. In group C, step 870 of FIG. 8 does not occur.

Upon the terminal initial access, the RAN 1002 determines an appropriateCCNF based on the information provided by the terminal. If the RAN 1002finds the wrong CCNF, it means that the routing information stored inthe RAN 1002 is wrong and there is a need to update the correspondinginformation. The information for updating the RAN information may beincluded in step 1011 of FIG. 10. Alternatively, information forupdating the RAN information may be included in step 1013 or step 1022of FIG. 10. Alternatively, information for updating the RAN informationmay be transmitted to the RAN 1002 in steps 1032 and 1033.Alternatively, the CCNF may be transmitted to the RAN 1002 using theflow described above and the separate message. The correspondinginformation may be the NSSAI, which is the information that the terminalrequests, and an ID mapping of the CCNF supporting the correspondingNSSAI, or mapping information of the NSSAI and the CCNF group. The RAN1002 receiving the corresponding information updates the managed routingtable accordingly.

A UE connects to a RAN to access a device for performing a mobilitymanagement function of a 5G core network apparatus. Herein, this devicemay be replaced with a CCNF, which performs mobility management andterminal authentication, i.e., performs an access and mobilitymanagement function (AMF). AMF may refer to a function or an apparatusthat is in charge of both the access of the RAN and the mobilitymanagement of the terminal. The CCNF is a comprehensive concept ofnetwork function or apparatus that includes AMF. The AMF (or the CCNFincluding the AMF) routes a session related message to the UE using asession management function (SMF). The CCNF is connected to the SMF, theSMF is connected to a user plane function (UPF) to allocate a user planeresource be provided to the UE, establishes a tunnel for transmittingdata between the base station and the UPF. An AMF may refer to a corenetwork apparatus providing the mobility management for the UE, i.e., anapparatus receiving the NAS message of the CCNF or the terminal having adifferent name. Herein a network slice instance is a service that anetwork including the CCNF, the SMF, and the UPF provides. For example,if a mobile communication service provider supports broadbandcommunications services, it defines network service satisfying therequirements for broadband communications and configures the networkservice as the network slice instance to provide a service. When amobile communication service provider supports an IoT service, itdefines the network service satisfying the requirements for the IoTservice and provides the network service as the network slice instancefor IoT.

The 4G means 4G mobile communication and includes a radio access networktechnology called the LTE and a core network technology called anevolved packet core (EPC). The 5G means 5th generation mobilecommunication. The 5G radio access network technology is called a nextgeneration RAN (NG-RAN), and the core network technology will be calleda 5G system core.

A mobility restriction area indicates a set of area information thatincludes an allowed area in which a session is established according toa location of the terminal to transmit/receive data, a non-allowed areain which the session may not established and only control signaling ispossible, and a forbidden area in which all mobile communicationservices are impossible.

A mobile communication service provider may configure different networkslices for each service provided to the terminal, and may providedifferent restriction areas for each network slice. For example, amobile communication service provider providing a mobile broadbandservice and an IoT service may provide services by configuring twoservices as different network slices. A mobile communication serviceprovider may be limited so that the terminal may receive a service in awide area through the mobility restriction area for a mobile broadband,and may apply the mobility restriction area so that the terminal mayreceive a data transmission/reception service in a specific area for theIoT.

Second Embodiment

In describing in detail a second embodiment, terms identifying an accessnode, terms indicating network entity, terms indicating messages, termsindicating an interface between network entities, terms indicatingvarious types of identification information, and so on that are used inthe following description are exemplified for convenience ofexplanation. Accordingly, the present disclosure is not limited to termsto be described below and other terms indicating objects having theequivalent technical meaning may be used.

For convenience of explanation, embodiments of present disclosure aredescribed below using terms and names defined in the specification forthe 5G system. However, the present disclosure is not limited to theterms and names, but may also be identically applied to the systemaccording to other standards. In addition, non-3GPP access may besimilarly applied to other accesses except the access through the 5G,including the WiFi access.

FIG. 11 illustrates a cellular network structure using a common AMF,wherein a PLMN of a 3GPP access and a PLMN of an N3IWF are the same,when a terminal is connected through a 3GPP access and a non-3GPPaccess, according to an embodiment of the present disclosure.

Referring to FIG. 11, when a terminal (or UE) 1101 accesses a 5G corenetwork through 3GPP access, i.e., a 5G RAN 1102, and accesses the 5Gcore network through a non-3GPP access 1103, a same common AMF 1105 isselected when an N3IWF 1104 that the terminal 1101 selects is in thesame PLMN as the 3GPP access. The case as to how to select the commonAMP will be described later.

Here, the N3IWF 1104 is 5G core network equipment that defines a smoothinterworking of the non-3GPP access 1103 with the 5G core network and isan entity that forwards a NAS message or data transmitted/receivedthrough the non-3GPP access 1103 (and may be referred to as ngPDG).

FIG. 12 illustrates a cellular network structure using different AMFs,wherein a PLMN of a 3GPP access and a PLMN of N3IWF are different, whena terminal is connected through a 3GPP access and a non-3GPP access,according to an embodiment of the present disclosure.

Referring to FIG. 12, when a terminal (or UE) 1201 accesses the 5G corenetwork through the 3GPP access, i.e., a 5G RAN 1202, and accesses the5G core network through a non-3GPP access 1203, different AMFs 1205 and1206 are selected when an N3IWF 1204 that the terminal 1201 selects isin the PLMN different from the 3GPP access, i.e., the RAN 1202. The caseas to how to select the common AMP will be described later.

FIG. 13 illustrates a process of selecting an AMF when a terminalconnected to a 3 gpp access according to an embodiment of the presentdisclosure accesses a 5G network through a non-3 gpp access.

Referring to FIG. 13, when a UE 1301 is successfully registered in the5G network, a temporary UE ID for the UE 1301 is allocated from aserving AMF 1303 in step 1311. The temporary UE ID may includeinformation of a PLMN that the UE 1301 accesses or a temporary value atwhich the AMF 1303 is allocated from the UE 1301 together with an ID ofan AMP group to which the serving AMF 1303 belongs or a part or all ofthe IDs of the serving AMF 1303. The temporary UE ID is an IDcorresponding to a globally unique temporary identity (GUTI) in an LTEsystem. The UE 1301 may include the network capability in the connectedAMF 1303 together with the temporary UE ID. The network capability mayalso include information on a service type that may be provided by theAMF 1303.

When the UE 1301 registered in the 5G network through the 3GPP accessdiscovers the non-3GPP access, such as the WiFi, in step 1313, the UE1301 discovers and selects an N3IWF 1302, when accessing the 5G networkthrough the non-3GPP access, in step 1314. A similar method asselecting, by a UE, an ePDG in an LTE system (refer to TS 23. 402) maybe used for discovering and selecting the N3IWF 1302.

In step 1315, the PLMN selected in the 3GPP access is compared with thePLMN to which the selected N3IWF belongs. If the PLMNs are equal to eachother, the UE 1301 sets routing information, which is information forthe N3IWF 1302 to select an AMF, as the temporary UE ID or a part of thetemporary UE ID allocated in the previous 3GPP registration step. Forexample, a part of the temporary UE ID may include a PLMN ID, an ID ofan AMF group to which the serving AMF 1303 belongs, or a part or all ofthe IDs of the serving AMFs.

However, if the PLMN selected in the 3GPP access is different from thePLMN to which the selected N3IWF belongs, no value is set as the routinginformation or a null value is set in step 1316.

The UE 1301 transmits the routing information generated in step 1316 tothe N3IWF 1302 together with the registration request message forattaching in step 1317, and the N3IWF 1302 selects the AMF 1304 usingthe received routing information in step 1318. The registration requestmessage may include the temporary UE ID received through the 3GPPaccess, and may also include an indication to indicate that thetemporary UE ID is allocated from the AMF currently accessed through the3GPP access or that there is already registration via another access.

When the ID of the serving AMF 1303 is included in the routinginformation, the N3IWF 1302 selects the serving AMF 1303, when selectingthe AMF for the non-3GPP access.

However, when the routing information includes the ID of the AMF groupto which the serving AMF 1303 belongs without the ID of the serving AMF1303, if an AMF 1304 different from the serving AMF 1303 is selected byselecting the AMF for the non-3GPP access, the selected AMF finds the IDof the serving AMF 1303 by referring to the temporary UE ID included inthe registration request message of the UE and then redirects theregistration request message to the serving AMF 1303 to select the samecommon AMF.

If the routing information does not include information enough to findthe ID of the serving AMF 1303, a default AMF may be selected. Thedefault AMF finds the ID of the serving AMF 1303 by referring to thetemporary UE ID included in the registration request message of the UEas needed, and then redirects the registration request message to theserving AMF 1303 to select the same common AMF.

Thereafter, the registration process is performed through the non-3GPPaccess of the UE through the selected AMF.

FIG. 14 illustrates a process of selecting an AMF when a terminalconnected to a 3 gpp access according to another embodiment of thepresent disclosure accesses a 5G network through a non-3 gpp access.

Referring to FIG. 14, when a UE 1401 is successfully registered in the5G network, a temporary UE ID for the UE is allocated from a serving AMF1403 in step 1411. The temporary UE ID includes the information of thePLMN that the UE 1401 accesses and the AMF 1403 includes a temporaryvalue that the UE 1401 allocates together with an ID of an AMF group towhich the serving AMF 1403 belongs or a part or all of the IDs of theserving AMF 1403. The temporary UE ID is an ID corresponding to a GUTIin an LTE system. The UE 1401 may include the network capability in theconnected AMF 1403 together with the temporary UE ID. The networkcapability may also include information on a service type that may beprovided by the AMF 1403.

When the UE 1401 registered in the 5G network through the 3GPP accessdiscovers the non-3GPP access, such WiFi, in step 1413, the UE 1402discovers and selects an N3IWF 1402 when accessing the 5G networkthrough the non-3GPP access, in step 1414. A similar method asselecting, by a UE, an ePDG in an LTE system (refer to TS 23. 402) maybe used for discovering and selecting, by the terminal 1401, the N3IWF1402.

The PLMN selected in the 3GPP access is compared with the PLMN to whichthe selected N3IWF belongs in step 1415 a. In addition, the UE 1401determines whether the serving AMF 1403 supports the service typerequested by the UE 1401 through the non-3GPP access based on thenetwork capability information received in step 1411 in step 1415 b.

If the PLMNs are equal to each other and the serving AMF 1403 supports aservice type requested by the UE 1401 through the non-3GPP access, theUE 1401 sets the routing information, which is the information for theN3IWF 1402 to select the AMF, as a part of the temporary UE ID or thetemporary UE ID allocated in the previous 3GPP registration step. Forexample, a part of the temporary UE ID may include a PLMN ID, an ID ofan AMF group to which the serving AMF 1403 belongs, or a part or all ofthe IDs of the serving AMFs.

However, if the PLMN selected in the 3GPP access is different from thePLMN to which the selected N3IWF 1402 belongs or the serving AMF 1403does not support the service type requested by the UE 1401 through thenon-3GPP access, the service type to be requested through the non-3GPPaccess is set as the routing information in step 1416.

The UE 1401 transmits the routing information generated in step 1416 tothe N3IWF 1402 together with the registration request message forattaching in step 1417, and the N3IWF 1402 selects the AMF 1404 usingthe received routing information in step 1418. The registration requestmessage may include the temporary UE ID received through the 3GPPaccess, and may also include an indication to indicate that thetemporary UE ID is allocated from the AMF currently accessed through the3GPP access or that there is already registration via another access.

When the ID of the serving AMF 1403 is included in the routinginformation, the N3IWF 1402 selects the serving AMF 1403 when selectingan AMF for the non-3GPP access.

However, when the routing information includes the ID of the AMF groupto which the serving AMF 1403 belongs without the ID of the serving AMF1403, if an AMF 1404 different from the serving AMF 1403 is selected byselecting the AMF for the non-3 gpp access, the selected AMF finds theID of the serving AMF 1403 by referring to the temporary UE ID includedin the registration request message of the UE 1401 and then redirectsthe registration request message to the serving AMF 1403 to select thesame common AMF.

When the service type to be requested through the non-3 gpp access isincluded in the routing information, it is possible to select anappropriate AMF that may serve the service type separately from theserving AMF 1403 of the 3 gpp access.

Thereafter, the registration process is performed through the non-3 gppaccess of the UE 140 through the selected AMF.

FIG. 15 illustrates a process of selecting an AMF when a terminalconnected to a non-3 gpp access according to another embodiment of thepresent disclosure accesses a 5G network through a 3 gpp access

Referring to FIG. 15, when a UE 1501 is successfully registered in the5G network through a non-3GPP access, a temporary UE ID for the UE 1501is allocated from a serving AMF 1503 in step 1511. The temporary UE IDincludes the information of a PLMN that the UE 1501 accesses or atemporary value at which the AMF 1503 is allocated from the UE 1501together with an ID of an AMP group to which the serving AMF 1503belongs or a part or all of the IDs of the serving AMF 1503. Thetemporary UE ID is an ID corresponding to a GUTI in an LTE system. TheUE 1501 may include the network capability in the connected AMF togetherwith the temporary UE ID. The network capability may also includeinformation on a service type that may be provided by the AMF 1503.

The terminal 1501 registered in the 5G network through the non-3GPPaccess enters 3GPP coverage in step 1513, and performs PLMN selection toaccess the 5G network through the 3GPP access in step 1514.

In step 1515, the PLMN of the N3IWF selected by the non-3GPP access andthe PLMN selected for the 3GPP access are compared with each other. Ifthe PLMNs are the same, the UE 1501 sets routing information, which isinformation for the RAN 1502 to select the AMF, as the temporary UE IDor a part of the temporary UE ID allocated in the previous non-3GPPregistration step. For example, a part of the temporary UE ID mayinclude a PLMN ID, an ID of an AMF group to which the serving AMF 1503belongs, or a part or all of the IDs of the serving AMFs.

However, if the PLMN selected in the 3GPP access is different from thePLMN to which the N3IWF for the non-3GPP access belongs, no value is setas the routing information or a null value is set in step 1516.

The UE 1501 transmits the routing information generated in step 1516 tothe RAN 1502 together with the registration request message forattaching in step 1517, and the RAN 1502 selects the AMF 1504 using thereceived routing information step 1518. The registration request messagemay include the temporary UE ID received through the non-3GPP access,and may also include an indication to indicate that the temporary UE IDis allocated from the AMF currently accessed through the non-3GPP accessor that there is already registration via another access.

When the ID of the serving AMF 1503 is included in the routinginformation, the RAN 1502 selects the serving AMF 1503 when selectingthe AMF for the 3GPP access.

However, when the routing information includes the ID of the AMF groupto which the serving AMF 1503 belongs without the ID of the serving AMF1503, if an AMF 1504 different from the serving AMF is selected for the3GPP access, the selected AMF 1504 finds the ID of the serving AMF 1503by referring to the temporary UE ID included in the registration requestmessage of the UE and then redirects the registration request message tothe serving AMF 1503 to select the same common AMF.

If the routing information does not include information enough to findthe ID of the serving AMF 1503, a default AMF may be selected. Thedefault AMF finds the ID of the serving AMF 1503 by referring to thetemporary UE ID included in the registration request message of the UEas needed, and then redirects the registration request message to theserving AMF 1503 to select the same common AMF.

Thereafter, the registration process is performed through the 3GPPaccess of the UE through the selected AMF.

FIG. 16 illustrates a process of selecting an AMF when a terminalconnected to a non-3 gpp access according to another embodiment of thepresent disclosure accesses a 5G network through a 3 gpp access

Referring to FIG. 16, when a UE 1601 is successfully registered in the5G network through a non-3GPP access, a temporary UE ID for the UE 1601is allocated from a serving AMF 1603 in step 1611. The temporary UE IDincludes the information of the PLMN that the UE 1601 accesses or atemporary value at which the AMF 1603 is allocated from the UE 1601together with an ID of an AMP group to which the serving AMF 1603belongs or a part or all of the IDs of the serving AMF 1603. Thetemporary UE ID is an ID corresponding to a GUTI in an LTE system. TheUE 1601 may include the network capability in the connected AMF 1603together with the temporary UE ID. The network capability may alsoinclude information on a service type that may be provided by the AMF1603.

The terminal 1601 registered in the 5G network through the non-3GPPaccess enters a 3GPP coverage in step 1613, and performs PLMN selectionto access the 5G network through the 3GPP access in step 1614.

In step 1615 a, the PLMN of the N3IWF selected by the non-3GPP accessand the PLMN selected for the 3GPP access are compared with each other.

In addition, in step 1615 b, the UE 1601 determines whether the servingAMF 1603 supports the service type requested by the UE 1601 through the3GPP access based on the network capability information received in step1611.

If the PLMNs are the same and the serving AMF 1603 supports a servicetype requested by the UE 1601 through the 3GPP access, the UE 1601 setsthe routing information, which is the information for the RAN 1602 toselect the AMF, as a part of the temporary UE ID or the temporary UE IDallocated in the previous non-3GPP registration step in step 1616. Forexample, a part of the temporary UE ID may include a PLMN ID, an ID ofan AMF group to which the serving AMF 1603 belongs, or a part or all ofthe IDs of the serving AMFs.

However, if the PLMN selected by the 3GPP access is different from thePLMN belonging to the N3IWF selected for the non-3GPP access or theserving AMF 1603 does not support the service type that the terminal1601 requests through the 3GPP access, the service type to be requestedthrough the 3GPP access is set as the routing information in step 1616.

The UE 1601 transmits the routing information generated in step 1616 tothe RAN 1602 together with the registration request message forattaching in step 1617, and the RAN 1602 selects the AMF 1604 using thereceived routing information in step 1618. The registration requestmessage may include the temporary UE ID received through the non-3GPPaccess, and may also include an indication to indicate that thetemporary UE ID is allocated from the AMF currently accessed through thenon-3GPP access or that there is already registration via anotheraccess.

When the ID of the serving AMF 1603 is included in the routinginformation, the RAN 1602 selects the serving AMF 1603 when selectingthe AMF for the 3GPP access.

However, when the routing information includes the ID of the AMF groupto which the serving AMF 1603 belongs without the ID of the serving AMF1603, if an AMF 1604 different from the serving AMF 1603 is selected forthe 3GPP access, the selected AMF 1604 finds the ID of the serving AMF1603 by referring to the temporary UE ID included in the registrationrequest message of the UE 1601 and then redirects the registrationrequest message to the serving AMF 1603 to select the same common AMF.

When the service type to be requested through the 3GPP access isincluded in the routing information, it is possible to select anappropriate AMF that may serve the service type separately from theserving AMF of the non-3GPP access.

Thereafter, the registration process is performed through the 3GPPaccess of the UE through the selected AMF.

Third Embodiment

In describing in detail a third embodiment, terms identifying an accessnode, terms indicating network entity, terms indicating messages, termsindicating an interface between network entities, terms indicatingvarious types of identification information, and so on that are used inthe following description are exemplified for convenience ofexplanation. Accordingly, the present disclosure is not limited to termsto be described below and other terms indicating objects having theequivalent technical meaning may be used.

For convenience of explanation, the present disclosure uses terms andnames defined in the specification for the 5G system. However, thepresent disclosure is not limited to the terms and names but may also beidentically applied to the system according to other standards.

FIG. 17 illustrates a network structure between a (R)AN node and AMFs,according to an embodiment of the present disclosure. Here, when the(R)AN node corresponds to the RAN node, that is, the base station in thecase of the 3 gpp access and corresponds to the N3IWF in the case of thenon-3 gpp access.

Specifically, FIG. 17 illustrates a method for selecting, by a RAN node,an AMF suitable to forward an initial NAS message when a terminalaccesses the 5G network to transmit an initial NAS message such as aregistration request message. In addition, FIG. 17 illustrates a networkconfiguration method for eliminating stickiness or persistence betweenthe terminal and the AMF in the process of selecting the AMF.

Referring to FIG. 17, AMFs 1 to 9 generate AMF groups 1 to 3 accordingto the kind of service types they each may service, and each AMF groupincludes an AMF group database (DB) storing information of UE context,such as UE status, in which all AMFs belonging to the AMF group areprocessed. The (R)AN node 1702 has a preconfigured connection with theAMFs of each AMF group (e.g., a similar concept as an S1-mobilitymanagement entity (MME) connection of an evolved packet core (EPC)network). The AMFs in the AMF group all have connections with the same(R)AN nodes 1702.

Each AMF records the context of the UE 1701 added, updated, or deletedin the database of the AMF group, including the status of the UE 1701.

In setting up a packet data unit (PDU) session, an AMF selects anappropriate SMF, and the SMF selects an appropriate UPF to create atunnel between the (R)AN node 1702 and the UPF for transmitting data.

FIG. 18 illustrates a process of selecting, by a (R)AN node, anappropriate AMF when a terminal transmits an initial NAS messageaccording to an embodiment of the present disclosure.

Referring to FIG. 18, a terminal 1801 generates an initial NAS messageto access the 5G core network in step 1811. The initial NAS messagecorresponds to, e.g., an attach request message, a tracking area update(TAU) request message, a registration request message, a service requestmessage for registration, etc. The terminal 1801 may include the routinginformation so that the RAN node 1802 may transmit the generated initialNAS message to an appropriate AMF.

In step 1812, when the UE 1801 is already registered in the current area(e.g., a tracking area identifier (TAI) list), all of the temporary UEIDs or a part of the temporary UE ID that the AMF allocates, e.g., apart or all of the PLMN ID or the AMF group ID or the AMF ID is used asthe routing information. If the terminal 1801 is not already registeredin the current area (e.g., TAI list), the terminal 1801 may set theservice types that the terminal 1801 wants as the routing information asrouting information.

The terminal 1801 transmits the initial NAS message together with therouting information to the (R)AN node 1802 in step 1813. The (R)AN node1802 is a RAN (or a base station) in the 3GPP access, or an N3IWF in thenon-3GPP access.

The (R)AN node 1802 determines whether the received routing informationis the temporary UE ID or a part of a temporary UE ID in step 1814. Ifyes, the (R)AN node 1802 extracts an AMF group ID from the correspondingrouting information. However, if not, the terminal 1801 obtains the AMFgroup ID by selecting the associated AMF group for the requestingservice types that the terminal 1801 requests. If there is no AMF groupsupporting all the requesting service types, the AMF group supportingsome service types may be selected as a lane or the default AMF groupmay be selected in step 1815. The RAN node 1802 selects the appropriateAMF by referring to location information of the UE 1801, loadinformation between the AMFs among the AMFs of the selected AMF group instep 1816, and transmits the initial NAS message to the selected AMF instep 1817. If the initial UE message includes the temporary UE ID, theAMF 1803 requests and receives the context of the corresponding UE fromthe AMF group database 1804. In step 1818, the UE context requestmessage may transmit the temporary UE ID together with information as towhat purpose it is. In step 1819, the AMF group database 1804 transmitsthe context information of the UE including the status of the UE 1801 tothe AMF 1803. The context information of the UE may include informationfor UE authentication.

Based on the received UE context, the AMF 1803 processes the initial NASmessage in step 1820, and if necessary, the processing result may betransmitted to the terminal 1801 in step 1821. In steps 1822, 1823, and1824, if the UE context and UE status are changed in the process of theinitial NAS message, the updated information is informed to the AMFgroup database 1804.

FIG. 19 illustrates a process of selecting, by an SMF, an AMF totransmit paging to a terminal in an IDLE mode according to an embodimentof the present disclosure.

Referring to FIG. 19, when downlink data reaches a UPF 1901 in step1912, while a UE is successfully registered in the 5G network and thenenters the idle mode in step 1911, the UPF 1901 transmits a downlinkdata notification message to an SMF 1902 to inform the UE that data arereached in step 1913. The downlink data notification may include some orall of the PDU session ID or the UE ID. The UE ID may use apre-allocated temporary UE ID or a permanent ID of the UE, e.g., IMSIinformation.

In step 1914, the SMF 1902 receiving the downlink data notificationconfirms that there is the connection with the AMF for the correspondingterminal. If there is no connection, the AMF group ID is selected fromthe temporary UE ID of the UE that the SMF 1902 and one AMF is selectedfrom the AMFs belonging to the selected AMF group ID in step 1915.However, if there is a connection, the AMF that has the connection isselected.

In step 1916, the SMF 1902 transmits a paging request message to theselected AMF1 1903 to inform the corresponding terminal that downlinkdata has been generated. The paging request message may include a PDUsession ID that the downlink data reaches and the temporary UE ID.

The AMF1 1903, after receiving the paging request message, requests andreceives the UE context corresponding to the temporary UE ID to the AMFgroup database 1904 in steps 1917 and 1918. The AMF1 1903 informs the UEcontext request message together with the PDU session ID that it is forpaging for the PDU session and the temporary UE ID, so that the AMFgroup database 1904 may update the UE status together with the UEcontext in steps 1917 and 1919.

The AMF1 1903 receiving the UE context performs UE paging through theRAN in step 1920. The UE receiving the UE paging transmits the initialNAS message through the method provided in FIG. 18, and the appropriateAMF2 1905 receives the initial NAS message in step 1921, and requestsand receives the UE context to the AMF group database 1904 using thetemporary UE ID included in the initial NAS message. The AMF2 1905recognizes from the AMF group database 1904 that the paging for the UEstatus, i.e., the PDU session is in progress with the UE context, andsets up a tunnel for transmitting the pending downlink data for thecorresponding PDU session to forward data in step 1924. The AMF informsthe AMF group database of the UE status change to end the paging andupdate the UE context that the switching to the connected mode is made.

FIG. 20 illustrates a terminal according to an embodiment of the presentdisclosure.

Referring to FIG. 20, the terminal includes a transceiver 2010 and acontroller 2020 controlling the overall operation of the terminal. Thetransceiver 2010 includes a transmitter 2013 and a receiver 2015.

The transceiver 2010 may transmit and receive signals to and from othernetwork entities via the transmitter 2013 and the receiver 2015,respectively.

The controller 2020 may control the terminal to perform any oneoperation of the above-described embodiments. For example, thecontroller 2020 is configured to transmit, to a first base station, afirst message comprising at least one of first information foridentifying an AMF, and second information of a service type requestedby the terminal, and receive, from an AMF, a second message in responseto the first message.

The controller 2020 and the transceiver 2010 are not necessarilyimplemented as a separate module but may be implemented as one componentin a single chip. Further, the controller 2020 and the transceiver 2010may be electrically connected to each other. For example, the controller2020 may be a circuit, an application-specific circuit, or at least oneprocessor. In addition, the operations of the terminal may be realizedby including a memory device storing the corresponding program code inany component of the terminal.

The terminal also includes a memory 2030, which may store at least oneof the information transmitted/received through the transceiver 2010 andthe information generated through the controller 2010.

FIG. 21 illustrates a base station according to an embodiment of thepresent disclosure.

Referring to FIG. 21, the base station includes a transceiver 2110 and acontroller 2120 controlling the overall operation of the base station.The transceiver 2110 includes a transmitter 2113 and a receiver 2115.

The transceiver 2110 may transmit and receive signals to and from othernetwork entities via the transmitter 2113 and the receiver 2115,respectively.

The controller 2120 may control the base station to perform any oneoperation of the above-described embodiments. For example, thecontroller 2120 is configured to receive, from a terminal, a messagecomprising at least one of first information for identifying an AMF, andsecond information of a service type requested by the terminal, selectan AMF set based on at least one of the first information and the secondinformation, and select an AMF from the selected AMF set.

The controller 2120 and the transceiver 2110 are not necessarilyimplemented as a separate module but may be implemented as one componentin a single chip.

The controller 2120 and the transceiver 2110 may be electricallyconnected to each other. For example, the controller 2120 may be acircuit, an application-specific circuit, or at least one processor. Inaddition, the operations of the base station may be realized byincluding a memory device storing the corresponding program code in anycomponent of the terminal.

The base station also includes a memory 2130, which may store at leastone of the information transmitted/received through the transceiver 2110and the information generated through the controller 2120. For example,the memory 2130 may store at least one of the informationtransmitted/received through the transceiver 2110 and the informationgenerated through the controller 2120.

FIG. 22 illustrates an AMF according to an embodiment of the presentdisclosure.

Referring to FIG. 22, the AMF includes a transceiver 2210 and acontroller 2220 controlling the overall operation of the AMF. Thetransceiver 2210 includes a transmitter 2213 and a receiver 2215.

The transceiver 2210 may transmit and receive signals to and from othernetwork entities via the transmitter 2213 and the receiver 2215,respectively.

The controller 2220 may control the AMF to perform any one operation ofthe above-described embodiments. For example, the controller 2220 isconfigured to determine to reroute a request message received from aterminal including information of a service requested by the terminal,select another AMF supporting the service request by the terminal, andtransmits, to the selected another AMF, the request message.

The controller 2220 and the transceiver 2210 are not necessarilyimplemented as a separate module but may be implemented as one componentin a single chip.

The controller 2220 and the transceiver 2210 may be electricallyconnected to each other. For example, the controller 2220 may be acircuit, an application-specific circuit, or at least one processor. Inaddition, the operations of the AMF may be realized by including amemory device storing the corresponding program code in any component ofthe AMF.

The AMF also includes a memory 2230, which may store at least one of theinformation transmitted/received through the transceiver 2210 and theinformation generated through the controller 2220. For example, thememory 2230 may store at least one of the informationtransmitted/received through the transceiver 2210 and the informationgenerated through the controller 2210.

In the above-described embodiments of the present disclosure, componentsmay be represented by a singular number or a plural number according tothe detailed embodiment as described above. However, the expressions ofthe singular number or the plural number are selected to meet thesituations proposed for convenience of explanation and the presentdisclosure is not limited to the single component or the pluralcomponents and even though the components are represented in plural, thecomponent may be configured in a singular number or even though thecomponents are represented in a singular number, the component may beconfigured in plural.

According to an embodiment of the present disclosure, a method formanaging and using network deployment information in a wirelesscommunication system is specified. In addition, the method for locatinga network node providing a service that the UE wants based on thenetwork deployment information is specified. Thus, the efficient servicecan be provided in the 5G mobile communication environment.

According to an embodiment of the present disclosure, the mobilecommunication service provider can provide a specific service to theterminal by allocating different mobility restriction areas to eachnetwork slice.

According to an embodiment of the present disclosure, the terminal cancontrol the session connection by determining the network slice capableof transmitting/receiving data based on the mobility restriction area byestablishing the session at the current location among the plurality ofnetwork slices used by the terminal.

According to an embodiment of the present disclosure, the 5G corenetwork can be operated by determining the network slice capable oftransmitting/receiving data based on the mobility restriction area byallowing the terminal to establish the session at the current locationbased on the operation according to the service request transmitted bythe terminal.

According to an embodiment of the present disclosure, the terminal canselect the same AMF or different AMF for the 3GPP and the non-3GPPaccess as needs to perform the routing of the NAS message and the datatransmission through the efficient path.

According to an embodiment of the present disclosure, as the stickinessor persistence of the UE is removed in the course of selecting the AMF,it is possible to facilitate the network management such as thevirtualization of the AMF related network and the reduction/expansion ofthe AMF equipment.

The embodiments of the present disclosure disclosed in the presentspecification and the accompanying drawings have been provided only asspecific examples in order to assist in understanding the presentdisclosure and do not limit the scope of the present disclosure. Thatis, it is obvious to those skilled in the art to which the presentdisclosure pertains that other change examples based on the technicalidea of the present disclosure may be made without departing from thescope of the present disclosure. Further, each embodiment may becombined and operated as needed. For example, some of the embodiments ofthe present disclosure may be combined with each other so that the basestation and the terminal may be operated. In addition, although theabove embodiments are presented based on the NR system, othermodifications based on the technical idea of the embodiment may beapplicable to other systems such as the FDD or TDD LTE system

In addition, although the exemplary embodiments of the presentdisclosure have been illustrated in the present specification and theaccompanying drawings and specific terms have been used, they are usedin a general meaning in order to assist in the understanding the presentdisclosure and do not limit the scope of the present disclosure. It isobvious to those skilled in the art to which the present disclosurepertains that various modifications may be made without departing fromthe scope of the present disclosure, in addition to the exemplaryembodiments disclosed herein.

What is claimed is:
 1. A method of a terminal in a wirelesscommunication system, the method comprising: receiving, from an accessand mobility management function (AMF), a first message including firstinformation for identifying the AMF, the first information beingassigned upon a successful registration to a first access; determiningwhether a second access is located in a same public land mobile network(PLMN) of the first access; and transmitting, to an access networkentity of the second access, a second message requesting registration tothe second access and including second information for identifying theAMF, in case that the second access is located in the same PLMN of thefirst access, wherein the second information includes at least a part ofthe first information and is used by the access network entity of thesecond access to select the AMF.
 2. The method of claim 1, wherein thefirst information includes a globally unique temporary identifier(GUTI), wherein the second information includes at least a part of theGUTI, and wherein the second information further includes an AMF setidentifier and an AMF identifier.
 3. The method of claim 1, wherein theaccess network entity includes a radio access network entity or anon-3rd Generation Partnership Project (3GPP) inter-working function(N3IWF).
 4. The method of claim 1, wherein the first access includes 3rdGeneration Partnership Project (3GPP) access and the second accessincludes non-3GPP access.
 5. The method of claim 1, further comprisingtransmitting, to the access network entity of the second access, thesecond message not including the second information, in case that thesecond access is located in a PLMN different from a PLMN of the firstaccess.
 6. A terminal in a wireless communication system, the terminalcomprising: a transceiver; and a controller coupled with the transceiverand configured to: receive, from an access and mobility managementfunction (AMF), a first message including first information foridentifying the AMF, the first information being assigned upon asuccessful registration to a first access, determine whether a secondaccess is located in a same public land mobile network (PLMN) of thefirst access, and transmit, to an access network entity of the secondaccess, a second message requesting registration to the second accessand including second information for identifying the AMF, in case thatthe second access is located in the same PLMN of the first access,wherein the second information includes at least a part of the firstinformation and is used by the access network entity of the secondaccess to select the AMF.
 7. The terminal of claim 6, wherein the firstinformation includes a globally unique temporary identifier (GUTI),wherein the second information includes at least a part of the GUTI, andwherein the second information further includes an AMF set identifierand an AMF identifier.
 8. The terminal of claim 6, wherein the accessnetwork entity includes a radio access network entity or a non-3rdGeneration Partnership Project (3GPP) inter-working function (N3IWF). 9.The terminal of claim 6, wherein the second information includes an AMFset identifier and an AMF identifier.
 10. The terminal of claim 6,wherein the controller is further configured to transmit, to the accessnetwork entity of the second access, the second message not includingthe second information, in case that the second access is located in aPLMN different from a PLMN of the first access.
 11. A method of anaccess network entity of a first access in a wireless communicationsystem, the method comprising: receiving, from a terminal, a messagerequesting registration to the first access and including firstinformation for identifying an access and mobility management function(AMF), in case that the first access is located in the same PLMN of asecond access; and selecting the AMF based on the first information,wherein the first information includes at least a part of the secondinformation, and wherein the second information for identifying the AMFis received by the terminal from the AMF, the second information beingassigned upon a successful registration to the second access.
 12. Themethod of claim 11, wherein the second information includes a globallyunique temporary identifier (GUTI), wherein the first informationincludes at least a part of the GUTI, and wherein the first informationfurther includes an AMF set identifier and an AMF identifier.
 13. Themethod of claim 11, wherein the access network entity includes a radioaccess network entity or a non-3rd Generation Partnership Project (3GPP)inter-working function (N3IWF).
 14. The method of claim 11, wherein thesecond access includes 3rd Generation Partnership Project (3GPP) accessand the first access includes non-3GPP access.
 15. The method of claim11, further comprising receiving, from the terminal, the message notincluding the first information, in case that the first access islocated in a PLMN different from a PLMN of the second access.
 16. Anaccess network entity of a first access in a wireless communicationsystem, the access network entity comprising: a transceiver; and acontroller coupled with the transceiver and configured to: receive, froma terminal, a message requesting registration to the first access andincluding first information for identifying an access and mobilitymanagement function (AMF), in case that the first access is located inthe same PLMN of a second access; and select the AMF based on the firstinformation, wherein the first information includes at least a part ofthe second information, and wherein the second information foridentifying the AMF is received by the terminal from the AMF, the secondinformation being assigned upon a successful registration to the secondaccess.
 17. The access network entity of claim 16, wherein the secondinformation includes a globally unique temporary identifier (GUTI),wherein the first information includes at least a part of the GUTI, andwherein the first information further includes an AMF set identifier andan AMF identifier.
 18. The access network entity of claim 16, whereinthe access network entity includes a radio access network entity or anon-3rd Generation Partnership Project (3GPP) inter-working function(N3IWF).
 19. The access network entity of claim 16, wherein the secondaccess includes 3rd Generation Partnership Project (3GPP) access and thefirst access includes non-3 gpp access.
 20. The access network entity ofclaim 16, wherein the controller is further configured to receive, fromthe terminal, the first message not including the first information, incase that the first access is located in a PLMN different from a PLMN ofthe second access.