The present idea relates to a node, a server, a repository and methods of operating the same for handling a background data transfer.
There exist mechanisms that allow a (third party) server to negotiate a background data transfer policy with an operator that fulfils the requirements of the server in order for that the server to start sending traffic to a group of user equipments (UEs). For example, such mechanisms exist for a services capability server (SCS) or application server (AS) of an evolved packet core (EPC) or a 4G network and for an application function (AF) of a 5G network. The SCS/AS of an EPC or a 4G network negotiates background data transfer policies with a policy and charging rules function (PCRF), whereas the AF of a 5G network negotiates background data transfer policies with a policy control function (PCF).
Generally, in order to negotiate a background data transfer policy in an EPC or a 4G network, the SCS/AS contacts a service capability exposure function (SCEF) using the Nt interface that interacts with the PCRF to negotiate the background data transfer policy that fulfils the requirements of the SCS/AS. Once negotiated, the background data transfer policy is usually stored in the subscription profile repository (SPR) together with a Reference ID that identifies the related policy in future transactions. Such Reference ID is generally referenced by a UE for starting the background data transfer. When the SCS/AS needs to transfer background data traffic to the UE, it will contact the PCRF either directly by acting as an application function (AF) or via the SCEF. The SCS/AS provides the Reference ID to the PCRF for each UE individually, together with SCS/AS session information, via the Rx interface. The PCRF retrieves the background data transfer policy stored in the SPR using the received Reference ID. If the AF request is within a time window provided in the previously negotiated background data transfer policy, the PCRF derives the corresponding policy and charging control (PCC) rules and reserves the resources according to the demands of the AS.
The same process occurs in order to negotiate a background data transfer policy in a 5G network, except the process involves the AF instead of the SCS/AS, a network exposure function (NEF) instead of the SCEF, the N30 interface instead of the Nt interface, a unified data repository (UDR) instead of the SPR, the PCF instead of the PCRF, and the N5 interface instead of the Rx interface.
When negotiating a background data transfer policy from a server to a UE, one or more conditions are agreed that the background data transfer from the server to the UE must meet. However, it may be the case that the UE breaches one or more of these agreed conditions and there currently exists no appropriate mechanism for handling such a breach. For example, currently, operators are only aware of a breach from offline information and the operators simply apply a penalty to servers involved in the transfer for which the breach occurs. This mechanism is not appropriate as it can be difficult for operators to manage the enforcement of the penalties, since different servers may require different penalties depending on the scenario and the conditions that are breached, which can make the process complex and resource heavy.
There is thus a need for an improved means for handling a background data transfer, which overcomes at least some of the problems associated with existing mechanisms.
It is an object to obviate or eliminate at least some of the above disadvantages associated with existing mechanisms and provide an improved mechanism for handling a background data transfer.
Therefore, according to an aspect of the idea, there is provided a method of operating a server of a first network. The method comprises generating an indication of an action to initiate for handling a transfer of background data from the server to a user equipment if the transfer fails to satisfy one or more conditions of an assigned background data transfer policy for the transfer. The method also comprises transmitting the indication for a node of a second network to acquire the indication and initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy.
The idea thus provides an improved mechanism for handling a background data transfer. This mechanism is improved as the server is able to control the manner in which the background data transfer is handled (e.g. whether the background data transfer is disallowed or allowed and under what conditions) when one or more conditions of the background data transfer policy are broken, since the server of the first network (rather than any node of the second network) provides the action to be taken in this situation. In this way, different server needs can be satisfied and the network can thus be used in the optimum way according to the background data transfer. This allows for the reservation of resources and thus provides an improved user experience. The node (e.g. an operator) can still provide resources for the background data transfer but under new negotiated conditions. This allows the server (e.g. an application or service provider) to still provide the data transfer even though the original conditions cannot be satisfied. The user experience is improved as the background data can be transferred even in cases where the original conditions are not satisfied.
In some embodiments, the method may further comprise, if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy, receiving a notification from the node that the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy. In this way, both the node and the server are aware of the transfer failing to satisfy the one or more conditions of the assigned background data transfer policy, such that the transfer can still take place if it is acceptable by both the node (e.g. an operator) and a server (e.g. an application or service provider) under new conditions.
According to another aspect of the idea, there is provided a server of a first network. The server comprises processing circuitry. The processing circuitry of the server is configured to generate an indication of an action to initiate for handling a transfer of background data from the server to a user equipment if the transfer fails to satisfy one or more conditions of an assigned background data transfer policy for the transfer. The processing circuitry of the server is also configured to transmit the indication for a node of a second network to acquire the indication and initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy. The idea thus provides the advantages discussed earlier in respect of the method of operating the server of the first network.
According to another aspect of the idea, there is provided a method of operating node of a second network. The method comprises receiving, from a server of a first network, a request to transfer background data from the server to a user equipment and acquiring an assigned background data transfer policy for the transfer and an indication generated by the server of an action to initiate for handling the transfer if the transfer fails to satisfy one or more conditions of the assigned background data transfer policy. The method also comprises monitoring the transfer to check whether the transfer satisfies the one or more conditions of the assigned background data transfer policy and, if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy, initiating the action. The idea thus provides the advantages discussed earlier in respect of the method of operating the server of the first network.
In some embodiments, the one or more conditions of the assigned background data transfer policy may comprise any one or more of a maximum volume of background data for the transfer, a maximum duration for the transfer and a predefined area within the second network for the transfer. The monitoring of any one or more of these conditions allows the node (e.g. the operator) to discover that the request for the transfer of background data cannot be satisfied according to the background data transfer policy agreed upon with the server (e.g. the application or service provider).
This allows the node to renegotiate the one or more conditions or terminate the transfer.
In some embodiments, the one or more conditions of the assigned background data transfer policy may comprise a maximum volume of background data for the transfer and the action may be initiated if the volume of background data for the transfer exceeds the maximum volume. In this way, if the server (e.g. the application or service provider) exceeds an authorized volume, the node (e.g. the operator) has a mechanism that allows it to either renegotiate a new volume of background data for the transfer or terminate the transfer if new conditions are not acceptable.
In some embodiments, the one or more conditions of the assigned background data transfer policy may comprise a maximum duration for the transfer and the action may be initiated if the duration of the transfer exceeds the maximum duration. In this way, if the server (e.g. the application or service provider) exceeds an authorized duration, the node (e.g. the operator) has a mechanism that allows it to either renegotiate a new duration for the transfer or terminate the transfer if new conditions are not acceptable.
In some embodiments, the one or more conditions of the assigned background data transfer policy may comprise a predefined area within the second network for the transfer and the action may be initiated if the transfer occurs outside the predefined area within the second network. In this way, if the server (e.g. the application or service provider) wants to transfer background data outside the predefined area, the node (e.g. the operator) has a mechanism that allows it to either renegotiate the authorized areas or terminate the transfer if new conditions are not acceptable.
In some embodiments, the action may comprise disallowing the transfer, allowing the transfer only according to one or more conditions of a default background data transfer policy of the node, or allowing the transfer only according to one or more revised conditions of the assigned background data transfer policy, wherein the one or more revised conditions are indicated by the server. Thus, the node (e.g. the operator) has various options available that can be selected depending on an agreement between the node and the server (e.g. the application or service provider), satisfying new demands if possible.
In some embodiments, the method may further comprise, if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy, transmitting a notification to the server of the first network that the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy. That way, the server (e.g. the application or service provider) has knowledge of the transfer failing to satisfy the one or more conditions of the assigned background data transfer policy, such that the server can react and still provide the data transfer under new conditions if they are acceptable.
According to another aspect of the idea, there is provided a node of a second network. The node comprises processing circuitry. The processing circuitry of the node is configured to receive, from a server of a first network, a request to transfer background data from the server to a user equipment and acquire an assigned background data transfer policy for the transfer and an indication generated by the server of an action to initiate for handling a transfer if the transfer fails to satisfy one or more conditions of the assigned background data transfer policy. The processing circuitry of the node is also configured to monitor the transfer to check whether the transfer satisfies the one or more conditions of the assigned background data transfer policy and, if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy, initiate the action. The idea thus provides the advantages discussed earlier in respect of the method of operating the server of the first network.
In some embodiments, the one or more conditions of the assigned background data transfer policy may comprise any one or more of a maximum volume of background data for the transfer, a maximum duration for the transfer, and a predefined area within the second network for the transfer. The monitoring of any one or more of these conditions allows the node (e.g. the operator) to discover that the request for the transfer of background data cannot be satisfied according to the background data transfer policy agreed upon with the server (e.g. the application or service provider). This allows the node to renegotiate the one or more conditions or terminate the transfer.
In some embodiments, the one or more conditions of the assigned background data transfer policy may comprise a maximum volume of background data for the transfer and the processing circuitry may be configured to initiate the action if the volume of background data for the transfer exceeds the maximum volume. In this way, if the server (e.g. the application or service provider) exceeds an authorized volume, the node (e.g. the operator) has a mechanism that allows it to either renegotiate a new volume of background data for the transfer or terminate the transfer if new conditions are not acceptable.
In some embodiments, the one or more conditions of the assigned background data transfer policy may comprise a maximum duration for the transfer and the processing circuitry may be configured to initiate the action to the user equipment if the duration of the transfer to the user equipment exceeds the maximum duration. In this way, if the server (e.g. the application or service provider) exceeds an authorized duration, the node (e.g. the operator) has a mechanism that allows it to either renegotiate a new duration for the transfer or terminate the transfer if new conditions are not acceptable.
In some embodiments, the one or more conditions of the assigned background data transfer policy may comprise a predefined area within the second network for the transfer and the processing circuitry may be configured to initiate the action if the transfer occurs outside the predefined area within the second network. In this way, if the server (e.g. the application or service provider) wants to transfer background data outside the predefined area, the node (e.g. the operator) has a mechanism that allows it to either renegotiate the authorized areas or terminate the transfer if new conditions are not acceptable.
In some embodiments, the action may comprise disallowing the transfer, allowing the transfer only according to one or more conditions of a default background data transfer policy of the node, or allowing the transfer only according to one or more revised conditions of the assigned background data transfer policy, wherein the one or more revised conditions are indicated by the server. Thus, the node (e.g. the operator) has various options available that can be selected depending on an agreement between the node and the server (e.g. the application or service provider), satisfying new demands if possible.
In some embodiments, the processing circuitry may be further configured to, if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy, transmit a notification to the server of the first network that the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy. That way, the server (e.g. the application or service provider) is provided with knowledge of the transfer failing to satisfy the one or more conditions of the assigned background data transfer policy, such that the server can react and still provide the data transfer under new conditions if they are acceptable.
According to another aspect of the idea, there is provided a method of operating a repository of a second network. The method comprises receiving an assigned background data transfer policy for a transfer of background data from a server of a first network to a user equipment and an indication generated by the server of an action to initiate for handling the transfer if the transfer fails to satisfy one or more conditions of the assigned background data transfer policy. The method also comprises storing the assigned background data transfer policy and the indication of the action for a node of a second network to acquire in order to initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy. The idea thus provides the advantages discussed earlier in respect of the method of operating the server of the first network.
According to another aspect of the idea, there is provided a repository of a second network. The repository is configured to receive a background data transfer policy assigned for a transfer of background data from a server of a first network to a user equipment and an indication generated by the server of an action to initiate for handling the transfer if the transfer fails to satisfy one or more conditions of the assigned background data transfer policy. The repository is also configured to store the assigned background data transfer policy and the indication of the action for a node of a second network to acquire in order to initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy. The idea thus provides the advantages discussed earlier in respect of the method of operating the server of the first network.
According to another aspect of the idea, there is provided a computer program product comprising a carrier containing instructions for causing processing circuitry to perform a method as described earlier. The idea thus provides the advantages discussed earlier in respect of the method of operating the node, server, and repository.
Therefore, an improved means for handling a background data transfer is provided.
For a better understanding of the idea, and to show how it may be put into effect, reference will now be made, by way of example, to the accompanying drawings, in which:
As mentioned earlier, there is described herein an improved mechanism for handling a background data transfer. A background data transfer referred to herein is the transfer of any type of background data. A background data transfer can be defined as a transfer of data in the background. That is, a background data transfer can be any data transfer that occurs without, or irrespective of, user interaction. Background data may refer to non-time critical data that a server (e.g. a service or application of the server) needs to send to a user equipment (UE). The server may have knowledge of the timing for the transmission of background data and the amount of background data for transmission. Examples of background data include, but are not limited to, software upgrades or audio/video data for future use. The background data transfer described herein is from a server of a first network to a user equipment (UE).
As illustrated in
Briefly, the processing circuitry 12 of the server 10 is configured to generate an indication of an action to initiate for handling a transfer of background data from the server 10 to a user equipment if the transfer fails to satisfy one or more conditions of an assigned background data transfer policy for the transfer. The processing circuitry 12 of the server 10 is also configured to transmit the indication for a node of a second network to acquire the indication and initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy.
As illustrated in
The memory 14 of the server 10 can comprise a volatile memory or a non-volatile memory. In some embodiments, the memory 14 of the server 10 may comprise a non-transitory media. Examples of the memory 14 of the server 10 include, but are not limited to, a random access memory (RAM), a read only memory (ROM), a mass storage media such as a hard disk, a removable storage media such as a compact disk (CD) or a digital video disk (DVD), and/or any other memory.
In some embodiments, as illustrated in
The processing circuitry 12 of the server 10 may be configured to control the communications interface 16 of the server 10 to transmit to and/or receive from other nodes requests, policies, indications, information, data, notifications, signals, or similar, that are described herein.
It will be appreciated that
With reference to
Although not illustrated in
As illustrated in
Briefly, the processing circuitry 22 of the node 20 is configured to receive, from a server 10 of a first network, a request to transfer background data from the server to a user equipment. The processing circuitry 22 of the node 20 is also configured to acquire an assigned background data transfer policy for the transfer and an indication generated by the server of an action to initiate for handling a transfer if the transfer fails to satisfy one or more conditions of the assigned background data transfer policy. The processing circuitry 22 of the node 20 is further configured to monitor the transfer to check whether the transfer satisfies the one or more conditions of the assigned background data transfer policy and, if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy, initiate the action.
As illustrated in
The memory 24 of the node 20 can comprise a volatile memory or a non-volatile memory. In some embodiments, the memory 24 of the node 20 may comprise a non-transitory media. Examples of the memory 24 of the node 20 include, but are not limited to, a random access memory (RAM), a read only memory (ROM), a mass storage media such as a hard disk, a removable storage media such as a compact disk (CD) or a digital video disk (DVD), and/or any other memory.
In some embodiments, as illustrated in
It will be appreciated that
With reference to
At block 202, an assigned background data transfer policy for the transfer and an indication is generated by the server 10 is acquired. More specifically, the processing circuitry 22 of the node 20 acquires the assigned background data transfer policy and the indication. The indication is of an action to initiate for handling the transfer if the transfer fails to satisfy one or more conditions of the assigned background data transfer policy. In some embodiments, acquiring the assigned background data transfer policy at block 202 can comprise the processing circuitry 22 of the node 20 assigning the background data transfer policy for the transfer. Thus, in some embodiments, the processing circuitry 22 of the node 20 can be configured to assign the background data transfer policy for the transfer. In this way, the node 20 itself may assign the background data transfer policy for the transfer according to some embodiments.
In other embodiments, another node (e.g. another PCRF or PCF) may assign the background data transfer policy for the transfer. In these embodiments, when the policy is assigned by another node, acquiring the assigned background data transfer policy at block 202 can comprise the processing circuitry 22 of the node 20 retrieving the assigned background data transfer policy from a repository of the second network. For example, the node that assigned the background data transfer policy can be configured to store the assigned background data transfer policy in the repository of the second network. Thus, in some embodiments, the processing circuitry 22 of the node 20 can be configured to retrieve the assigned background data transfer policy from the repository of the second network.
In some embodiments, the assigned background data transfer policy may be stored in the repository of the second network with a reference that identifies the assigned background data transfer policy (which is referred to as a “Reference ID”). Thus, in some embodiments, the assigned background data transfer policy can be retrieved using this reference. In some embodiments, the processing circuitry 22 of the node 20 can be configured to retrieve the assigned background data transfer policy from the repository of the second network via a network interface, such as the Nt interface where the first and second network are part of an EPC network or 4G network, or the N30 interface where the first and second network are part of a 5G network.
In some embodiments, acquiring the indication of the action may comprise the processing circuitry 22 of the node 20 retrieving the indication of the action from the repository of the second network. Thus, in some embodiments, the processing circuitry 22 of the node 20 can be configured to retrieve the indication of the action from the repository of the second network. In other embodiments, the request received from the server 10 may comprise the indication of the action.
Returning back to
Although not illustrated in
The repository 30 can be configured to store any requests, policies, indications, information, data, notifications, signals, or similar, that are described herein. The processing circuitry 22 of the node 20 may be configured to control the repository 30 to store any requests, policies, indications, information, data, notifications, signals, or similar, that are described herein. The repository 30 can comprise a volatile repository or a non-volatile repository. In some embodiments, the repository 30 may comprise a non-transitory media. Examples of the repository 30 include, but are not limited to, a random access memory (RAM), a read only memory (ROM), a mass storage media such as a hard disk, a removable storage media such as a compact disk (CD) or a digital video disk (DVD), and/or any other memory.
Briefly, the repository 30 is configured to receive a background data transfer policy assigned for a transfer of background data from a server 10 of a first network to a user equipment and an indication generated by the server 10 of an action to initiate for handling the transfer if the transfer fails to satisfy one or more conditions of the assigned background data transfer policy. The repository 30 is also configured to store the assigned background data transfer policy and the indication of the action for a node 20 of a second network to acquire in order to initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy.
With reference to
At block 302, the assigned background data transfer policy and the indication of the action is stored for the node 20 of the second network to acquire in order to initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy. More specifically, the repository 30 stores the assigned background data transfer policy and the indication. In some embodiments, the background data transfer policy may be assigned for the transfer by the same node as the node 20 that acquires the policy in order to initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy. In other embodiments, the background data transfer policy may be assigned for the transfer by a different node to the node 20 that acquires the policy in order to initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy.
The one or more conditions of the assigned background data transfer policy that are referred to herein may, for example, comprise any one or more of a maximum volume of background data for the transfer, a maximum duration (e.g. a set time window) for the transfer, and a predefined area within the second network for the transfer. In some embodiments where the one or more conditions of the assigned background data transfer policy comprise a maximum volume of background data for the transfer, the action may be initiated if the volume of background data for the transfer exceeds the maximum volume. In some embodiments where the one or more conditions of the assigned background data transfer policy comprise a maximum duration (e.g. a set time window) for the transfer, action may be initiated if the duration of the transfer exceeds the maximum duration (e.g. if the transfer continues beyond the set time window). In some embodiments where the one or more conditions of the assigned background data transfer policy comprise a predefined area within the second network 404 for the transfer, the action may initiated if the transfer occurs outside the predefined area within the second network 404. The transfer may, for example, occur outside the predefined area within the second network 404 due to the movement of the user equipment.
Although some examples have been provided for the one or more conditions of the assigned background data transfer policy and the actions that may be taken if such one or more conditions are not satisfied, it will be understood that the assigned background data transfer policy may comprise any other conditions, or any combination of conditions, and any other corresponding actions.
In some embodiments, the action referred to herein may comprise disallowing (or terminating) the transfer. In other embodiments, the action referred to herein may comprise allowing the transfer only according to one or more conditions of a default background data transfer policy of the node 20. In yet other embodiments, the action referred to herein may comprise allowing the transfer only according to one or more revised conditions of the assigned background data transfer policy. In some of these embodiments, the one or more revised conditions may be indicated by the server 10. In some embodiments where the server 10 indicates the one or more revised conditions, a default background data transfer policy may also be negotiated with the node 20.
In some embodiments, as illustrated in
In some embodiments, as also illustrated in
As illustrated in
Although not illustrated in the figures, the background data transfer described herein can be via a network interface. In embodiments where the first and second networks 402, 404 are part of an evolved packet core (EPC) or a 4G network, the background data transfer can be via the Rx interface. In embodiments where the first and second networks are part of a 5G network, the background data transfer can be via the N5 interface.
Although it has been described herein that “an” assigned background data transfer policy is acquired by the node 20, it will be understood that, in some embodiments, a plurality of assigned background data transfer policies may be acquired by the node 20. In some of these embodiments, the processing circuitry 22 of the node 20 may be configured to select an assigned background data transfer policy of the plurality of assigned background data transfer policies. In some embodiments, the server 10 may indicate to the node 20 which assigned background data transfer policy of the plurality of assigned background data transfer policies the node 20 is to select. In other words, the server 10 can select an assigned background transfer policy from the plurality of background data transfer policies according to some embodiments. Thus, in these embodiments, the node 20 can be configured to select the assigned background data transfer policy that is indicated by the server 10.
Firstly, the server 10 of the first network 402 generates an indication of an action to initiate for handling a transfer of background data from the server 10 to a user equipment if the transfer fails to satisfy one or more conditions of an assigned background data transfer policy for the transfer. The server 10 transmits the indication for the node 20 of the second network 404 to acquire the indication and initiate the action if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy.
With reference to
Following the transmission of the BDT request 800 comprising the indication, the BDT request 800 is received by the exposure node 40 and, at block 802, the exposure node 40 authorizes the BDT request 800. The exposure node 40 then contacts the node 20. Thus, in some embodiments, the node 20 receives the BDT request 800 from the server 10 via the exposure node 40. However, it will be understood that in other embodiments, the node 20 may receive the BDT request 800 directly from the server 10. As mentioned earlier, according to the example embodiment illustrated in
When the node 20 receives the BDT request 800, at block 804, the node 20 acquires an assigned background data transfer policy for the transfer. According to the example embodiment illustrated in
Also, at block 804, the node 20 transmits the assigned background data transfer policy to the server 10. In some embodiments, such as that illustrated in
In embodiments where a plurality of assigned background data transfer policies are transmitted to the server 10, as mentioned earlier, the server 10 can select an assigned background transfer policy from the plurality of background data transfer policies. In some of these embodiments, such as that illustrated in
At block 812, the exposure node 40 forwards the BDT request 800 (or the further BDT request 808 according to some embodiments) to the node 20. The BDT request 800 (or the further BDT request 808 according to some embodiments) can be forwarded to the node 20 according to current policy and charging control (PCC) procedures. In some embodiments, the node 20 can be configured to store, in the repository 30 of the second network 404, the assigned background data transfer policy (or the selected one of the plurality of assigned background transfer policies according to some embodiments) and the indication of the action.
At block 814, when the server 10 wishes to initiate the transfer of background data from the server 10 to the user equipment, the server 10 contacts the node 20, e.g. via the exposure node 40. The server 10 may contact the node 20 according to current policy and charging control (PCC) procedures. The server 10 may contact the node 20 via a network interface, e.g. the Rx interface where the first and second network 402, 404 are part of an evolved packet core (EPC) or a 4G network, or the N5 interface where the first and second network 402, 404 are part of a 5G network. In some embodiments, the server 10 may contact the node 20 with a reference that identifies the assigned background data transfer policy (or the selected one of the plurality of assigned background transfer policies according to some embodiments). The node 20 acquires the assigned background data transfer policy (or the selected one of the plurality of assigned background transfer policies according to some embodiments) and the indication of the action to initiate for handling the transfer if the transfer fails to satisfy one or more conditions of the assigned background data transfer policy in the manner described earlier. In some embodiments, the node 20 may install policy and charging control (PCC) rules according to the one or more conditions of the assigned background data transfer policy.
The node 20 starts the monitoring of the transfer at block 814 to check whether the transfer satisfies the one or more conditions of the assigned background data transfer policy. Thus, in effect, the node 20 monitors the one or more conditions of the background data transfer policy. In some embodiments, the node 20 may subscribe to events in the enforcement or management node 50 of the second network 404 to receive information from the enforcement or management node 50 for use in checking whether the transfer satisfies the one or more conditions of the assigned background data transfer policy. The information may, for example, comprise usage reports, user equipment location changes, of any other information, or any combination of information, that can be used to check whether the transfer satisfies the one or more conditions of the assigned background data transfer policy. If the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy (e.g. if the node 20 identifies that the one or more conditions are not fulfilled), the node 20 checks the action to initiate and then initiates the action. The one or more conditions may be any of those described earlier.
In some embodiment, if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy, the action may comprise disallowing (or terminating) the transfer. Thus, the node 20 disallows (or terminates) the transfer in these embodiments, e.g. via the network interface mentioned earlier. The node 20 may also remove the installed policy and charging control (PCC) rules in these embodiments. In other embodiments, if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy, the action may comprise allowing the transfer only according to one or more conditions of a default background data transfer policy of the node 20. In these embodiments, the node 20 may check the default background data transfer policy and modify the installed PCC rules according to the one or more conditions of the default background data transfer policy. In yet other embodiments, if the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy, the action may comprise allowing the transfer only according to one or more revised conditions of the assigned background data transfer policy. In these embodiments, the node 20 may modify the installed PCC rules according to the one or more revised conditions of the assigned background data transfer policy. In some embodiments where the PCC rules are modified, the node 20 may apply a different charging for the modified PCC rules.
In some embodiments, at block 814, the node 20 may transmit to the server 10 a notification that the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy. In some embodiments, the node 20 may transmit the notification to the exposure node 40 and the exposure node 40 may then notify the server 10 that the transfer fails to satisfy the one or more conditions of the assigned background data transfer policy.
The network functionality described herein can be performed by hardware. Thus, the network 400, 402, 404 can be a hardware network. For example, the server 10, 900 can be a hardware server, the node 20, 1000 can be a hardware node, the repository 30, 1100 can be a hardware repository, the exposure node 40 can be a hardware exposure node, and/or the enforcement or management node 50 can be a hardware enforcement or management node.
However, it will also be understood that at least part or all of the network functionality described herein can be virtualized. For example, the functions performed within the network 400, 402, 404 (e.g. by any one or more of the server 10, 900, the node 20, 1000, the repository 30, 1100, the exposure node 40, and enforcement or management node 50) can be implemented in software running on generic hardware that is configured to orchestrate the network functionality. Thus, in some embodiments, the network 400, 402, 404 can be a virtual network. In these embodiments, the server 10, 900 can be a virtual server, the node 20, 1000 can be a virtual node, the repository 30, 1100 can be a virtual repository, the exposure node 40 can be a virtual exposure node, and/or the enforcement or management node 50 can be a virtual enforcement or management node. In some embodiments, at least part or all of the network functionality described herein may be performed in a network enabled cloud.
There is also provided a computer program product comprising a carrier containing instructions for causing processing circuitry to perform at least part of the method described herein. In some embodiments, the carrier can be any one of an electronic signal, an optical signal, an electromagnetic signal, an electrical signal, a radio signal, a microwave signal, or a computer-readable storage medium.
Thus, in the manner described herein, it is possible to negotiate and make use of a transfer policy that allows a server to transfer background data to a user equipment under certain conditions. Moreover, appropriate action is taken when it is determined that one or more of these conditions are broken to advantageously enable an optimum background data transfer. There is thus advantageously provided herein an improved mechanism for handling a background data transfer.
It should be noted that the above-mentioned embodiments illustrate rather than limit the idea, and that those skilled in the art will be able to design many alternative embodiments without departing from the scope of the appended claims. The word “comprising” does not exclude the presence of elements or steps other than those listed in a claim, “a” or “an” does not exclude a plurality, and a single processor or other unit may fulfil the functions of several units recited in the claims. Any reference signs in the claims shall not be construed so as to limit their scope.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/CN2018/102258 | 8/24/2018 | WO | 00 |