This application claims priority to Great Britain Application No. 2319262.8, filed Dec. 15, 2023, the entirety of which is hereby incorporated by reference.
Examples of the disclosure relate to access control. Some relate to access control for network energy saving.
Network energy saving (NES) can be used by communications networks to improve environmental sustainability, to reduce environmental impact, and for operational cost savings.
According to various, but not necessarily all, examples of the disclosure there is provided an apparatus comprising: at least one processor;
The evaluation may comprise determining at least a first value using the at least one network energy saving mode parameter and comparing the determined value to a random number.
If the evaluation criterion is not satisfied the apparatus may be caused to perform starting a barring timer wherein the duration of the barring timer is determined by at least one of a network energy saving mode parameter and an evaluation criterion.
The apparatus may be barred from performing an access procedure with the network node for the duration of the timer.
The at least one network energy saving mode parameter and the evaluation criterion may be received from the network node.
The at least one network energy saving mode parameter may comprise at least one of:
The apparatus as claimed in any preceding claim may be caused to perform:
The at least one evaluation criterion may comprise a mathematical operation based on the at least one network energy saving mode parameter.
The at least one network energy saving mode parameter may comprise different parameters for different energy saving modes of the network node.
The different network energy saving modes may comprise at least a first mode and a second mode, wherein a number of active resources at the network node is higher in the first mode than in the second mode.
The at least one network energy saving mode parameter may be associated with a specific type of the apparatus.
The at least one network energy saving mode parameter may be received as additional information to unified access control parameters.
The at least one network energy saving mode parameter may comprise information specific to at least one of:
The at least one network energy saving mode parameter of the network node may be received via at least one of:
The evaluation criterion may be received via at least one of:
The apparatus may comprise or be comprised in one of:
According to various, but not necessarily all, examples of the disclosure there is provided a method comprising:
According to various, but not necessarily all, examples of the disclosure there is provided a computer program comprising instructions which, when executed by an apparatus, cause the apparatus to perform at least:
While the above examples of the disclosure and optional features are described separately, it is to be understood that their provision in all possible combinations and permutations is contained within the disclosure. It is to be understood that various examples of the disclosure can comprise any or all of the features described in respect of other examples of the disclosure, and vice versa. Also, it is to be appreciated that any one or more or all of the features, in any combination, may be implemented by/comprised in/performable by an apparatus, a method, and/or computer program instructions as desired, and as appropriate.
Some examples will now be described with reference to the accompanying drawings in which:
The figures are not necessarily to scale. Certain features and views of the figures can be shown schematically or exaggerated in scale in the interest of clarity and conciseness. For example, the dimensions of some elements in the figures can be exaggerated relative to other elements to aid explication. Similar reference numerals are used in the figures to designate similar features. For clarity, all reference numerals are not necessarily displayed in all figures.
The access nodes 120 can be configured to communicate with the terminal nodes 110. The core network nodes 130 communicate with the access nodes 120. In some examples the core network nodes 130 communicate with the terminal nodes 110.
The core network nodes 130 can, in some examples, communicate with each other. The one or more access nodes 120 can, in some examples, communicate with each other.
The network 100 can be a cellular network comprising a plurality of cells 122. Each of the cells is served by an access node 120. In this example, the interface between the terminal node 110 and an access node 120 providing a cell 122 is a wireless interface 124.
The access nodes 120 can comprise one or more cellular radio transceivers. The terminal nodes 110 can comprise one or more cellular radio transceivers.
The terminal nodes 110 can comprise user equipments (UE), energy harvesting devices, reduced capability (RedCap) devices, internet of things (IoT) devices, ambient internet of things (AIoT) devices, or any other suitable type of devices.
The access nodes 120 can be base stations. The access nodes 120 can be any suitable type of base station. The access node 120 can be a network entity responsible for radio transmission and reception in one or more cells to or from terminal nodes 110. The access node 120 can be a network element in a Radio Access Network (RAN), or any other suitable type of network.
The core network nodes 130 can be part of a core network. The core network nodes 130 can be configured to manage functions relating to connectivity for the terminal nodes 110. For example, the core network nodes 130 can be configured to manage functions such as connectivity, mobility, authentication, authorization and/or other suitable functions.
In the example of
The network 100 can be any suitable type of network, for example it can be a New Radio (NR) network that uses gNB as access nodes. New Radio is the 3GPP name for 5G technology. In such cases the serving nodes 120 can comprise gNBs configured to provide user plane and control plane protocol terminations towards the terminal nodes 110 and/or to perform any other suitable functions. The gNBs are interconnected with each other by means of an X2/Xn interface 126. The gNBs are also connected by means of the N2 interface 128 to the core network nodes 130. Other types of networks and interfaces could be used in other examples. Other types of networks could comprise next-generation mobile and communication network, for example, a 6G network.
Unified Access Control (UAC) is a mechanism to determine whether a UE is allowed to access the network or specific services. UAC parameters can be broadcasted for all UEs on the cell and UEs may have up-to-date UAC information before the UE starts the access attempt. Network can restrict access of the UEs using UAC without a need for rejection. When the UE may need to access a 5G system, the UE first performs access control checks to determine if the access is allowed. Access attempt may relate to, for example, multimedia priority service (MPS), mission-critical service (MCS), or a disaster condition, etc. In UAC check, a UE maps its access attempt to an access category (AC) and one or more access identities (AIs) based on mapping rules, which may be pre-defined in standard specifications.
The UE may have received barring information, e.g. via SIB1 message. For each AC, barring information may comprise a barring factor, barring time, and barring indicator for each AIs. A barring indication for each AI informs whether an access attempt is allowed for this AI for this AC. The barring factor indicates the probability that a given access request can be allowed. The barring time defines the minimum time interval, e.g. UAC-BarringTime, before a new access attempt can be performed after it was barred. Then, the UE may perform an access barring check as defined in TS 24.501 and TS 38.331.
Network energy saving (NES) is important for networks such as the network 100 of
A network node or access node 120 can have one or more NES modes. The different NES modes or energy saving modes can have different levels of energy usage. For example, a first NES mode could have a first amount of the antenna resources active while a second NES mode could have a second amount of the antenna resources active where the first and second amounts are different. An NES mode or energy saving mode may relate to adaptation of at least one of: antenna resource usage, bandwidth of active bandwidth part (BWP), transmission power, time (slots occupied for DL transmissions).
For example, antenna resource usage may be adapted via adaptation of spatial elements/antennas. This adaptation aims to dynamically adapt the spatial elements using a scaling factor (e.g. sa) for the fraction of active antenna elements at the network node.
For example, transmission power of signals or channels may be adapted. This adaptation aims at adapting the transmission power or power spectral density (PSD) of downlink signals using a scaling factor (e.g. sp) for the ratio of PSD per transmission (Tx) between the DL transmission and reference configuration.
For example, bandwidth of active BWP may be adapted. This adaptation aims at adapting the bandwidth of active BWP using a scaling factor (e.g. sf) for the ratio between the RF bandwidth and the maximum system BW.
For example, adaptation in time domain aims at adapting the slots occupied with DL transmissions using a scaling factor (e.g. st) for the active slots occupied with data.
Let us consider apparatuses or devices such as an energy harvesting device, a RedCap device, an IoT device, an AIoT device, which may be referred to as a low-priority device or low-priority user equipment, UE. When a UE, e.g. a low-priority UE, wakes up a network node, which is in NES mode, it is inefficient from a NES point of view.
Examples of the disclosure provide methods and apparatuses configured to perform the methods to prevent UEs, e.g. low-priority UEs, from accessing the cells that are adopting NES techniques. For example, there is provided an access control process that can account for different NES modes or energy saving modes of a network 100.
The method of
At block 202 the method comprises performing an evaluation whether to initiate an access procedure with a network node 120. The evaluation comprises using at least one NES mode parameter in an evaluation criterion.
The evaluation can comprise any suitable mathematical operations. The evaluation criterion can comprise a mathematical operation based on the at least one network energy saving mode parameter. Examples of mathematical operations are given below.
The evaluation can comprise determining at least a first value using the NES mode parameter and comparing the determined value to a random number. The first value can be determined using the NES mode parameter in combination with one or more other parameters. The other parameters could be UAC parameters or any other suitable parameters. In some examples the first value could be the value of the NES mode parameter or could be determined without using any additional parameters.
The at least one NES mode parameter and the evaluation criterion can be received from the network node 120. The NES mode parameter can be an indication of an NES mode of the network node 120. The NES mode parameters can comprise NES barring factor, an NES barring time, and/or any other suitable parameters.
The at least one NES mode parameter can comprise different parameters for different energy saving modes of the network node 120. The different energy saving modes of the network node 120 can comprise different amounts of resources of the network node 102 being active or any other different types of arrangements of the network node 120. For example, the different NES modes can comprise at least a first mode (e.g. mode 1) and a second mode (mode 2), wherein the number of active resources at the network node 120 is higher in the first mode than in the second mode. For example, in mode 1, 75% of the resources of the network node are active; in mode 2, 50% of the resources of the network node are active; in mode 3, 25% of the resources of the network node are active.
The NES mode parameters can be associated with a specific type of apparatus. The different types of apparatus could be, or could be comprised within, a UE, an energy harvesting device, a RedCap device, an IoT device, an AIoT device or any other suitable type of device. The different NES mode parameters associated with the different types of apparatus can account for different levels of priority of the types of apparatus. For example, apparatuses or devices such as an energy harvesting device, a RedCap device, an IoT device, an AIoT device may be referred to as a low-priority device or low-priority UE.
In some examples the at least one NES mode parameter can comprise information specific to an access category (AC) and/or an access identity (AI). This can enable different NES mode parameters to be associated with different access categories and/or different access identities.
The at least one NES mode parameter can be received in any suitable format. In some examples the at least one NES mode parameter can be received as additional information to unified access control (UAC) parameters.
The at least one NES mode parameter can be received in any suitable signalling. In some examples the NES mode parameter can be received in a broadcast message, UAC information, a master information block (MIB) or a system information block (SIB).
The at least one evaluation criterion can be received in any suitable signalling. In some examples the NES mode parameter can be received in a broadcast message, UAC information, a master information block (MIB) or a system information block (SIB).
At block 204 the method comprises initiating the access procedure with a network node based on whether the evaluation criterion is satisfied. If the evaluation criteria is satisfied then the access procedure is initiated and if the evaluation criteria is not satisfied then the access procedure is not initiated.
If the evaluation criterion is not satisfied then the apparatus can be caused to perform starting a barring timer. The duration of the barring timer can be determined by an NES mode parameter and an evaluation criterion. Examples of calculation of the timer period are given below. The apparatus is barred from performing an access procedure with the network node 120 for the duration of the timer. The apparatus will wait until the determined time period expires before the apparatus makes a next attempt to access a cell provided by the network node 120.
In some examples the apparatus can receive an update for the NES mode parameter from the network node 120. The NES mode parameter could be updated by the network node 120 due to changes in the network load. The changes in the network load could be a current network load or an upcoming network load. The updates to the NES mode parameter could be received using any suitable signaling. The apparatus could then update or replace the at least one NES mode parameter based on the received update. The apparatus can then use the update or replaced NES mode parameter in an evaluation criterion.
In some examples the NES mode parameter that is received from the network node can comprise an indication of the NES mode. For example, the parameter could indicate if the network node is using mode 1, in which e.g. 75% of the resources of the network node are active; mode 2, in which e.g. 50% of the resources of the network node are active; or mode 3, in which e.g. 25% of the resources of the network node are active. Other modes with different percentages can be used in other examples. In such cases the apparatus can be caused to perform determining at least one of an NES barring factor or an NES barring time, based at least in part on the indicated network energy saving mode.
The determination of the NES barring factor or the NES barring time by the apparatus can also be based on other criteria. The other criteria can comprise criteria specific to the apparatus. This can provide improved flexibility for the apparatus. For example, the NES barring factor or the NES barring time, can be determined based, at least in part, on a buffer status of the apparatus. In such cases the apparatus can determine if the buffer of the apparatus is full, or above a threshold level. If the buffer is full or above a threshold level then apparatus could use an NES barring factor and/or NES barring time such that the apparatus is allowed to transmit to avoid any data loss. If the buffer is not full or is below a threshold level then apparatus could use an NES barring factor and/or NES barring time such that the apparatus restricts the access until more resources are available at the network node. The apparatus may also take into account its quality of service (QoS) requirements. For example, if QoS requirements are not too strict and the buffer is empty or not full or is below a threshold level, the apparatus could use an NES barring factor and/or NES barring time such that the apparatus restricts the access until more or all resources are available at the network node.
The method starts at block 300.
At block 302 the method comprises generating a first random number. The first random number can take any value between 0 and 1. Any suitable means can be used to generate the random number.
At block 304 the method comprises checking evaluation criterion. The evaluation criterion can be received from the network. The evaluation criterion can comprise one or more mathematical operations.
In the example of
If the determined value is equal to or greater than the generated random number then the evaluation criterion are determined to be satisfied. If the determined value is less than the generated random number then the evaluation criterion are determined not to be satisfied.
If the evaluation criterion is satisfied then at block 306 an access attempt is permitted. The access attempt can comprise a random access procedure, a Radio Resource Control (RRC) connection resume procedure, or any other suitable type of access procedure.
If the evaluation criterion is not satisfied then the access attempt is not permitted. The method proceeds to block 308. At block 308 the apparatus generates a second random number. The second random number can take any value between 0 and 1. The second random number can be generated using any suitable procedure.
At block 310 the second random number is used to determine a barring time period. The barring time period defines the time period for which the apparatus is considered to be barred. The apparatus does not make any more access attempts until the barring time period has expired.
The barring time period can be determined using any suitable mathematical operation. The mathematical operation that is to be used can be received from the network node 120. The mathematical operation that is to be used can be dependent upon the NES mode of the network and/or any other relevant factors. The mathematical operation that is used to determine the barring time period can use an NES barring time parameter that us received from the network, and/or any other suitable parameters. Examples of mathematical operations that can be used to determine the barring time are given below.
The apparatus will wait until the determined barring time period expires before the apparatus makes a next attempt to access a cell provided by the network node 120.
The example method shown in
At block 400 the method comprises transmitting one or more NES mode parameters and one or more evaluation criterion from the gNB to the UE. The NES mode parameters and one or more evaluation criterion can be transmitted in a broadcast message, UAC information, a master information block (MIB) or a system information block (SIB), or in any other suitable signalling.
In examples where the NES mode parameters and one or more evaluation criterion are transmitted with UAC information the signaling at block 400 can also comprise a barring factor, barring time and barring indicator for each Access Identity (AI). The NES mode parameters and evaluation criterion can be provided as additional information to the barring factor, barring time and barring indicator.
The NES mode parameters can comprise an NES barring factor, an NES barring time, and/or any other suitable parameters or combinations of parameters.
The NES mode parameters can be different for different NES modes of the gNB. The NES modes parameters can be set so as to implement different limits on network traffic for different NES modes. For example, a first NES mode could comprise the gNB using a sleep mode having a first duration and a second NES mode could comprise the gNB using a sleep mode having a second duration where the second duration is longer than the first duration. In this example the NES parameter, e.g. NES barring factor, could be set lower for the second NES mode so as to reduce access requests for the gNB. For example, configuring a value of ‘0’ for NES barring factor, all access control checks will lead to barred access attempts.
In some examples a first NES mode could comprise a first amount of resources being active and a second NES mode could comprise a second amount of resources being active where the second amount is less than the first amount. In such examples the NES parameter, e.g. NES barring factor, could be set lower for the second NES mode so as to reduce access requests for the gNB. For example, configuring a value of ‘0’ for NES barring factor, all access control checks will lead to barred access attempts.
In some examples, NES barring time parameter may be different for different NES modes. For example, a higher NES barring time may be set so as to increase UE waiting time and thereby reduce access requests for the gNB.
In some examples the NES mode parameters can apply to all UEs. This could be the case in examples where there are very limited active or available resources at the gNB.
In some examples different NES mode parameters can be associated with different types of UEs. For instance, some UEs can be classed as low priority UEs and could have higher levels of restrictions compared to other UEs that are not low priority UEs. The NES mode parameters could apply for the low priority UEs but not for other types of UEs. There could be multiple levels or priority for the UEs and multiple NES mode parameters for the respective priority levels. The priority level of the UEs can be determined based on the active resources at the gNB and/or any other suitable factors.
At block 402 the gNB can send an updated NES mode parameter. The NES mode parameter can be updated based on changes in a network load. The NES mode parameter can be updated to restrict network traffic to a limit. The change can be for a current network load or an upcoming network load. The changes in the NES mode parameter can indicate a change in NES mode being used by the gNB. The network can adjust the NES mode parameters to stop UE access and to keep network traffic below a limit.
If the gNB does not determine that an updated NES mode parameter is needed then block 402 can be omitted and the UE can perform the method using the NES mode parameters received at block 400.
The updated NES parameter can be transmitted in any suitable signaling. The updated NES parameter can be transmitted with other information that enables a UE to determine whether or not it is permitted to access a cell. In some examples the updated NES parameter can be transmitted using SIB1.
At block 404 the UE determines to perform the connection request. The connection request can enable the UE to transition from an IDLE/INACTIVE mode to a CONNECTED mode.
Once the UE has determined to perform the connection request then, at block 406, the UE checks the evaluation criterion to determine whether to initiate an access procedure, e.g. a random access procedure. The UE can map its access attempt to an AC or one or more AIs. The UE can use the NES mode parameters received at block 400 or 402 in the evaluation criterion. In some examples one or more additional parameters can also be used in the evaluation criterion. For example, one or more UAC parameters could also be used.
The evaluation criterion can comprise any suitable mathematical operation. As an example, the evaluation criterion could comprise the UE generating a uniformly distributed random number rnd between 0 and 1, and evaluating equation 1.
If the random number is less than the value of, the product of uac_BarringFactor and NESBarringFactor, then the access attempt is permitted. Otherwise, the access attempt is barred. In this example, configuring a value of ‘0’ for uac_BarringFactor or NESBarringFactor means that all checks of the evaluation criterion will lead to barred access attempts.
Other equations or mathematical operations can be used in the evaluation criterion depending on network implementations and NES requirements. In some examples, as shown in equations 2 and 3, the evaluation criterion can be based on an NES barring factor in combination with a uac_BarringFactor.
In some examples, as shown in equation 4 the evaluation criterion can be based on an NES barring factor alone without any other factors or parameters being used.
Other evaluation criterion could also be used in examples of the disclosure.
In some examples the UE could choose the evaluation criterion to use based on the NES mode or energy saving mode. For instance, in a first NES mode the evaluation criterion could comprise equation 1 and in a second NEs mode the evaluation criterion could comprise equation 2, or any other suitable mathematical operations.
If the evaluation criterion is satisfied then the method proceeds to block 408. The connection request is not barred and the UE can determine to initiate an access procedure with the gNB. The UE can send a connection request to the gNB at block 410. For example, the UE can initiate a random access procedure with the gNB.
If the evaluation criterion is not satisfied then the method proceeds to block 412. The connection request is barred and the UE determines not to initiate an access procedure with the gNB. The UE refrains from initiating an access procedure with the gNB. The UE does not send a connection request to the gNB at that point. Instead, at block 414 a barring time period is computed. The barring time period can define the duration that the UE treats the cell of the gNB as barred for the corresponding access category. The barring time period can be determined by any suitable timer such as T390.
The barring time period can be computed using a suitable mathematical operation from the evaluation criterion and any suitable NES mode parameters such as an NES barring time. The mathematical operation can also use any other suitable parameters such as a uac_BarringTime. Equation 5 gives an example of a mathematical operation that can be used to determine the barring time period.
Other equations or mathematical operations can be used to compute the barring time period depending on network implementations and NES requirements. In some examples, as shown in equation 6 the evaluation criterion can be based on an NES barring factor in combination with a uac_BarringTime.
In some examples, as shown in equation 7 the computation of the barring time period can be based on an NES barring factor alone without any other factors or parameters being used.
For example, configuring a value of NES barring time close to ‘0’ means that the UE is allowed to transmit a new connection request without waiting. Thus, a higher NES barring time may lead to larger waiting time for the UE. For example, a higher NES barring time may be set so as to increase UE waiting time and thereby reduce access requests for the gNB.
At block 416 the UE waits for the expiry of the barring time period. After the barring time period has expired the process can return to block 400 or 402. The UE can make a next attempt to access a cell provided by the gNB after the barring time period has expired. In some examples, the UE may try to access another network node, if UE is in a coverage of a cell provided by the other network node.
If the barring time period is close to 0 then the UE can transmit the connection request after the barring time period has expired. If the barring time period is greater than 1 the UE can transmit the connection request after the gNB has deactivated the current NES mode.
In these examples the energy consumed by a receiver can be modeled as the energy consumed by the components that maintain the necessary operation plus the energy consumed by the decoding stages corresponds to Rx activities. The gNB power consumption in active Uplink (UL) state PUL can be expressed as shown in equation 8.
where sa is the fraction of active transceiver units which can be expressed as shown in equation 9.
where, PActiveUL is the power consumption of the active transceiver units, Pmicrosleep is the power conserved by microsleeps of the active transceiver units, and Δ is the additional e.g., decoding power consumption.
The decoding power consumption can be assumed to increase with the data rate. The data rate can be correlated with the coding rate R. A linear function model can be used to describe the relationship between the data rate and the power consumed by the decoder can be expressed using equation 10.
where vk is specific to a decoder and models the decoder efficiency.
The expected uplink sum rate R=Σk=1K Rk and NES gain can be defined using equation 11,
where Pmax is active UL state power consumption with maximum load and active UEs.
In can be assumed that the UE has (finite) queue buffers to store the network layer data. Qk(t) can denote the queue backlog of k-th UE during time slot t, which evolves according to equation 12
where [x]+=max(x, 0), Rk(t) is the achievable rate, and Ak(t) denotes the data arrival with a mean arrival rate of [Ak(t)]=λk, ∀k.
In the model it is assumed that an access barring check involves the UE 502 generating a uniformly distributed random number rnd∈[0, 1], and evaluating the network configured values using equation q,
If the random number is less than the value, then the access attempt is permitted. Otherwise, the access attempt is barred for the current time. A barring access timer such as timer T390 is not considered for this model.
Table 1 gives an indication of the parameter assumptions that were made for the simulations that were used to obtain the results shown in
Table 2 gives an indication of the power consumption and the normalized network energy savings for the respective modes.
In examples of the disclosure when the network 100 identifies that traffic is exceeding the system limit, the network can use NES mode parameters and evaluation criterion to apply restrictions to UEs so as to keep the traffic under the system limit. The use of the NES mode parameters and evaluation criterion can improve the network energy savings and can enable the network nodes 120 to have longer sleep durations and/or fewer active resources at the gNB. For example, the NES Mode-3 shown in table 1 provides an NES of up to 72% compared to the baseline scenario.
The above results are one possible example case, and these may scale differently for different system configurations, and NES requirements. However, the underlying relationship between the parameters of power consumption, achievable rate, and network energy savings, will still hold.
As illustrated in
The processor 702 is configured to read from and write to the memory 704. The processor 702 may also comprise an output interface via which data and/or commands are output by the processor 702 and an input interface via which data and/or commands are input to the processor 702.
The memory 704 stores a computer program 706 comprising computer program instructions (computer program code) that controls the operation of the apparatus when loaded into the processor 702. The computer program instructions, of the computer program 706, provide the logic and routines that enables the apparatus to perform the methods illustrated in the Figs. The processor 702 by reading the memory 704 is able to load and execute the computer program 706.
The apparatus 700 therefore comprises means for:
The computer program 706 may arrive at the apparatus via any suitable delivery mechanism 708. The delivery mechanism 708 may be, for example, a machine-readable medium, a computer-readable medium, a non-transitory computer-readable storage medium, a computer program product, a memory device, a record medium such as a Compact Disc Read-Only Memory (CD-ROM) or a Digital Versatile Disc (DVD) or a solid-state memory, an article of manufacture that comprises or tangibly embodies the computer program 706. The delivery mechanism may be a signal configured to reliably transfer the computer program 706. The apparatus may propagate or transmit the computer program 706 as a computer data signal.
The computer program 706 can comprise computer program instructions for causing an apparatus to perform at least the following or for performing at least the following:
The computer program instructions may be comprised in a computer program, a non-transitory computer readable medium, a computer program product, a machine-readable medium. In some but not necessarily all examples, the computer program instructions may be distributed over more than one computer program.
Although the memory 704 is illustrated as a single component/circuitry it may be implemented as one or more separate components/circuitry some or all of which may be integrated/removable and/or may provide permanent/semi-permanent/dynamic/cached storage.
Although the processor 702 is illustrated as a single component/circuitry it may be implemented as one or more separate components/circuitry some or all of which may be integrated/removable. The processor 702 may be a single core or multi-core processor.
An example of a SIB1 that can be used in examples of the disclosure is given below. The SIB1 may comprise at least one NES mode parameter of the network node. For example, the SIB1 may comprise NES barring factor (uac-NESBarringFactor). For example, the SIB1 may comprise NES barring time (uac-NESBaringTime). For example, the SIB1 may comprise the NES barring factor and the NES barring time.
The SIB1 may enable the network node to indicate NES mode parameters for respective NES modes (cellBarredNES-Mode1/cellBarredNES-Mode2/cellBarredNES-Mode3). The apparatus can save the NES mode parameters, or updated NES mode parameters for each type of mode. Once the apparatus has stored the NES mode parameters for the respective NES modes the network can just send the NES mode and the apparatus can select the appropriate parameters based on the stored information.
The term ‘comprise’ is used in this document with an inclusive not an exclusive meaning. That is any reference to X comprising Y indicates that X may comprise only one Y or may comprise more than one Y. If it is intended to use ‘comprise’ with an exclusive meaning then it will be made clear in the context by referring to “comprising only one . . . ” or by using “consisting”.
In this description, the wording ‘connect’, ‘couple’ and ‘communication’ and their derivatives mean operationally connected/coupled/in communication. It should be appreciated that any number or combination of intervening components can exist (including no intervening components), i.e., so as to provide direct or indirect connection/coupling/communication. Any such intervening components can include hardware and/or software components.
As used herein, the term “determine/determining” (and grammatical variants thereof) can include, not least: calculating, computing, processing, deriving, measuring, investigating, identifying, looking up (for example, looking up in a table, a database or another data structure), ascertaining and the like. Also, “determining” can include receiving (for example, receiving information), accessing (for example, accessing data in a memory), obtaining and the like. Also, “determine/determining” can include resolving, selecting, choosing, establishing, and the like.
In this description, reference has been made to various examples. The description of features or functions in relation to an example indicates that those features or functions are present in that example. The use of the term ‘example’ or ‘for example’ or ‘can’ or ‘may’ in the text denotes, whether explicitly stated or not, that such features or functions are present in at least the described example, whether described as an example or not, and that they can be, but are not necessarily, present in some of or all other examples. Thus ‘example’, ‘for example’, ‘can’ or ‘may’ refers to a particular instance in a class of examples. A property of the instance can be a property of only that instance or a property of the class or a property of a sub-class of the class that includes some but not all of the instances in the class. It is therefore implicitly disclosed that a feature described with reference to one example but not with reference to another example, can where possible be used in that other example as part of a working combination but does not necessarily have to be used in that other example.
Although examples have been described in the preceding paragraphs with reference to various examples, it should be appreciated that modifications to the examples given can be made without departing from the scope of the claims.
Features described in the preceding description may be used in combinations other than the combinations explicitly described above.
Although functions have been described with reference to certain features, those functions may be performable by other features whether described or not.
Although features have been described with reference to certain examples, those features may also be present in other examples whether described or not.
The term ‘a’, ‘an’ or ‘the’ is used in this document with an inclusive not an exclusive meaning. That is any reference to X comprising a/an/the Y indicates that X may comprise only one Y or may comprise more than one Y unless the context clearly indicates the contrary. If it is intended to use ‘a’, ‘an’ or ‘the’ with an exclusive meaning then it will be made clear in the context. In some circumstances the use of ‘at least one’ or ‘one or more’ may be used to emphasis an inclusive meaning but the absence of these terms should not be taken to infer any exclusive meaning.
The presence of a feature (or combination of features) in a claim is a reference to that feature or (combination of features) itself and also to features that achieve substantially the same technical effect (equivalent features). The equivalent features include, for example, features that are variants and achieve substantially the same result in substantially the same way. The equivalent features include, for example, features that perform substantially the same function, in substantially the same way to achieve substantially the same result.
In this description, reference has been made to various examples using adjectives or adjectival phrases to describe characteristics of the examples. Such a description of a characteristic in relation to an example indicates that the characteristic is present in some examples exactly as described and is present in other examples substantially as described.
The above description describes some examples of the present disclosure however those of ordinary skill in the art will be aware of possible alternative structures and method features which offer equivalent functionality to the specific examples of such structures and features described herein above and which for the sake of brevity and clarity have been omitted from the above description. Nonetheless, the above description should be read as implicitly including reference to such alternative structures and method features which provide equivalent functionality unless such alternative structures or method features are explicitly excluded in the above description of the examples of the present disclosure.
Whilst endeavoring in the foregoing specification to draw attention to those features believed to be of importance it should be understood that the Applicant may seek protection via the claims in respect of any patentable feature or combination of features hereinbefore referred to and/or shown in the drawings whether or not emphasis has been placed thereon.
Number | Date | Country | Kind |
---|---|---|---|
2319262.8 | Dec 2023 | GB | national |