3GPP SA6 defines the Service Enabler Architecture Layer for Verticals (SEAL) to provide for a horizontal layer in which common services are made available to the vertical application layer, in for example: 3GPP TS 23.434, Service Enabler Architecture Layer for Verticals (SEAL); Functional architecture and information flows; V17.4.0; 3GPP SP-210955, Study on SEAL data delivery enabler for vertical applications; and 3GPP TR 23.700-34, Study on SEAL data delivery enabler for vertical applications; V0.3.0.
Methods and systems are described herein for the support of redundant transport in a cellular system at a service layer. For example, redundant transport may be provided by the SEAL Data Delivery (SEALDD) layer of a 5G application enabler system as the SEALDD layer may offer common, horizontal services to some or all vertical applications. This approach may centralize the support of redundant transport at the SEALDD layer to ensure compatibility among various vertical applications and to minimize duplication of functionality at vertical application layers that may not be compatible. Application clients and servers may utilize a common interface to obtain reliable communications without the need to support session management functionalities required by redundant transport.
In one aspect, an API definition is described for application clients and servers to request data delivery service from the SEALDD layer and may provide application client triggered as well as application server triggered procedures for enabling communications with redundant transport. In addition, the SEALDD layer may also initiate an upgrade of single transport communication to redundant transport communication for reliable data delivery.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. Furthermore, the claimed subject matter is not limited to limitations that solve any or all disadvantages noted in any part of this disclosure.
The following detailed description is better understood when read in conjunction with the appended drawings. For the purposes of illustration, examples are shown in the drawings; however, the subject matter is not limited to specific elements and instrumentalities disclosed. In the drawings:
Methods and apparatuses are described herein for support of redundant transport in a cellular system at a service layer.
The following abbreviations may be used herein:
Vertical Application Layer (VAL) client(s) may access one or more services offered by SEAL client(s) on the UE, which may transport traffic to SEAL server(s) using the SEAL-UU interface. The SEAL server may route the traffic to the destination VAL server(s) and may communicate with other SEAL server(s). In addition, the SEAL server(s) may have access to network exposure information via network interfaces with the 3GPP network. The SEAL services may be accessed by VAL clients and VAL servers via API exposure of the common functions offered by the SEAL layer to at least a plurality of vertical applications.
A SEAL server may be deployed as part of a PLMN operator domain or a VAL service provider domain. When deployed in a VAL service provider domain, the SEAL server may have connections to multiple PLMN operator domains. The SEAL server may connect to the 3GPP network system, and one SEAL server may support multiple VAL servers. The functional model of the SEAL layer may be described as on-network in which communications involve the 3GPP network or off-network in which communications occur between two UEs.
In Release 18, 3GPP recognized the need for application layer support of efficient data distribution, delivery, and caching towards the application layer. The study on the SEAL Data Delivery (SEALDD) enabler aims to study new capabilities for data delivery of application data. Aspects of the study comprise potentially integrating existing functionalities such as MSGin5G and data delivery over 5G Mulitcast-Broadcast Services. Other aspects comprise the introduction of new capabilities for supporting application functions such as caching and delivery of application content or data, different application data characteristics, and end-to-end Ultra-Reliable Low Latency Communication (URLLC) data delivery mechanisms. 3GPP SP-210955 captures the objectives of the SEALDD study.
Dual connectivity was specified in Release 16 to support URLLC traffic where the UE establishes PDU sessions over a master RAN node and a secondary RAN node. The two PDU sessions are set up with disjointed user plane paths to provide redundancy for the underlying traffic. At the transmitter end, data may be duplicated and sent over both PDU sessions and at the receiver end, data from one PDU session may be eliminated when data is available from both PDU sessions. In the event data from one PDU session is lost, the receiver may be able to use data from the other PDU session to continue service uninterrupted.
In Release 17, redundant transmission using dual connectivity was enhanced to provide the RAN node with both a Redundancy Sequence Number (RSN) and a PDU Session Pair ID. The RSN, which was already provided to the RAN node in Release 16, only informs the RAN node whether a PDU session was redundant. However, the RAN node did not know which PDU session pair was redundant and could be associated with each other until the introduction of the PDU Session Pair ID in Release 17. The RAN node may use the PDU Session Pair ID to associate the PDU sessions and further optimize the redundant traffic. The PDU Session Pair ID and RSN values are defined in UE Route Selection Policy (URSP) rules that the UE uses to route application traffic to PDU sessions the UE establishes with the 5G core network.
The 5G network may expose information about the UE and the performance of the network through the use of analytics provided by the Network Data Analytics Function (NWDAF). Application servers may have direct access to the NWDAF if they are operated by the mobile network operator or via the Network Exposure Function (NEF) if the application server is a third party. The NWDAF may provide statistics or predictions on such information as observed service experience, network function loading, network performance, UE mobility, UE communications, user data congestion, QOS sustainability, etc.
One aspect of the SEALDD study focuses on the support of end-to-end data delivery mechanisms for URLLC cases. This aspect was captured as Key Issue #1 in 3GPP TR 23.700-34. The support for end-to-end data delivery depends on the availability of dual connectivity functionality introduced in Release 16. Currently, dual connectivity support is at the lower layers of the protocol stack and as a result, it is expected that upper layer support is required to take advantage of dual connectivity for redundant transmission. Therefore, the application layer may need to support data replication and elimination required for redundant transmission.
Key Issue #1 of 3GPP TR 23.700-34 notes that upper layer protocols supporting redundant communications may not always be available for application clients and that procedures to use redundant user plane paths are not yet defined. Therefore, support for packet/data duplication and elimination are needed at the application layer to enable end-to-end redundant transport. In addition, the new enabler service needs to properly interact with existing dual connectivity functionality provided by the 5G network. Finally, having the redundant communication support at the SEALDD layer enables multiple vertical applications to take advantage of the redundant transport.
The support of redundant transport may best be provided by the SEALDD layer of the 5G application enabler system as the SEALDD layer offers common, horizontal services to all vertical applications. Example approaches described herein centralize the support of redundant transport at the SEALDD layer, ensuring compatibility among various vertical applications and reducing or avoiding duplication of functionality at vertical application layers that may not be compatible. Application clients and servers may utilize a common interface to obtain reliable communications without the need to support session management functionalities required by redundant transport.
The examples described herein propose an API definition for application clients and servers to request data delivery service from the SEALDD layer and provide application client triggered as well as application server triggered procedures for enabling communications with redundant transport. In addition, the SEALDD layer may also initiate an upgrade of single transport communication to redundant transport communication for reliable data delivery.
An example described herein comprises a method for a SEALDD client to: 1) receive a first request for a data delivery service from an application or VAL client, wherein the first request may comprise information for application traffic. The information for application traffic may comprise at least one of an application identifier, an application server contact information (FQDN, IP address and port number), QoS requirements, an indication for reliable communication, temporal restrictions, spatial restrictions, UE mobility information, utilize edge resources; 2) determine based on information received in the first request that redundant transport is required to meet the data delivery requirement of the application or VAL client; 3) discover a SEALDD server that can serve the application traffic and send a second request to the SEALDD server to configure the application traffic for redundant transport; 4) receive a response to the second request indicating the status of the request for redundant transport; 5) send a response to the application or VAL client with a status to the first request for data delivery service; 6) send a third and a fourth request for the user equipment to establish redundant PDU sessions with the network; or 7) receive data from the application client or application server, and process the data to send to the redundant PDU sessions established in the third and fourth requests wherein processing the data may comprise data segmentation, data duplication, data elimination, and data re-assembly.
An example described herein comprises a method for a SEALDD server to: 1) Detect a trigger condition to send a request to a cellular network to influence traffic for a UE, wherein the trigger condition may be one or more of the following: receive a first request for data delivery service from an application or VAL server to configure a communication session for application traffic, and receive a notification from a cellular network regarding one or more events that may impact the application traffic of a UE (e.g., network congestion, etc.); 2) send a second request to a cellular network to influence traffic for application traffic of a user equipment using information from the first request. The second request may comprise one or more of AF identifier, service parameters describing the application traffic (e.g. such as DNN, S-NSSAI, UE application descriptor, AF service identifier), target UE identifier(s) or information about the UE(s), UE location(s), redundant transport information, temporal and spatial validity conditions, application or VAL server contact information such as FQDN or IP address and port number wherein the redundant transport information may comprise PDU Session Pair ID and Redundancy Sequence Number. The second request may result in the network sending a user equipment one or more UE Route Selection Policies (URSP) for use in establishing PDU sessions for the application traffic wherein the URSP may comprise information in the second request; 3) send a message to notify a SEALDD client for configuring redundant transport for the application traffic; 4) receive an acknowledge to the message that redundant transport has been configured for the application traffic; 5) send a response to the first request that data delivery service has been established; and 6) receive application data on the redundant transports and reassembling the data to send to the application server.
An example described herein comprises a method for a SEALDD client to: 1) receive a first request for a data delivery service from an application or VAL client, wherein the first request may cause a user equipment to create a PDU session to carry application traffic from the UE to an application server: 2) detect data communication for the application traffic is unreliable, where the user equipment needs to retransmit data packets to the application server; 3) send a second request to a SEALDD server to configure the application traffic for redundant transport. The second request may result in the SEALDD server sending to the network a third request, which may comprise an AF identifier, service parameters describing the application traffic (e.g. such as DNN, S-NSSAI, UE application descriptor, AF service identifier), target UE identifier(s) or information about the UE(s), UE location(s), redundant transport information, temporal and spatial validity conditions, application or VAL server contact information such as FQDN or IP address and port number, wherein the redundant transport information may comprise PDU Session Pair ID and Redundancy Sequence Number. The third request may result in the network sending a user equipment one or more UE Route Selection Policies (URSP) for use in establishing PDU sessions for the application traffic wherein the URSP may comprise information in the third request; 4) receive a response to the second request indicating the status of the request for redundant transport; 5) send a response to the application or VAL client on the status of the first request for a data delivery service; 6) send a third and a fourth request for the user equipment to establish PDU sessions with the network; and 7) receive data from the application client or application server, and process the data to send to the PDU sessions established in the third and fourth requests wherein processing the data may comprise, data segmentation, data duplication, data elimination, and data re-assembly.
As the SEALDD layer provides data delivery services to application or VAL clients and servers, an API service request may be defined to enable the application or VAL clients and servers access to the service. Using the API definition, an application or VAL client or server may request for redundant transport and the SEALDD layer may perform the required communications to enable the service. The SEALDD client may communicate with lower layers of the UE and the SEALDD server may communicate with the 5G core network and OAM systems. Note the terms application and VAL are used interchangeably hereinafter to refer to client or server operations that are performed at the vertical application layer on a UE or application server respectively. In addition, the terms redundant transport, redundant PDU sessions, and reliable communication refer to the fact that redundancy has been established for application traffic to flow over disjointed user paths to minimize communication interruptions.
API Exposure for Triggering SEALDD Service with Redundant Transport
Table 1 shows an example API definition an application client or server may use to request for data delivery service from the SEALDD layer. The API definition shown in Table 1 provides a non-exhaustive list of parameters and the associated requirement for inclusion in the API call, specified by the M/O column with M representing mandatory inclusion in the API and O representing Optional inclusion. Request for redundant transport may be explicitly indicated through the Reliable communication parameter.
The Service Request API comprises one or more mandatory parameters the requester provides in order to access the SEALDD service. Identifiers are required for the requester, the UF where the application traffic originates, and the application identifier. In addition, the server contact information for which the traffic is destined to and any QoS requirements for the application traffic are also required. This information allows the SEALDD layer to effectively manage the traffic between the UE and the application server.
Other optional information may be provided to allow the SEALDD layer to better manage the application traffic between the UE and the application server. If the application traffic requires low latency or high reliability, the Reliable communication parameter may be explicitly indicated to inform the SEALDD layer to initiate the establishment of redundant transport for the UE. Any known temporal or spatial restrictions may also be provided to ensure the application traffic is allowed during the time and location that the application traffic is authorized for. A UE's mobility information, if known, may be provided to assist the SEALDD layer in managing service continuity issues, especially if edge computing information is also provided.
The SEALDD Service Request API may be accessed by either an application client or server to initiate the services of the SEALDD layer. In an example of a gaming use case, an application or VAL client may access the API upon the launch of a game by the user of a UE. Similarly, an application or VAL server may access the API on behalf of the user of the UE after the user registers to the application or VAL server to establish a gaming session.
The API may be accessed for cases where application traffic has been established initially without the assistance of the SEALDD layer and later upgraded to using SEALDD service with redundant transport due to low quality of service. For the cases, the application traffic was initially established using a single transport without using SEALDD services. The application traffic may experience QoS degradation and either an application client or server may access the Service Request API to request the assistance of the SEALDD layer to improve the QoS of the application traffic, for example by upgrading to use redundant transport.
While the reliable communication parameter may be provided for explicit indication of redundant transport, the SEALDD layer may also infer the need for redundant transport using the QoS requirement provided by the application client or server and other information the SEALDD layer has about the UE or provided by the network that indicates performance degradation in the system. The SEALDD client may have access to information on UF capabilities, UF mobility, performance measurements from lower layers, and other application or edge computing information that may be utilized to determine the need for redundant transport. A SEALDD server may use information about a UE (e.g. obtained from a SEALDD client, an application server, the 5G network, or OAM systems) and also information on network performance and analytics (e.g. obtained from the 5G network or OAM systems) to make the determination for redundant transport.
A response may be returned to the requester on the status of the service request, which may also comprise a transaction identifier. In the case the requested service was not able to be granted, the response may also comprise an error code and potentially with additional information on why the request was not granted.
The Service Request API definition shown in Table 1 may be a generic API that applies to both application clients and application servers for obtaining SEALDD services. As such, some parameters may only be exposed to application servers and not to application clients. For example, the Edge computing resources parameter may only be exposed to application servers to request SEALDD services for traffic from an application on a UE. The application server may have additional information about the UE such as the location, the relative distance of the UE to the application server, and UE mobility predictions from the NWDAF to make the determination for requesting reliable communication for the UE as well as using edge computing resources when necessary.
The SEALDD service request API may allow application clients or servers to request for reliable communications from the SEALDD layer. Upon receiving the service request API, the SEALDD layer performs the communications to enable the data delivery service with redundant transport.
In step 1, an application or VAL client on a UE makes a request for data delivery service from the SEALDD layer to send application traffic to an application or VAL server. The request may comprise one or more of an application identifier, the application or VAL server contact information such as an FQDN or IP address and port number, the QoS requirement for the traffic, possibly UE mobility information, an indication for reliable communication if desired, and any known temporal or spatial restrictions for the application traffic. The UE mobility information may be an indication of UE mobility or it may be more detailed location information obtained from a navigation application on the UE showing a planned route.
In step 2, the SEALDD client on the UE may process the request and make a determination based on the information provided by the application or VAL client to use redundant transport for the application traffic. The SEALDD client may make the determination based on one or more of the specified QoS requirement, the presence of an indication for reliable communication, and/or performance measurements obtained from lower layers of the UE, e.g. signal strength is low. The SEALDD client may perform a SEALDD server discovery to find a SEALDD server that supports redundant transport and can serve the UE.
In step 3, the SEALDD client may send a request to the SEALDD server to configure redundant transport for the application on the UE and may comprise one or more of an application descriptor (e.g. operating system identifier and version, application identifier) for the traffic, the UE's identifier and location, UE capabilities, QoS requirements, an indication for reliable communication, the temporal and/or spatial restrictions for the application traffic, UE mobility information, UE performance measurements such as signal strength obtained from lower layers, the application or VAL server contact information such as an FQDN or IP address and port number, data segmentation requirement and packet size, etc. The SEALDD client may factor performance measurements obtained from lower layers in making the determination for redundant transport or for the use of data segmentation. Alternatively, the SEALDD client may forward the information about the UE without making the determination for redundant transport and let the SEALDD server make the determination to use redundant transport based on the provided information.
In step 4, the SEALDD server, acting as an Application Function (AF), may initiate the AF influence on URSP procedure with the 5G core network. The SEALDD server may cause, in the request, one or more of a service description that may be an AF identifier, service parameters describing the application traffic (e.g. such as DNN, S-NSSAI, CE application descriptor, AF service identifier), target UE identifier(s) or information about the UF(s), UF location(s), UF capabilities, redundant transport information, temporal and spatial validity conditions, application or VAL server contact information such as an FQDN or IP address and port number, subscription information for receiving notifications, etc. The UE may receive updated URSP rules in which the Traffic Descriptors and/or the Route Selection Descriptors (RSD) comprise information provided by the SEALDD server. Some examples comprise the IP descriptors comprising the application or VAL server IP address and port number, the Domain descriptor comprising the FQDN, and/or the RSD comprising the redundant transport information such as PDU Session Pair ID and RSN values to enable redundant PDU sessions for the UE. The PDU Session Pair ID and RSN values may have been provided to the SEALDD server by the 5G core network, the OAM system, or as part of pre-configuration. Alternatively, the SEALDD server may have been provisioned with mapping information correlating DNN and/or S-NSSAI with PDU Session Pair ID and RSN values.
In step 5, the SEALDD server may respond to the SEALDD client that redundant transport is enabled for the application traffic. The response may comprise information on one or more of the temporal and spatial limitations of the redundant transport and the selected data segmentation packet size. The SEALDD client may respond to the application or VAL client with the status of the service request.
In step 6, the SEALDD client may trigger the UE to establish redundant PDU sessions using the updated URSP rules and with dual connectivity. As a result, the PDU sessions are established with disjointed user plane paths.
In step 7, the SEALDD client may receive application data and replicate the data on the redundant PDU sessions. The SEALDD client may apply segmentation of the data before replication if data segmentation was enabled to offer finer granularity of transmission packets for cases in which transmission quality may be low or the size of the application data payload exceeds the max packet size supported by the one or both of the redundant PDU sessions. This may be required if the UE is at the fringe of network coverage to minimize the packet retransmission size for cases when packets from both PDU sessions may be lost. Alternatively, rather than Step 1 and Step 6 requiring separate requests, these steps may be combined into a single request (i.e., application data and/or an indication to establish a session between the application/VAL client and an application/VAL may be included in the request defined in Step 1).
In step 8, the application data may be sent on the redundant PDU sessions over the disjointed user plane paths to the SEALDD server. When sending the application data, the SEALDD client may encapsulate the application data within a SEALDD message. The SEALDD client may also fragment the application data into multiple SEALDD messages. For example, if the application data payload is larger than the maximum packet size configured for the data segmentation requirement. The SEALDD message may also comprise SEALDD headers, which may comprise information such as a SEALDD message identifier or sequence number. The SEALDD header may comprise an indicator of whether a SEALDD message acknowledgement is required to be returned from the SEALDD server to the SEALDD client. Similarly, the SEALDD server may apply data segmentation, if enabled, before performing data duplication to send downlink application traffic to the UE over the disjointed user plane paths.
In step 9, upon receiving the data, the SEALDD server may re-assemble the application data from the received SEALDD messages received from the SEALDD client before sending the re-assembled data to the application or VAL server. As part of re-assembly, the SEALDD server may eliminate duplicate packets from the redundant transport and may also re-assemble application data payload segments fragmented across multiple SEALDD messages. The SEALDD server may also compensate for any lack of message synchronization across the redundant transports. For example, the SEALDD server may compensate for any delays between redundant SEALDD messages it receives by buffering messages from one or both of the PDU sessions. SEALDD message identifiers or sequence numbers in the headers of the SEALDD messages may be used to perform message duplication, fragmentation and reassembly, and synchronization operations. For cases in which data from the same segment(s) are not received on either transport, the SEALDD server may notify the SEALDD client to resend data for those segment(s). This notification may be realized as an acknowledgement that the SEALDD server returns to the SEALLDD client in-band over one or both of the redundant PDU sessions. Alternatively, the notification may be realized as a message sent from the SEALDD server to the SEAL client out-of-band over a separate PDU session. For example, the SEALDD client may have a subscription to receive notifications from the SEALDD server. These notifications may be targeted to a notification URI of the SEALDD client and may use a separate PDU session from the redundant PDU sessions. Since segmentation reduces the size of the data packets, retransmission may be quicker especially if the UF signal strength is weak. Similar to the processing performed by the SEALDD server, the SEALDD client may also perform the same processing (e.g. data de-segmentation, elimination, and re-assembly) for traffic received from the SEALDD server over the disjointed user plane paths.
Note that steps 7 to 9 of
Currently, dual connectivity is only supported for 3GPP access technology. However, redundant transport may also be applied for cases where the redundancy is supported by using one 3GPP access and one non-3GPP access such as Wi-Fi. The same procedure as shown in
Systems and methods are proposed herein for redundant transport. For example, the method described in
The method described in
The method described in
The method described in
The method described in
The method described in
The method described in
The method described in
The method described in
For example,
The device in
The device in
The device in
The device in
The device in
In addition to a SEALDD client initiating the request for redundant transport, a SEALDD server may also initiate the request for redundant transport on behalf of an application or UE. For example, an application on the UE may provide configuration of a gaming session to the application or VAL server, which may trigger the process in which the SEALDD server determines the gaming session would benefit from redundant transport. The application may provide this information during registration or after logging in to the application or VAL server.
In step 1, an application or VAL client may register or log in to an application or VAL server to configure a gaming session for the user of a UE. As part of the configuration, the application or VAL client may provide information about the gaming session to the corresponding application or VAL server, such as application descriptors (e.g. operating system identifier and version, application identifier), QoS requirements, an indication for reliable communication if desired, any known temporal or spatial restrictions for the application traffic, and an indication for using edge computing resources. The QoS requirements may be based on the desired resolution, frame rate, amount of background details, scrolling effects, etc. configured for the application by the user. In addition, other information may also be provided: UE identifier and/or IP address, UE capability (e.g. support for dual connectivity or multiple access technologies), UE location, etc.
In step 2, the application or VAL server may process the request and make a determination based on the information provided by the application or VAL client that SEALDD services are needed for this application traffic. The application or VAL server may make the determination based on one or more of the specified QoS requirement, the presence of an indication for reliable communication, and/or performance measurements obtained from the application or VAL client or from the network. The application or VAL server may perform a SEALDD server discovery to find a SEALDD server that supports the desired SEALDD service (e.g. redundant transport) and can serve the UE.
In step 3, the application or VAL server may make a request to the SEALDD server for data delivery service to be provided for the application traffic. The application or VAL server may include in the request one or more of the UE identifier and/or IP address and port number, the application identifier, QoS requirements, UF location, UF capabilities, an indication for reliable communication, any temporal or spatial restrictions for the application traffic, and an indication for using edge computing resources. The application or VAL server may include an explicit indicator requesting redundant transport. Alternatively, the application or VAL server may not be aware of redundant transport functionality and instead only provide application level information used by the SEALDD server to manage redundant transport.
In step 4, the SEALDD server may utilize the information provided by the application or VAL server to determine whether the session requires low latency or ultra-reliability. In addition, the SEALDD server may use the indication for using edge computing resources with the UE's location to discover a list of DNAIs that could be used to support the application traffic. The SEALDD server, acting as an Application Function (AF), initiates the AF influence on URSP procedure with the 5G core network. The SEALDD server may include in the request an AF identifier, service parameters describing the application traffic (e.g. such as DNN, S-NSSAI, UE application descriptor, AF service identifier), target UE identifier(s) or information about the UE(s), UE location(s), UE capabilities, redundant transport information, temporal and spatial validity conditions, application or VAL server contact information such as FQDN or IP address and port number, subscription information for receiving notifications, etc. The UE may receive updated URSP rules in which the Traffic Descriptors and/or the Route Selection Descriptors (RSD) comprise information provided by the SEALDD server. Examples comprise the IP descriptors comprising the application or VAL server IP address and port number, the Domain descriptor comprising the FQDN, and/or the RSD comprising the redundant transport information such as PDU Session Pair ID and RSN values. The PDU Session Pair ID and RSN values may have been provided to the SEALDD server by the 5G core network, the OAM system, or as part of pre-configuration. Alternatively, the SEALDD server may have been provisioned with mapping information correlating DNN and/or S-NSSAI with PDU Session Pair ID and RSN values.
Using the provided UE identifier and/or IP address and port number, the SEALDD server may configure the SEALDD client that redundant transport has been enabled for the application on the UE. The message may comprise the application identifier, the application or VAL server FQDN or IP address and port number, any temporal or spatial restrictions for the application traffic. The message may also comprise information about one or more URSPs that have been updated or newly configured onto the UE such that the SEALDD client is aware of them. The SEALDD client acknowledges the configuration from the SEALDD server and may comprise an update of the UE location and an indication of data segmentation requirement and packet size for the redundant transport.
In step 5, the SEALDD server may provide a status of the service request to the application or VAL server and may comprise a transaction and/or session identifier and a time stamp for the transaction.
In step 6, the application or VAL server may acknowledge the configuration request to the application or VAL client. The acknowledgement may indicate that SEALDD service have been configured for the application and comprise a list of parameters for the application or VAL client to use when requesting service from the SEALDD client. The list of parameters may comprise information exchanged between the application or VAL server and the SEALDD server.
In step 7, the application or VAL client may make a service request for SEALDD service, possibly using the information provided by the application or VAL server.
In step 8, using the updated URSP rules, the UE may establish redundant PDU sessions using dual connectivity or with multiple access types depending on the capabilities of the UE and base on other information the SEALDD client may have. As a result, the PDU sessions may be established with disjointed user plane paths.
In step 9, the SEALDD client may perform the appropriate data processing (e.g. data segmentation and duplication) of the data received from the application or VAL client and send the duplicated data over the redundant PDU sessions. The SEALDD server may receive the data from the redundant PDU sessions and perform the appropriate data re-assembly to send the data to the application or VAL server. This step corresponds to steps 7 to 9 of
In the previous examples, the SEALDD service for reliable communication was initiated prior to the commencement of application traffic.
In step 1, a UE may be sending application traffic that has been established using a single transport and without utilizing the services of SEALDD.
In step 2, the application or VAL client may detect a QoS degradation for the application traffic and decide to request an upgrade of the application traffic to use redundant transport or to transfer the application to use redundant transport
In step 3, the application or VAL client may make a request to the SEALDD client for data delivery service to upgrade the application traffic to using redundant transport. The request may comprise one or more of an application identifier or PDU session ID for the application, the application or VAL server contact information such as an FQDN or IP address and port number, the QoS requirement for the traffic, possibly UE mobility information, an indication for reliable communication if desired, any known temporal or spatial restrictions for the application traffic, and an indication for using edge computing resource. The UE mobility information may be an indication of UE mobility or more detailed location information obtained from a navigation application on the UE showing a planned route.
In step 4, the SEALDD client on the UE may process the request and make a determination based on the information provided by the application or VAL client to use redundant transport for the application traffic. The SEALDD client may make the determination based on one or more of the specified QoS requirement, the presence of an indication for reliable communication, and/or performance measurements obtained from lower layers of the UE, e.g. signal strength is low. The SEALDD client may perform a SEALDD server discovery to find a SEALDD server that supports redundant transport and can serve the UE.
In step 5, the SEALDD client may send a request to the SEALDD server to configure redundant transport for the application on the UE and may comprise one or more of an application descriptor (e.g. operating system identifier and version, application identifier) for the traffic, the UE's identifier and location, UE capabilities, QoS requirements, an indication for reliable communication, the temporal and/or spatial restrictions for the application traffic, UE mobility information, UE performance measurements such as signal strength obtained from lower layers, the application or VAI, server contact information such as an FQDN or IP address and port number, data segmentation requirement and packet size, etc. The SEALDD client may factor performance measurements obtained from lower layers in making the determination for redundant transport or for the use of data segmentation. Alternatively, the SEALDD client may forward the information about the UE without making the determination for redundant transport and let the SEALDD server make the determination to use redundant transport based on the provided information.
In step 6, the SEALDD server may utilize the information provided by the application or VAL server to determine whether the session requires low latency or ultra-reliability. In addition, the SEALDD server may use the indication for using edge computing resources with the UE's location to discover a list of DNAIs that could be used to support the application traffic. The SEALDD server, acting as an Application Function (AF), may initiate the AF influence on URSP procedure with the 5G core network. The SEALDD server may include in the request one or more of an AF identifier, service parameters describing the application traffic (e.g. such as DNN, S-NSSAI, UE application descriptor, AF service identifier), target UE identifier(s) or information about the UE(s), UE location(s), UE capabilities, redundant transport information, temporal and spatial validity conditions, application or VAL server contact information such as FQDN or IP address and port number, subscription information for receiving notifications, etc. The UE may receive updated URSP rules in which the Traffic Descriptors and/or the Route Selection Descriptors (RSD) comprise information provided by the SEALDD server. Examples comprise one or more of the IP descriptors comprising the application or VAL server IP address and port number, the Domain descriptor comprising the FQDN, and/or the RSD comprise the redundant transport information such as PDU Session Pair ID and RSN values to enable redundant PDU sessions for the UE. The PDU Session Pair ID and RSN values may have been provided to the SEALDD server by the 5G core network, the OAM system, or as part of pre-configuration. Alternatively, the SEALDD server may have been provisioned with mapping information correlating DNN and/or S-NSSAI with PDU Session Pair ID and RSN values.
In step 7, the SEALDD server may respond to the SEALDD client that redundant transport is enabled for the application traffic. The response may comprise information on the temporal and spatial limitations of the redundant transport and the selected data segmentation packet size. The SEALDD client may respond to the application or VAL client with the status of the service request.
In step 8, the SEALDD client may trigger the UE to establish redundant PDU sessions with the 5G core network. In this case, the SEALDD client may need to modify the existing PDU session established in step 2 to make it redundant, e.g. by providing the PDU Session Pair ID and the RSN, or the SEALDD client may need to manually manage the two PDU sessions without specifying the PDU sessions are redundant.
In step 9, the SEALDD client may perform the appropriate data processing (e.g. data segmentation and duplication) of the data received from the application or VAL client and send the duplicated data over the redundant PDU sessions. The SEALDD server may receive the data from the redundant PDU sessions and perform the appropriate data re-assembly to send the data to the application or VAL server. Step 9 corresponds to step 9 as described above with respect to
In the previous example, an application or VAL client initiated an upgrade or transfer of application traffic to using SEALDD service with reliable transport.
In step 1, a UE is sending application traffic that have been established using a single transport and without utilizing the services of SEALDD.
In step 2, an application or VAL server may be subscribed to receive network performance measurements as well as network generated statistics and predictions from the 5G core network or OAM system. The application or VAL server receives a notification from the 5G core network showing network performance predictions that network resource usage is increasing for a particular service area. In addition, the application or VAL, server may also receive network analytics for UF mobility showing the UF is moving towards the service area where network resource usage is increasing.
In step 3, the application or VAL client may detect a QoS degradation for the application traffic in step 3a and request an upgrade of the application traffic to use redundant transport or to transfer the application traffic to use redundant transport. The request shown in step 3b may comprise information about the UE and application traffic as previously described in step 1 of
In step 4, the application or VAL server may process the request and make a determination based on the information provided by the application or VAL client that SEALDD services are desired for this application traffic. If the application or VAL server had received notifications from the 5G network or from OAM system in step 2, the application or VAL server may already have information about the UE and the corresponding application traffic. The application or VAL server may also make the determination based on the specified QoS requirement, the presence of an indication for reliable communication, and/or performance measurements obtained from the application or VAL client or from the network. The application or VAL server may perform a SEALDD server discovery to find a SEALDD server that supports the desired SEALDD service (e.g. redundant transport) and can serve the UE as well.
In step 5, in response to the network performance and UE mobility predictions or the application or VAL client request, the application or VAL server may make a request for data delivery service to upgrade or transfer the UE from using a single transport to using redundant transport. The application or VAL server may make a request to the SEALDD server that can serve the UE to configure the UE for redundant transport. The request may comprise one or more of the UE identifier and/or IP address, the application identifier, QoS requirements, UE location, UE capabilities, an indication for reliable communication, any temporal or spatial restrictions for the application traffic, and an indication for using edge computing resources.
In step 6, the SEALDD server may utilize the information provided by the application or VAL server to initiate the AF influence on URSP procedure with the 5G core network. The SEALDD server may include in the request one or more of an AF identifier, service parameters describing the application traffic (e.g. such as DNN, S-NSSAI, CE application descriptor, AF service identifier), target UF identifier(s) or information about the UE(s), UE location(s), UF capabilities, redundant transport information, temporal and spatial validity conditions, application or VAL server contact information such as FQDN or IP address and port number, subscription information for receiving notifications, etc. The SEALDD server may use the indication of using edge computing resources with the UE's location to discovery a list of DNAIs that could be used to support the application traffic. The UE may receive updated URSP rules in which the Traffic Descriptors and/or the Route Selection Descriptors (RSD) comprise information provided by the SEALDD server. A non-exhaustive list of examples comprises the IP descriptors comprising the application or VAL server IP address and port number, the Domain descriptor comprising the FQDN, and/or the RSD comprising the redundant transport information such as PDU Session Pair ID and RSN values to enable redundant PDU sessions for the UE. The PDU Session Pair ID and RSN values may have been provided to the SEALDD server by the 5G core network, the OAM system, or as part of pre-configuration. Alternatively, the SEALDD server may have been provisioned with mapping information correlating DNN and/or S-NSSAI with PDU Session Pair ID and RSN values.
If step 4 was triggered by step 2, the SEALDD server may inform the SEALDD client that redundant transport is enabled for the application on the UE. The SEALDD server may have received information about the UE from the VAL server or the network notification to be able to communicate with the SEALDD client. The notification may comprise one or more of the application identifier, the application or VAL server FQDN or IP address and port number, any temporal or spatial restrictions for the application traffic. The notification may comprise information regarding one or more URSPs that have been updated or newly configured onto the UE such that the SEALDD client is aware of them. The SEALDD client may acknowledge the notification from the SEALDD server and may comprise an update of the UE location and an indication of data segmentation requirement and packet size for the redundant transport. The SEALDD server acknowledges the application or VAL server with the result of the redundant transport request for the application.
In step 7, the SEALDD server may provide a status of the service request to the application or VAL server and may comprise a transaction and/or session identifier and a time stamp for the transaction.
In step 8, if step 3b triggered the application or VAL server to request for SEALDD service from the SEALDD server, the application or VAL, server may acknowledge the configuration request to the application or VAL client. The acknowledgement may indicate that SEALDD service have been configured for the application and comprise a list of one or more parameters for the application or VAL client to use when requesting service from the SEALDD client.
In step 9, the application or VAL client may make a service request for SEALDD service, possibly using the information provided by the application or VAL server.
In step 10, the SEALDD client may trigger the UE to establish redundant PDU sessions with the 5G core network. In this case, the SEALDD client may need to modify the existing PDU session established in step 2 to make it redundant, e.g. by providing the PDU Session Pair ID and the RSN, or the SEALDD client may need to manually manage the two PDU sessions without specifying the PDU sessions are redundant. The SEALDD client may also create two new PDU sessions for the redundant transport and delete the old PDU session if this has been communicated within the SEALDD layer.
In step 11, the SEALDD client may perform the appropriate data processing (e.g. data segmentation and duplication) of the data received from the application or VAL client and send the duplicated data over the redundant PDU sessions. The SEALDD server may receive the data from the redundant PDU sessions and perform the appropriate data re-assembly to send the data to the application or VAL server. Step 11 corresponds to step 9 as described above with respect to
In the previous examples, either the application client or application server initiated the support of redundant transport for an application on a UE. For cases where the application traffic was initially established to use only a single transport and with SEALDD services, the SEALDD layer can support autonomously upgrading the application traffic for reliable communications based on information the SEALDD layer has about the UE and also on network performance. The SEALDD client may have access to one or more of performance measurements such as bit rate, round trip time latency, quantity of retransmissions, signal to noise ratio, signal strength, etc. received from lower layers of the UE. Using these performance measurements, the SEALDD client may detect when data transmission on a single transport can benefit from an upgrade to redundant transport. Similarly, a SEALDD server may have access to network performance measurements and analytics available from either the 5G network or OAM systems to make the same determination to upgrade a current application traffic from single transport to redundant transport.
In step 1, an application client or VAL client on a UE may make a request to send data to an application or VAL server.
In step 2, in response, a SEALDD client may communicate with lower layers to create a PDU session for the UE in support of the application traffic.
In step 3, based on establishment of the PDU session, application data may be sent from the application or VAL client to the application or VAL server.
In step 4, the SEALDD client or SEALDD server may detect that the data transport has degraded and become unreliable or received predictions from analytics functions within the 5G system that the data transport will degrade and become unreliable. The SEALDD client may have obtained performance measurements from lower layers on the UE and the SEALDD server may have obtained performance measurements, QoS monitoring information, or network analytics from the 5G network or via the OAM system. The SEALDD client or server may decide to upgrade the PDU session to use redundant transport for the UE.
In step 5, the upgrade to use redundant transport may be communicated within the SEALDD layer between the SEALDD client and the SEALDD server. The SEALDD client may perform step 2 of
In step 6, the SEALDD client may trigger the UE to establish redundant PDU sessions with the 5G core network. In this case, the SEALDD client may need to modify the existing PDU session established in step 2 to make it redundant, e.g. by providing the PDU Session Pair ID and the RSN, or the SEALDD client may need to manually manage the two PDU sessions without specifying the PDU sessions are redundant. The SEALDD client may also create two new PDU sessions for the redundant transport and delete the old PDU session if this has been communicated within the SEALDD layer.
In step 7, the SEALDD client may perform the appropriate data processing (e.g. data segmentation and duplication) of the data received from the application or VAL client and send the duplicated data over the redundant PDU sessions. The SEALDD server may receive the data from the redundant PDU sessions and perform the appropriate data re-assembly to send the data to the application or VAL server. Step 7 corresponds to step 9 as described above with respect to
SEALDD Layer Interface with Lower Layers for Redundant Transport
Upon receiving a request for SEALDD service, the SEALDD layer may interact with the 5G network to enable the service for the application traffic. The SEALDD server may access the 5G core network by utilizing one or more of the monitoring, provisioning, and analytics reporting capabilities of the Network Exposure Function (NEF). The SEALDD server may also have access to OAM systems to further obtain configuration or network information to provide better data delivery services. Similarly, the SEALDD client on a UF may communicate with lower layers of the protocol stack to establish and manage PDU sessions for the application traffic and also to obtain information about the UE to better manage data delivery services for applications on the UE.
When a SEALDD client receives an initial request for service from application clients, the SEALDD client may communicate with lower layers of the UE to establish PDU sessions for the UE. In the communication, the SEALDD client may include information for the application traffic, such as one or more of the application identifier, application server contact information (e.g. FQDN, IP address and port number), and QoS requirements. If the SEALDD client had determined that redundant transport is required, the communication may also comprise the PDU Session Pair ID and/or the RSN to indicate the PDU session should enable the redundant feature. The SEALDD client may have received the PDU Session Pair ID and/or the RSN from the SEALDD server during the establishment of the redundant transport within the SEALDD layer.
A SEALDD server may have access to information about network performance and/or UE configuration through the NEF interface with the 5G network or via an interface to OAM systems. Using the information, the SEALDD server may evaluate network performance statistics and/or predictions to assist in making the determination for upgrading application traffic to using redundant transport. As an example, the SEALDD server may have subscribed to receiving statistics and predictions from the NWDAF on network function loading, network performance, observed service experience, UE mobility and communication, etc. In addition, the SEALDD server may have obtained UE capabilities and other UE information from the SEALDD client to assist with making the determination.
Once the SEALDD server has made the determination for redundant transport, it may communicate to the 5G network, e.g. via the NEF interface, to influence application traffic through the update of URSP rules to the UE. The SEALDD server may be able to derive the PDU Session Pair ID and/or RSN values from mapping information provided by the 5G network or OAM systems based on DNN and S-NSSAI information used for the PDU session. The PDU Session Pair ID and/or RSN may be provided in the URSP rule update or to the SEALDD client for use in requesting the establishment of PDU sessions to support the redundant transport.
A graphical user interface such as the example shown in
The 3rd Generation Partnership Project (3GPP) develops technical standards for cellular telecommunications network technologies, including radio access, the core transport network, and service capabilities-including work on codecs, security, and quality of service. Recent radio access technology (RAT) standards include WCDMA (commonly referred as 3G), LTE (commonly referred as 4G), LTE-Advanced standards, and New Radio (NR), which is also referred to as “5G.” 3GPP NR standards development is expected to continue and include the definition of next generation radio access technology (new RAT), which is expected to include the provision of new flexible radio access below 7 GHZ, and the provision of new ultra-mobile broadband radio access above 7 GHz. The flexible radio access is expected to consist of a new, non-backwards compatible radio access in new spectrum below 7 GHZ, and it is expected to include different operating modes that may be multiplexed together in the same spectrum to address a broad set of 3GPP NR use cases with diverging requirements. The ultra-mobile broadband is expected to include cmWave and mm Wave spectrum that will provide the opportunity for ultra-mobile broadband access for, e.g., indoor applications and hotspots. In particular, the ultra-mobile broadband is expected to share a common design framework with the flexible radio access below 7 GHz, with cmWave and mmWave specific design optimizations.
3GPP has identified a variety of use cases that NR is expected to support, resulting in a wide variety of user experience requirements for data rate, latency, and mobility. The use cases include the following general categories: enhanced mobile broadband (eMBB) ultra-reliable low-latency Communication (URLLC), massive machine type communications (mMTC), network operation (e.g., network slicing, routing, migration and interworking, energy savings), and enhanced vehicle-to-everything (eV2X) communications, which may include any of Vehicle-to-Vehicle Communication (V2V), Vehicle-to-Infrastructure Communication (V2I), Vehicle-to-Network Communication (V2N), Vehicle-to-Pedestrian Communication (V2P), and vehicle communications with other entities. Specific service and applications in these categories include, e.g., monitoring and sensor networks, device remote controlling, bi-directional remote controlling, personal cloud computing, video streaming, wireless cloud-based office, first responder connectivity, automotive recall, disaster alerts, real-time gaming, multi-person video calls, autonomous driving, augmented reality, tactile internet, virtual reality, home automation, robotics, and aerial drones to name a few. All of these use cases and others are contemplated herein.
It will be appreciated that the concepts disclosed herein may be used with any quantity of WTRUs, base stations, networks, and/or network elements. Each of the WTRUs 102 may be any type of apparatus or device configured to operate and/or communicate in a wireless environment. In the example of
The communications system 100 may also include a base station 114a and a base station 114b. In the example of
TRPs 119a, 119b may be any type of device configured to wirelessly interface with at least one of the WTRU 102d, to facilitate access to one or more communication networks, such as the core network 106/107/109, the Internet 110, Network Services 113, and/or other networks 112. RSUs 120a and 120b may be any type of device configured to wirelessly interface with at least one of the WTRU 102e or 102f, to facilitate access to one or more communication networks, such as the core network 106/107/109, the Internet 110, other networks 112, and/or Network Services 113. By way of example, the base stations 114a, 114b may be a Base Transceiver Station (BTS), a Node-B, an eNode B, a Home Node B, a Home eNode B, a Next Generation Node-B (gNode B), a satellite, a site controller, an access point (AP), a wireless router, and the like.
The base station 114a may be part of the RAN 103/104/105, which may also include other base stations and/or network elements (not shown), such as a Base Station Controller (BSC), a Radio Network Controller (RNC), relay nodes, etc. Similarly, the base station 114b may be part of the RAN 103b/104b/105b, which may also include other base stations and/or network elements (not shown), such as a BSC, a RNC, relay nodes, etc. The base station 114a may be configured to transmit and/or receive wireless signals within a particular geographic region, which may be referred to as a cell (not shown). Similarly, the base station 114b may be configured to transmit and/or receive wired and/or wireless signals within a particular geographic region, which may be referred to as a cell (not shown). The cell may further be divided into cell sectors. For example, the cell associated with the base station 114a may be divided into three sectors. Thus, for example, the base station 114a may include three transceivers, e.g., one for each sector of the cell. The base station 114a may employ Multiple-Input Multiple Output (MIMO) technology and, therefore, may utilize multiple transceivers for each sector of the cell, for example.
The base station 114a may communicate with one or more of the WTRUs 102a, 102b, 102c, and 102g over an air interface 115/116/117, which may be any suitable wireless communication link (e.g., Radio Frequency (RF), microwave, infrared (IR), ultraviolet (UV), visible light, cmWave, mmWave, etc.). The air interface 115/116/117 may be established using any suitable Radio Access Technology (RAT).
The base station 114b may communicate with one or more of the RRHs 118a and 118b, TRPs 119a and 119b, and/or RSUs 120a and 120b, over a wired or air interface 115b/116b/117b, which may be any suitable wired (e.g., cable, optical fiber, etc.) or wireless communication link (e.g., RF, microwave, IR, UV, visible light, cmWave, mmWave, etc.). The air interface 115b/116b/117b may be established using any suitable RAT.
The RRHs 118a, 118b, TRPs 119a, 119b and/or RSUs 120a, 120b, may communicate with one or more of the WTRUs 102c, 102d, 102e, 102f over an air interface 115c/116c/117c, which may be any suitable wireless communication link (e.g., RF, microwave, IR, ultraviolet UV, visible light, cmWave, mmWave, etc.) The air interface 115c/116c/117c may be established using any suitable RAT.
The WTRUs 102 may communicate with one another over a direct air interface 115d/116d/117d, such as Sidelink communication which may be any suitable wireless communication link (e.g., RF, microwave, IR, ultraviolet UV, visible light, cmWave, mmWave, etc.) The air interface 115d/116d/117d may be established using any suitable RAT.
The communications system 100 may be a multiple access system and may employ one or more channel access schemes, such as CDMA, TDMA, FDMA, OFDMA, SC-FDMA, and the like. For example, the base station 114a in the RAN 103/104/105 and the WTRUs 102a, 102b, 102c, or RRHs 118a, 118b, TRPs 119a, 119b and/or RSUs 120a and 120b in the RAN 103b/104b/105b and the WTRUs 102c, 102d, 102e, and 102f, may implement a radio technology such as Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access (UTRA), which may establish the air interface 115/116/117 and/or 115c/116c/117c respectively using Wideband CDMA (WCDMA). WCDMA may include communication protocols such as High-Speed Packet Access (HSPA) and/or Evolved HSPA (HSPA+). HSPA may include High-Speed Downlink Packet Access (HSDPA) and/or High-Speed Uplink Packet Access (HSUPA).
The base station 114a in the RAN 103/104/105 and the WTRUs 102a, 102b, 102c, and 102g, or RRHs 118a and 118b, TRPs 119a and 119b, and/or RSUs 120a and 120b in the RAN 103b/104b/105b and the WTRUs 102c, 102d, may implement a radio technology such as Evolved UMTS Terrestrial Radio Access (E-UTRA), which may establish the air interface 115/116/117 or 115c/116c/117c respectively using Long Term Evolution (LTE) and/or LTE-Advanced (LTE-A), for example. The air interface 115/116/117 or 115c/116c/117c may implement 3GPP NR technology. The LTE and LTE-A technology may include LTE D2D and/or V2X technologies and interfaces (such as Sidelink communications, etc.) Similarly, the 3GPP NR technology may include NR V2X technologies and interfaces (such as Sidelink communications, etc.).
The base station 114a in the RAN 103/104/105 and the WTRUs 102a, 102b, 102c, and 102g or RRHs 118a and 118b, TRPs 119a and 119b, and/or RSUs 120a and 120b in the RAN 103b/104b/105b and the WTRUs 102c, 102d, 102e, and 102f may implement radio technologies such as IEEE 802.16 (e.g., Worldwide Interoperability for Microwave Access (WiMAX)), CDMA2000, CDMA2000 1×, CDMA2000 EV-DO, Interim Standard 2000 (IS-2000), Interim Standard 95 (IS-95), Interim Standard 856 (IS-856), Global System for Mobile communications (GSM), Enhanced Data rates for GSM Evolution (EDGE), GSM EDGE (GERAN), and the like.
The base station 114c in
The RAN 103/104/105 and/or RAN 103b/104b/105b may be in communication with the core network 106/107/109, which may be any type of network configured to provide voice, data, messaging, authorization and authentication, applications, and/or Voice Over Internet Protocol (VOIP) services to one or more of the WTRUs 102. For example, the core network 106/107/109 may provide call control, billing services, mobile location-based services, pre-paid calling, Internet connectivity, packet data network connectivity, Ethernet connectivity, video distribution, etc., and/or perform high-level security functions, such as user authentication.
Although not shown in
The core network 106/107/109 may also serve as a gateway for the WTRUs 102 to access the PSTN 108, the Internet 110, and/or other networks 112. The PSTN 108 may include circuit-switched telephone networks that provide Plain Old Telephone Service (POTS). The Internet 110 may include a global system of interconnected computer networks and devices that use common communication protocols, such as the Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and the internet protocol (IP) in the TCP/IP internet protocol suite. The other networks 112 may include wired or wireless communications networks owned and/or operated by other service providers. For example, the networks 112 may include any type of packet data network (e.g., an IEEE 802.3 Ethernet network) or another core network connected to one or more RANs, which may employ the same RAT as the RAN 103/104/105 and/or RAN 103b/104b/105b or a different RAT.
Some or all of the WTRUs 102a, 102b, 102c, 102d, 102e, and 102f in the communications system 100 may include multi-mode capabilities, e.g., the WTRUs 102a, 102b, 102c, 102d, 102e, and 102f may include multiple transceivers for communicating with different wireless networks over different wireless links. For example, the WTRU 102g shown in
Although not shown in
As shown in
The core network 106 shown in
The RNC 142a in the RAN 103 may be connected to the MSC 146 in the core network 106 via an IuCS interface. The MSC 146 may be connected to the MGW 144. The MSC 146 and the MGW 144 may provide the WTRUs 102a, 102b, and 102c with access to circuit-switched networks, such as the PSTN 108, to facilitate communications between the WTRUs 102a, 102b, and 102c, and traditional land-line communications devices.
The RNC 142a in the RAN 103 may also be connected to the SGSN 148 in the core network 106 via an IuPS interface. The SGSN 148 may be connected to the GGSN 150. The SGSN 148 and the GGSN 150 may provide the WTRUs 102a, 102b, and 102c with access to packet-switched networks, such as the Internet 110, to facilitate communications between and the WTRUs 102a, 102b, and 102c, and IP-enabled devices.
The core network 106 may also be connected to the other networks 112, which may include other wired or wireless networks that are owned and/or operated by other service providers.
The RAN 104 may include eNode-Bs 160a, 160b, and 160c, though it will be appreciated that the RAN 104 may include any number of eNode-Bs. The eNode-Bs 160a, 160b, and 160c may each include one or more transceivers for communicating with the WTRUs 102a, 102b, and 102c over the air interface 116. For example, the eNode-Bs 160a, 160b, and 160c may implement MIMO technology. Thus, the eNode-B 160a, for example, may use multiple antennas to transmit wireless signals to, and receive wireless signals from, the WTRU 102a.
Each of the eNode-Bs 160a, 160b, and 160c may be associated with a particular cell (not shown) and may be configured to handle radio resource management decisions, handover decisions, scheduling of users in the uplink and/or downlink, and the like. As shown in
The core network 107 shown in
The MME 162 may be connected to each of the eNode-Bs 160a, 160b, and 160c in the RAN 104 via an SI interface and may serve as a control node. For example, the MME 162 may be responsible for authenticating users of the WTRUs 102a, 102b, and 102c, bearer activation/deactivation, selecting a particular serving gateway during an initial attach of the WTRUs 102a, 102b, and 102c, and the like. The MME 162 may also provide a control plane function for switching between the RAN 104 and other RANs (not shown) that employ other radio technologies, such as GSM or WCDMA.
The serving gateway 164 may be connected to each of the eNode-Bs 160a, 160b, and 160c in the RAN 104 via the SI interface. The serving gateway 164 may generally route and forward user data packets to/from the WTRUs 102a, 102b, and 102c. The serving gateway 164 may also perform other functions, such as anchoring user planes during inter-eNode B handovers, triggering paging when downlink data is available for the WTRUs 102a, 102b, and 102c, managing and storing contexts of the WTRUs 102a, 102b, and 102c, and the like.
The serving gateway 164 may also be connected to the PDN gateway 166, which may provide the WTRUs 102a, 102b, and 102c with access to packet-switched networks, such as the Internet 110, to facilitate communications between the WTRUs 102a, 102b, 102c, and IP-enabled devices.
The core network 107 may facilitate communications with other networks. For example, the core network 107 may provide the WTRUs 102a, 102b, and 102c with access to circuit-switched networks, such as the PSTN 108, to facilitate communications between the WTRUs 102a, 102b, and 102c and traditional land-line communications devices. For example, the core network 107 may include, or may communicate with, an IP gateway (e.g., an IP Multimedia Subsystem (IMS) server) that serves as an interface between the core network 107 and the PSTN 108. In addition, the core network 107 may provide the WTRUs 102a, 102b, and 102c with access to the networks 112, which may include other wired or wireless networks that are owned and/or operated by other service providers.
The RAN 105 may include gNode-Bs 180a and 180b. It will be appreciated that the RAN 105 may include any number of gNode-Bs. The gNode-Bs 180a and 180b may each include one or more transceivers for communicating with the WTRUs 102a and 102b over the air interface 117. When integrated access and backhaul connection are used, the same air interface may be used between the WTRUs and g Node-Bs, which may be the core network 109 via one or multiple gNBs. The gNode-Bs 180a and 180b may implement MIMO, MU-MIMO, and/or digital beamforming technology. Thus, the gNode-B 180a, for example, may use multiple antennas to transmit wireless signals to, and receive wireless signals from, the WTRU 102a. It should be appreciated that the RAN 105 may employ of other types of base stations such as an eNode-B. It will also be appreciated the RAN 105 may employ more than one type of base station. For example, the RAN may employ eNode-Bs and gNode-Bs.
The N3IWF 199 may include a non-3GPP Access Point 180c. It will be appreciated that the N3IWF 199 may include any number of non-3GPP Access Points. The non-3GPP Access Point 180c may include one or more transceivers for communicating with the WTRUs 102c over the air interface 198. The non-3GPP Access Point 180c may use the 802.11 protocol to communicate with the WTRU 102c over the air interface 198.
Each of the gNode-Bs 180a and 180b may be associated with a particular cell (not shown) and may be configured to handle radio resource management decisions, handover decisions, scheduling of users in the uplink and/or downlink, and the like. As shown in
The core network 109 shown in
In the example of
In the example of
The AMF 172 may be connected to the RAN 105 via an N2 interface and may serve as a control node. For example, the AMF 172 may be responsible for registration management, connection management, reachability management, access authentication, access authorization. The AMF may be responsible forwarding user plane tunnel configuration information to the RAN 105 via the N2 interface. The AMF 172 may receive the user plane tunnel configuration information from the SMF via an N11 interface. The AMF 172 may generally route and forward NAS packets to/from the WTRUs 102a, 102b, and 102c via an N1 interface. The N1 interface is not shown in
The SMF 174 may be connected to the AMF 172 via an N11 interface. Similarly, the SMF may be connected to the PCF 184 via an N7 interface, and to the UPFs 176a and 176b via an N4 interface. The SMF 174 may serve as a control node. For example, the SMF 174 may be responsible for Session Management, IP address allocation for the WTRUs 102a, 102b, and 102c, management and configuration of traffic steering rules in the UPF 176a and UPF 176b, and generation of downlink data notifications to the AMF 172.
The UPF 176a and UPF 176b may provide the WTRUs 102a, 102b, and 102c with access to a Packet Data Network (PDN), such as the Internet 110, to facilitate communications between the WTRUs 102a, 102b, and 102c and other devices. The UPF 176a and UPF 176b may also provide the WTRUs 102a, 102b, and 102c with access to other types of packet data networks. For example, Other Networks 112 may be Ethernet Networks or any type of network that exchanges packets of data. The UPF 176a and UPF 176b may receive traffic steering rules from the SMF 174 via the N4 interface. The UPF 176a and UPF 176b may provide access to a packet data network by connecting a packet data network with an N6 interface or by connecting to each other and to other UPFs via an N9 interface. In addition to providing access to packet data networks, the UPF 176 may be responsible packet routing and forwarding, policy rule enforcement, quality of service handling for user plane traffic, downlink packet buffering.
The AMF 172 may also be connected to the N3IWF 199, for example, via an N2 interface. The N3IWF facilitates a connection between the WTRU 102c and the 5G core network 170, for example, via radio interface technologies that are not defined by 3GPP. The AMF may interact with the N3IWF 199 in the same, or similar, manner that it interacts with the RAN 105.
The PCF 184 may be connected to the SMF 174 via an N7 interface, connected to the AMF 172 via an N15 interface, and to an Application Function (AF) 188 via an N5 interface. The N15 and N5 interfaces are not shown in
The UDR 178 may act as a repository for authentication credentials and subscription information. The UDR may connect to network functions, so that network function may add to, read from, and modify the data that is in the repository. For example, the UDR 178 may connect to the PCF 184 via an N36 interface. Similarly, the UDR 178 may connect to the NEF 196 via an N37 interface, and the UDR 178 may connect to the UDM 197 via an N35 interface.
The UDM 197 may serve as an interface between the UDR 178 and other network functions. The UDM 197 may authorize network functions to access of the UDR 178. For example, the UDM 197 may connect to the AMF 172 via an N8 interface, the UDM 197 may connect to the SMF 174 via an N10 interface. Similarly, the UDM 197 may connect to the AUSF 190 via an N13 interface. The UDR 178 and UDM 197 may be tightly integrated.
The AUSF 190 performs authentication related operations and connects to the UDM 178 via an N13 interface and to the AMF 172 via an N12 interface.
The NEF 196 exposes capabilities and services in the 5G core network 109 to Application Functions (AF) 188. Exposure may occur on the N33 API interface. The NEF may connect to an AF 188 via an N33 interface, and it may connect to other network functions in order to expose the capabilities and services of the 5G core network 109.
Application Functions 188 may interact with network functions in the 5G Core Network 109. Interaction between the Application Functions 188 and network functions may be via a direct interface or may occur via the NEF 196. The Application Functions 188 may be considered part of the 5G Core Network 109 or may be external to the 5G Core Network 109 and deployed by enterprises that have a business relationship with the mobile network operator.
Network Slicing is a mechanism that could be used by mobile network operators to support one or more ‘virtual’ core networks behind the operator's air interface. This involves ‘slicing’ the core network into one or more virtual networks to support different RANs or different service types running across a single RAN. Network slicing enables the operator to create networks customized to provide optimized solutions for different market scenarios which demands diverse requirements, e.g., in the areas of functionality, performance, and isolation.
3GPP has designed the 5G core network to support Network Slicing. Network Slicing is a useful tool that network operators may use to support the diverse set of 5G use cases (e.g., massive IoT, critical communications, V2X, and enhanced mobile broadband) which demand diverse and sometimes extreme requirements. Without the use of network slicing techniques, it is likely that the network architecture would not be flexible and scalable enough to efficiently support a wider range of use cases needed when each use case has its own specific set of performance, scalability, and availability requirements. Furthermore, introduction of new network services should be made more efficient.
Referring again to
The core network 109 may facilitate communications with other networks. For example, the core network 109 may include, or may communicate with, an IP gateway, such as an IP Multimedia Subsystem (IMS) server, which serves as an interface between the 5G core network 109 and a PSTN 108. For example, the core network 109 may include, or communicate with a short message service (SMS) service center that facilities communication via the short message service. For example, the 5G core network 109 may facilitate the exchange of non-IP data packets between the WTRUs 102a, 102b, and 102c and servers or applications functions 188. In addition, the core network 170 may provide the WTRUs 102a, 102b, and 102c with access to the networks 112, which may include other wired or wireless networks that are owned and/or operated by other service providers.
The core network entities described herein and illustrated in
WTRUs A, B, C, D, E, and F may communicate with each other over a Uu interface 129 via the gNB 121 if they are within the access network coverage 131. In the example of
WTRUs A, B, C, D, E, and F may communicate with RSU 123a or 123b via a Vehicle-to-Network (V2N) 133 or Sidelink interface 125b. WTRUs A, B, C, D, E, and F may communicate to a V2X Server 124 via a Vehicle-to-Infrastructure (V2I) interface 127. WTRUs A, B, C, D, E, and F may communicate to another UE via a Vehicle-to-Person (V2P) interface 128.
The processor 118 may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASICs), Field Programmable Gate Array (FPGAs) circuits, any other type of integrated circuit (IC), a state machine, and the like. The processor 118 may perform signal coding, data processing, power control, input/output processing, and/or any other functionality that enables the WTRU 102 to operate in a wireless environment. The processor 118 may be coupled to the transceiver 120, which may be coupled to the transmit/receive element 122. While
The transmit/receive element 122 of a UE may be configured to transmit signals to, or receive signals from, a base station (e.g., the base station 114a of
In addition, although the transmit/receive element 122 is depicted in
The transceiver 120 may be configured to modulate the signals that are to be transmitted by the transmit/receive element 122 and to demodulate the signals that are received by the transmit/receive element 122. As noted above, the WTRU 102 may have multi-mode capabilities. Thus, the transceiver 120 may include multiple transceivers for enabling the WTRU 102 to communicate via multiple RATs, for example NR and IEEE 802.11 or NR and E-UTRA, or to communicate with the same RAT via multiple beams to different RRHs, TRPs, RSUs, or nodes.
The processor 118 of the WTRU 102 may be coupled to, and may receive user input data from, the speaker/microphone 124, the keypad 126, and/or the display/touchpad/indicators 128 (e.g., a liquid crystal display (LCD) display unit or organic light-emitting diode (OLED) display unit. The processor 118 may also output user data to the speaker/microphone 124, the keypad 126, and/or the display/touchpad/indicators 128. In addition, the processor 118 may access information from, and store data in, any type of suitable memory, such as the non-removable memory 130 and/or the removable memory 132. The non-removable memory 130 may include random-access memory (RAM), read-only memory (ROM), a hard disk, or any other type of memory storage device. The removable memory 132 may include a subscriber identity module (SIM) card, a memory stick, a secure digital (SD) memory card, and the like. The processor 118 may access information from, and store data in, memory that is not physically located on the WTRU 102, such as on a server that is hosted in the cloud or in an edge computing platform or in a home computer (not shown).
The processor 118 may receive power from the power source 134 and may be configured to distribute and/or control the power to the other components in the WTRU 102. The power source 134 may be any suitable device for powering the WTRU 102. For example, the power source 134 may include one or more dry cell batteries, solar cells, fuel cells, and the like.
The processor 118 may also be coupled to the GPS chipset 136, which may be configured to provide location information (e.g., longitude and latitude) regarding the current location of the WTRU 102. In addition to, or in lieu of, the information from the GPS chipset 136, the WTRU 102 may receive location information over the air interface 115/116/117 from a base station (e.g., base stations 114a, 114b) and/or determine its location based on the timing of the signals being received from two or more nearby base stations. It will be appreciated that the WTRU 102 may acquire location information by way of any suitable location-determination method
The processor 118 may further be coupled to other peripherals 138, which may include one or more software and/or hardware modules that provide additional features, functionality, and/or wired or wireless connectivity. For example, the peripherals 138 may include various sensors such as an accelerometer, biometrics (e.g., finger print) sensors, an e-compass, a satellite transceiver, a digital camera (for photographs or video), a universal serial bus (USB) port or other interconnect interfaces, a vibration device, a television transceiver, a hands free headset, a Bluetooth® module, a frequency modulated (FM) radio unit, a digital music player, a media player, a video game player module, an Internet browser, and the like.
The WTRU 102 may be included in other apparatuses or devices, such as a sensor, consumer electronics, a wearable device such as a smart watch or smart clothing, a medical or eHealth device, a robot, industrial equipment, a drone, a vehicle such as a car, truck, train, or an airplane. The WTRU 102 may connect to other components, modules, or systems of such apparatuses or devices via one or more interconnect interfaces, such as an interconnect interface that may comprise one of the peripherals 138.
In operation, processor 91 fetches, decodes, and executes instructions, and transfers information to and from other resources via the computing system's main data-transfer path, system bus 80. Such a system bus connects the components in computing system 90 and defines the medium for data exchange. System bus 80 typically includes data lines for sending data, address lines for sending addresses, and control lines for sending interrupts and for operating the system bus. An example of such a system bus 80 is the PCI (Peripheral Component Interconnect) bus.
Memories coupled to system bus 80 include random access memory (RAM) 82 and read only memory (ROM) 93. Such memories include circuitry that allows information to be stored and retrieved. ROMs 93 generally contain stored data that cannot easily be modified. Data stored in RAM 82 may be read or changed by processor 91 or other hardware devices. Access to RAM 82 and/or ROM 93 may be controlled by memory controller 92. Memory controller 92 may provide an address translation function that translates virtual addresses into physical addresses as instructions are executed. Memory controller 92 may also provide a memory protection function that isolates processes within the system and isolates system processes from user processes. Thus, a program running in a first mode may access only memory mapped by its own process virtual address space; it cannot access memory within another process's virtual address space unless memory sharing between the processes has been set up.
In addition, computing system 90 may contain peripherals controller 83 responsible for communicating instructions from processor 91 to peripherals, such as printer 94, keyboard 84, mouse 95, and disk drive 85.
Display 86, which is controlled by display controller 96, is used to display visual output generated by computing system 90. Such visual output may include text, graphics, animated graphics, and video. The visual output may be provided in the form of a graphical user interface (GUI). Display 86 may be implemented with a CRT-based video display, an LCD-based flat-panel display, gas plasma-based flat-panel display, or a touch-panel. Display controller 96 includes electronic components required to generate a video signal that is sent to display 86.
Further, computing system 90 may contain communication circuitry, such as for example a wireless or wired network adapter 97, that may be used to connect computing system 90 to an external communications network or devices, such as the RAN 103/104/105, Core Network 106/107/109, PSTN 108, Internet 110, WTRUs 102, or Other Networks 112 of
It is understood that any or all of the apparatuses, systems, methods, and processes described herein may be embodied in the form of computer executable instructions (e.g., program code) stored on a computer-readable storage medium which instructions, when executed by a processor, such as processors 118 or 91, cause the processor to perform and/or implement the systems, methods and processes described herein. Specifically, any of the steps, operations, or functions described herein may be implemented in the form of such computer executable instructions, executing on the processor of an apparatus or computing system configured for wireless and/or wired network communications. Computer readable storage media includes volatile and nonvolatile, removable, and non-removable media implemented in any non-transitory (e.g., tangible, or physical) method or technology for storage of information, but such computer readable storage media do not include signals. Computer readable storage media include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other tangible or physical medium which may be used to store the desired information, and which may be accessed by a computing system.
This application claims the benefit of U.S. Patent Application No. 63/324,550, filed Mar. 28, 2022.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2023/016546 | 3/28/2023 | WO |
Number | Date | Country | |
---|---|---|---|
63324550 | Mar 2022 | US |