Various aspects of this disclosure generally relate to devices and methods for operating and configuring a radio communication network and terminal communication devices. By way of example, various aspects relate to devices and methods for operating a radio communication network receiving radio communication network operational data from at least one communication terminal device and using a communication device management protocol.
Mobile network operators are currently faced with commercial and technical pressures to continuously enhance their services in terms of user experience, efficiency and performance.
Data analytics offers a plethora of opportunities to mobile network operators for improving quality of service & network performance. Mobile network operators nowadays collect ample data about where, when and how subscribers of their services use their devices and establish usage patterns. Data Analytics is a key enabler even for 5G cellular networks and can be applied to improve the performance of several mechanisms, ranging from the supervision of Internet of Things, IoT, terminals to network management, to improving network performance.
As per 3GPP TR 23.791, some issues regarding collecting UE information to improve network efficiency are currently investigated.
In the drawings, like reference characters generally refer to the same parts throughout the different views. The drawings are not necessarily to scale, emphasis instead generally being placed upon illustrating the principles of the invention. It should be understood that the drawings are diagrammatic and schematic representations of exemplary aspects of the invention, and are neither limitative nor necessarily drawn to scale of the present invention. In the following description, various embodiments of the invention are described with reference to the following drawings, in which:
The following detailed description refers to the accompanying drawings that show, by way of illustration, specific details and embodiments in which the invention may be practiced.
The word “exemplary” is used herein to mean “serving as an example, instance, or illustration”. Any embodiment or design described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments or designs.
The terms “at least one” and “one or more” may be understood to include a numerical quantity greater than or equal to one (e.g., one, two, three, four, [ . . . ], etc.). The term “a plurality” may be understood to include a numerical quantity greater than or equal to two (e.g., two, three, four, five, [ . . . ], etc.).
The words “plural” and “multiple” in the description and in the claims expressly refer to a quantity greater than one. Accordingly, any phrases explicitly invoking the aforementioned words (e.g., “plural [elements]”, “multiple [elements]”) referring to a quantity of elements expressly refers to more than one of the said elements. The phrases “group (of)”, “set (of)”, “collection (of)”, “series (of)”, “sequence (of)”, “grouping (of)”, etc., and the like in the description and in the claims, if any, refer to a quantity equal to or greater than one, i.e., one or more. The phrases “proper subset”, “reduced subset”, and “lesser subset” refer to a subset of a set that is not equal to the set, illustratively, referring to a subset of a set that contains less elements than the set.
The phrase “at least one of” with regard to a group of elements may be used herein to mean at least one element from the group including the elements. For example, the phrase “at least one of” with regard to a group of elements may be used herein to mean a selection of: one of the listed elements, a plurality of one of the listed elements, a plurality of individual listed elements, or a plurality of a multiple of individual listed elements.
The term “data” as used herein may be understood to include information in any suitable analog or digital form, e.g., provided as a file, a portion of a file, a set of files, a signal or stream, a portion of a signal or stream, a set of signals or streams, and the like. Further, the term “data” may also be used to mean a reference to information, e.g., in form of a pointer. The term “data”, however, is not limited to the aforementioned examples and may take various forms and represent any information as understood in the art.
The terms “processor” or “controller” as, for example, used herein may be understood as any kind of technological entity that allows handling of data. The data may be handled according to one or more specific functions executed by the processor or controller. Further, a processor or controller as used herein may be understood as any kind of circuit, e.g., any kind of analog or digital circuit, and may also be referred to as a “processing circuit,” “processing circuitry,” among others. A processor or a controller may thus be or include an analog circuit, digital circuit, mixed-signal circuit, logic circuit, processor, microprocessor, Central Processing Unit (CPU), Graphics Processing Unit (GPU), Digital Signal Processor (DSP), Field Programmable Gate Array (FPGA), integrated circuit, Application Specific Integrated Circuit (ASIC), etc., or any combination thereof. Any other kind of implementation of the respective functions, which will be described below in further detail, may also be understood as a processor, controller, or logic circuit. It is understood that any two (or more) of the processors, controllers, or logic circuits detailed herein may be realized as a single entity with equivalent functionality, among others, and conversely that any single processor, controller, or logic circuit detailed herein may be realized as two (or more) separate entities with equivalent functionality, among others.
As used herein, “memory” is understood as a computer-readable medium in which data or information can be stored for retrieval. References to “memory” included herein may thus be understood as referring to volatile or non-volatile memory, including random access memory (RAM), read-only memory (ROM), flash memory, solid-state storage, magnetic tape, hard disk drive, optical drive, among others, or any combination thereof. Registers, shift registers, processor registers, data buffers, among others, are also embraced herein by the term memory. The term “software” refers to any type of executable instruction, including firmware.
The term “terminal device” utilized herein refers to user-side devices (both portable and fixed) that can connect to a core network and/or external data networks via a radio access network. “Terminal device” can include any mobile or immobile wireless communication device, including User Equipments (UEs), Mobile Stations (MS s), Stations (STAs), cellular phones, tablets, laptops, personal computers, wearables, multimedia playback and other handheld or body-mounted electronic devices, consumer/home/office/commercial appliances, vehicles, and any other electronic device capable of user-side wireless communications.
Various aspects of this disclosure may utilize or be related to radio communication technologies. While some examples may refer to specific radio communication technologies, the examples provided herein may be similarly applied to various other radio communication technologies, both existing and not yet formulated, particularly in cases where such radio communication technologies share similar features as disclosed regarding the following examples. For purposes of this disclosure, radio communication technologies may be classified as one of a Short Range radio communication technology or Cellular Wide Area radio communication technology. Short Range radio communication technologies may include Bluetooth, WLAN (e.g., according to any IEEE 802.11 standard), and other similar radio communication technologies. Cellular Wide Area radio communication technologies may include Global System for Mobile Communications (GSM), Code Division Multiple Access 2000 (CDMA2000), Universal Mobile Telecommunications System (UMTS), Long Term Evolution (LTE), General Packet Radio Service (GPRS), Evolution-Data Optimized (EV-DO), Enhanced Data Rates for GSM Evolution (EDGE), High Speed Packet Access (HSPA; including High Speed Downlink Packet Access (HSDPA), High Speed Uplink Packet Access (HSUPA), HSDPA Plus (HSDPA+), and HSUPA Plus (HSUPA+)), Worldwide Interoperability for Microwave Access (WiMax), 5G New Radio (NR), for example, and other similar radio communication technologies. Cellular Wide Area radio communication technologies also include “small cells” of such technologies, such as microcells, femtocells, and picocells. Cellular Wide Area radio communication technologies may be generally referred to herein as “cellular” communication technologies.
Unless explicitly specified, the term “transmit” encompasses both direct (point-to-point) and indirect transmission (via one or more intermediary points). Similarly, the term “receive” encompasses both direct and indirect reception. Furthermore, the terms “transmit”, “receive”, “communicate”, and other similar terms encompass both physical transmission (e.g., the transmission of radio signals) and logical transmission (e.g., the transmission of digital data over a logical software-level connection). For example, a processor or controller may transmit or receive data over a software-level connection with another processor or controller in the form of radio signals, where the physical transmission and reception is handled by radio-layer components such as RF transceivers and antennas, and the logical transmission and reception over the software-level connection is performed by the processors or controllers. The term “communicate” encompasses one or both of transmitting and receiving, i.e. unidirectional or bidirectional communication in one or both of the incoming and outgoing directions. The term “calculate” encompass both ‘direct’ calculations via a mathematical expression/formula/relationship and ‘indirect’ calculations via lookup or hash tables and other array indexing or searching operations.
Communication terminals such as e.g. User Equipments (UEs) are potential data collection points to gather more localized data analytics within the network.
Various aspects of this disclosure may provide efficient solutions for gathering and providing radio communication network operational data, e.g. UE data, which may then be processed and used to control and optimize the network.
As an example, providing UE data may be achieved by using a communication device management protocol such as the Lightweight-Machine-to-Machine, LwM2M, protocol as specified by the Open Mobile Alliance, OMA.
Using a device management protocol such as LwM2M may facilitate providing UE data for advanced analytics, and using the same for improving network performance.
In an exemplary cellular context, network access nodes 110 and 120 may be base stations (e.g., gNodeBs, eNodeBs, NodeBs, Base Transceiver Stations (BTSs), or any other type of base station). Terminal devices 102 and 104 may be cellular terminal devices (e.g., Mobile Stations (MS s), User Equipments (UEs), or any type of cellular terminal device) or Internet of Things (IoTs) devices and/or mobile Internet of Things (mIoTs) devices, or cloud clients or Time-Sensitive Networking, TSN, clients. Network access nodes 110 and 120 may interface (e.g., via backhaul interfaces) with a cellular core network such as an 5G Core (5GC, for 5G), Evolved Packet Core (EPC, for LTE), Core Network (CN, for UMTS), or other (cellular) core networks, which may also be considered part of radio communication network 100. The (cellular) core network may interface with one or more external data networks.
Network access nodes 110 and 120 (and, optionally, other network access nodes of radio communication network 100 not explicitly shown in
Radio communication network 200 may communicate with terminal devices 202, 204 and 206 via network access nodes 220, 240 and 260, respectively.
Terminal devices 202, 204 and 206 may e.g. be UEs or mIoTs devices/clients configured to communicate with server 208 via a communication device management protocol, e.g. via an OMA Device Management protocol or via the LwM2M protocol (in accordance with the OMA specification) to share device/UE information in terms of Management Objects (MO). Device 210 may communicate with server 208 and may use/leverage the device/UE information from server 208.
The LwM2M protocol is a Constrained Application Protocol (CoAP), and therefore, when the LwM2M protocol is used, terminal devices 202, 204 and 206 may communicate with server 208 via CoAP and/or via Datagram Transport Layer Security (DTLS) and/or via Short Message Service (SMS).
Terminal devices 202 and 204 are configured to send radio network operational data, e.g. UE data, to server 208 via a communication device management protocol such as e.g. the LwM2M protocol. The data may first be sent to a server 208, e.g. a LwM2M server such as LwM2M server 310 and later leveraged by device 210.
Device 210 includes a processor 212. According to some aspects, device 210 may also include a memory 214 configured to store the received data. According to further aspects, device 210 may include a server, e.g. a LwM2M server such as LwM2M server 310 (not shown).
Device 210 receives the data, e.g. LwM2M objects, from server 208 (and/or from terminal devices 202 and 204). Device 210 is configured to (pre-)process the received data and to determine, on the basis of said received data, communication network operation parameters used to control the operation of the communication network 200, e.g. in order to improve network efficiency. Device 210 then transmits the determined control parameters to a network node, such as e.g. network node 260 (and further network nodes not explicitly shown in
Device 210 may further be configured to transmit the data and/or the determined control parameters to other network and application functions, such as e.g. the network data analytics function, NWDAF, in the case of a 5G communication network.
In the following, the OMA LwM2M protocol is used as an example for a communication device management protocol. These examples are demonstrative in nature, and may therefore be readily applied to any other type of (communication) device management protocol. As alternative, the OMADM (Open Mobile Alliance Device Management) protocol may be used in various aspects.
According to various aspects, LwM2M server 310 and LwM2M clients 320 may be configured in accordance with an OMA LwM2M server and client.
The LwM2M server 310 includes security, communication, discovery, data storage & analytics, management and applications modules (in accordance with the OMA specification).
An LwM2M client 320 may for example be a UE, an MS (or any type of cellular terminal device), an IoT device, a mIoT device, a cloud client or a TSN client.
If a device is LwM2M capable, i.e. is compatible with the LwM2M protocol, such as LwM2M clients 320, it will be able to provide data such as Location profile, Connectivity Statistics, Cellular Connectivity, APN Connection Profile, Bearer Selection and various other LwM2M objects to the LwM2M server 310. Network operators may then use this information for (pre-)processing, storing and running statistical analysis and machine learning algorithms in order to achieve various network optimizations, such as a better understanding of network overload scenarios, improving the existing network performance, identifying the most profitable customers, etc. According to various aspects, the LwM2M server 310 may send the data (LwM2M objects) received from LwM2M clients 320 to a device such as device 210. Device 210 is configured to process the received data, and to output network operations parameters used for controlling and optimizing the network.
LwM2M objects have been enhanced to accommodate devices operating in Narrowband-IoT (NB-IoT) networks. Multiple device OEM can therefore use LwM2M resources defined as part of standard LwM2M objects to capture the data received from terminal communication devices such as UEs.
More details on some LwM2M objects, associated resources & how the information can be used by network operators is summarized in Table 1 below.
Thus, the information captured by LwM2M objects may be used for several network optimizations, such as QoS profile provisioning, supervision of (m)IoT terminals, handover decisions, traffic routing, UE behavioral information provisioning, determining overloaded and/or under-utilized networks, determining profitable customers, determining network upgrade requirements, etc.
For example, analytics information derived by QoS and/or by 5QI (5G QoS Identifier) such as Location, Radio Signal Strength, Link Quality, etc., can be used to find low coverage areas for UE clusters. The network operator may then improve radio coverage conditions in general or at the locations where the UEs lose service and/or have low coverage. In a multi-RAT scenario, the data collected from the terminal devices may be used to improve the connectivity experience of devices and to optimize their power consumption.
Further possible use cases are for example the following:
With minimal changes, most terminal devices such as e.g. UEs, can be made LwM2M capable and can implement a LwM2M client. As long as the terminal devices support a device management protocol such as e.g. the LwM2M protocol, they can contribute to optimizing the network. In Multi-RAT scenarios, the performance and connectivity experience can also be improved by using and processing the LwM2M objects received from terminal devices. Thus, with minimal changes to the terminal devices, and with no changes to 3GPP standards and to existing network nodes, device management protocols such as LwM2M can be implemented not only in 5G networks, but also in all types of networks and network generations, such as e.g. GSM, UMTS and LTE. The only change required to terminal devices is to implement a LwM2M client and to support the Management Objects listed in Table 1.
In
The above exemplary implementation is 5G specific, however, as long as terminal devices are compatible with (communication) device management protocols such as the LwM2M protocol, an LwM2M server such as server 310 and server 420 may be implemented into any type of communication network, i.e. in any type of Cellular Wide Area radio communication technologies or Short Range radio communication technologies network. In general, network operators may use data hosted in an LwM2M server for data analytics and thereby optimize the network, improve decisions regarding deployments and to better scale the network infrastructure.
In non-5G communication networks, LwM2M server 420 may for example be configured to send the gathered LwM2M objects to a device such as device 210, which is configured to process the received LwM2M objects and to output network operation parameters to control and optimize the operation of the communication network.
The new components for supporting data reporting by a device management protocol such as the LwM2M protocol may be compliant with the 3GPP specifications TS 26.531 V17.1.0 (2022-09)) and TS 26.532 V17.1.0 (2022-09). The LwM2M server may for example include either a direct data collection client or an indirect data collection client in order to provide the data to further AF/NFs. The data collection client is a functional entity defined by 3GPP that is configured to collect data and to report it to a data collection AF via a direct or an indirect client.
Optionally, the LwM2M server 620 may also include an Event Consumer AF 626, which is configured to communicate with the data collection AF 630 via reference point R6.
The 3GPP Specification TR 23.791, section 6.6, defines a solution for the NWDAF to interact with 5G NFs/AFs for data collection. According to some aspects, the LwM2M server may be configured to use the same framework to provision information to the NWDAF. The NFs/AFs may receive data (LwM2M objects) from the LwM2M server and may provide periodically, according to a subscription, a list of data blocks called Collectable Data Items (CDIs) to the NWDAF. This enables providing a generic service interface (Data Collection Service) offering the following operations in accordance with Table 2.
When a subscription is accepted, an AF/NF notifies of the requested CDIs to the NWDAF. Each notification may contain either a single timestamped set of instances of CDIs, or information on a file containing several instances. The CDIs can be made available on a periodical time frame basis, depending on the subscription parameters, or it can be requested by the NWDAF within a time frame.
Using device management protocols such as the LwM2M protocol for communication further provides several effects regarding the security and integrity of the collected data, as well as further privacy aspects which have to be considered when using data from terminal devices such as UEs for data analytics. In the following, a few of these effects will be explained in details.
The LwM2M protocol may include authorization, authentication, confidentiality, and data integrity for the communication between LwM2M entities, whereby, from the perspective of the LwM2M protocol stack, TLS/DTLS provides the main security mechanism, and from the perspective of the transport layer for the application layer the communication protocol CoAP provides security. In order to use these features, LwM2M clients are required to acquire credentials and configuration information, in order to ensure secure communications with LwM2M servers through a bootstrapping process.
The LwM2M framework may therefore include a LwM2M bootstrap server providing key material used to protect the communication between LwM2M clients and LwM2M servers. In accordance with the OMA LwM2M v1.1 specification, LwM2M may be extended with an application-layer security using Object Security for Constrained RESTful Environments (OSCORE), which offers a unified mechanism usable across a multitude of platforms, use cases and industries. OSCORE is a security protocol, e.g. an IoT security protocol, that protects the CoAP message exchanges, and provides end-to-end security even with proxies in the service path between two LwM2M endpoints, or with different transports in the path. In addition to CoAP, OSCORE uses Concise Binary Object Representation (CBOR) for compact encoding and CB OR Object Signature and Encryption (COSE).
The above described features ensure that only authorized endpoints controlled by the bootstrapping process may participate in the communication. The TLS/DTLS & application layer security using OSCORE further ensures that the data is not tampered.
The security of the LwM2M communication is based on CoAP, and utilizes DTLS as its main security mechanism. Along with UDP and SMS transport channel bindings, DTLS implements authentication, confidentiality and data integrity between server and client and includes 3 main security modes: certificates, raw public keys and pre-shared keys. The client is required to have credentials and configuration information obtained during the bootstrapping process. Once the bootstrap is done, the server authenticates the client, enabling the client to use security features supported by LwM2M.
The LwM2M protocol may further offer protection of personal data, so-called Personally Identifiable Information (PII), by using communication security and access control mechanisms. By way of example, the leakage of stored IoT device data in the LwM2M servers is avoided by LwM2M security features, the lifecycle management of LwM2M endpoints and the frequent firmware and software updates on the terminal communication devices via e.g. the Firmware Over-The-Air, FOTA, feature.
While the above descriptions and connected figures may depict electronic device components as separate elements, skilled persons will appreciate the various possibilities to combine or integrate discrete elements into a single element. Such may include combining two or more circuits for form a single circuit, mounting two or more circuits onto a common semiconductor chip or chassis to form an integrated element, executing discrete software components on a common processor core, etc. Conversely, skilled persons will recognize the possibility to separate a single element into two or more discrete elements, such as splitting a single circuit into two or more separate circuits, separating a semiconductor chip or chassis into discrete elements originally provided thereon, separating a software component into two or more sections and executing each on a separate processor core, etc.
It is appreciated that implementations of methods detailed herein are demonstrative in nature, and are thus understood as capable of being implemented in a corresponding device. Likewise, it is appreciated that implementations of devices detailed herein are understood as capable of being implemented as a corresponding method. It is thus understood that a device corresponding to a method detailed herein may include one or more components configured to perform each aspect of the related method.
All acronyms defined in the above description additionally hold in all claims included herein.
The following examples disclose various aspects of this disclosure:
Example 1 is a device for operating a radio communication network. The device may include a processor configured to receive radio communication network operational data from at least one communication terminal in accordance with a communication device management protocol, and to determine communication network operation parameters to control the operation of the communication network based on the received radio communication network operational data.
In Example 2, the subject-matter of Example 1 can optionally include that the device includes a memory, wherein the radio communication network operational data is stored in the memory.
In Example 3, the subject-matter of any one of Examples 1 or 2 can optionally include that the communication device management protocol is a Lightweight Machine-to-Machine, LwM2M, protocol including at least one LwM2M object.
In Example 4, the subject-matter of Example 3 can optionally include that the communication network operational data received from the at least one communication terminal in accordance with the LwM2M protocol includes at least one of the following LwM2M objects: Connectivity Monitoring, Connectivity Statistics, 5GNR Connectivity, Device, Location, Cellular Connectivity and LwM2M Bearer Selection; and that the received radio communication network operational data includes at least one LwM2M object.
In Example 5, the subject-matter of Example 4 can optionally include that each received LwM2M object includes at least one parameter, wherein
In Example 6, the subject-matter of any one of Examples 1 to 5 can optionally include that controlling the operation of the communication network includes at least one of: determining overloaded and/or under-utilized communication networks, traffic routing, Quality of Service, QoS, profile provisioning, supervision of the at least one communication terminal, handover decisions for the at least one communication terminal, behavioral information of the at least one communication terminal, determining a relevance of the at least one communication terminal, and determining network upgrade requirements.
In Example 7, the subject-matter of any one of Examples 1 to 6 can optionally include that the radio communication network is a Cellular Wide Area radio communication network configured in accordance with a 3GPP standard.
In Example 8, the subject-matter of any one of Examples 1 to 6 can optionally include that the radio communication network is a Short Range radio communication network.
Example 9 is a terminal communication device. The terminal communication device may include a processor configured to determine radio communication network operational data for one or more radio communication connections with a radio communication network, and send the determined radio communication network operational data to the radio communication network in accordance with a communication device management protocol to thereby enable the radio communication network to control the operation of the communication network.
In Example 10, the subject-matter of Example 9 can optionally include that the terminal communication device is an Internet of Things, IoT, terminal and/or that the terminal communication device is a mobile internet of things, mIoT, terminal.
In Example 11, the subject-matter of any one of Examples 9 to 10 can optionally include that the communication device management protocol is a Lightweight Machine-to-Machine, LwM2M, protocol including at least one LwM2M object.
In Example 12, the subject-matter of Example 11 can optionally include that the LwM2M protocol includes at least one of the following LwM2M objects: Connectivity Monitoring, Connectivity Statistics, 5GNR Connectivity, Device, Location, Cellular Connectivity and LwM2M Bearer Selection, and that the received radio communication network operational data includes at least one LwM2M object.
In Example 13, the subject-matter of any one of Examples 9 to 12 can optionally include that each LwM2M object includes at least one parameter, wherein the Connectivity Monitoring object parameters include any of: Network Bearer, Available Network Bearer, Radio Signal Strength, Link Quality, IP Addresses, Router IP Addresses, Link Utilization, APN, Cell ID, SMNC and SMCC;
In Example 14, the subject-matter of any one of Examples 9 to 13 can optionally include that controlling the operation of the communication network includes at least one of: determining overloaded and/or under-utilized communication networks, traffic routing, Quality of Service, QoS, profile provisioning, supervision of the at least one communication terminal, handover decisions for the at least one communication terminal, behavioral information of the at least one communication terminal, determining a relevance of the at least one communication terminal, and determining network upgrade requirements.
Example 15 is a method for operating a radio communication network. The method may include receiving radio communication network operational data from at least one communication terminal in accordance with a communication device management protocol, and determining communication network operation parameters to control the operation of the communication network based on the received radio communication network operational data.
In Example 16, the subject-matter of Example 15 can optionally include that the communication device management protocol is a Lightweight Machine-to-Machine, LwM2M, protocol including at least one LwM2M object.
In Example 17, the subject-matter of any one of Examples 15 or 16 can optionally include that receiving radio communication network operational data from at least one communication terminal in accordance with a LwM2M protocol includes receiving at least one of the following LwM2M objects: Connectivity Monitoring, Connectivity Statistics, 5GNR Connectivity, Device, Location, Cellular Connectivity and LwM2M Bearer Selection, and that receiving radio communication network operational data includes receiving at least one LwM2M object.
In Example 18, the subject-matter of Example 17 can optionally include that each LwM2M object includes at least one parameter, wherein the
In Example 19, the subject-matter of any one of Examples 15 to 18 can optionally include that controlling the operation of the communication network based on the received radio communication network operational data includes at least one of: determining overloaded and/or under-utilized communication networks, routing traffic, determining Quality of Service, QoS, profile provisioning, supervising the at least one communication terminal, determining handovers for the at least one communication terminal, determining behavioral information of the at least one communication terminal, determining a relevance of the at least one communication terminal, and determining network upgrade requirements.
In Example 20, the subject-matter of any one of Examples 15 to 19 can optionally include that the radio communication network is a Cellular Wide Area radio communication network configured in accordance with a 3GPP standard.
In Example 21, the subject-matter of any one of Examples 15 to 19 can optionally include that the radio communication network is a Short Range radio communication network.
Example 22 is a non-transitory computer readable medium. The non-transitory computer-readable medium may include instructions which, when executed, implements a method for operating a radio communication network, wherein the method includes receiving radio communication network operational data from at least one communication terminal in accordance with a communication device management protocol, and determining communication network operation parameters to control the operation of the communication network based on the received radio communication network operational data.
In Example 23, the subject-matter of Example 22 can optionally include that the communication device management protocol is a Lightweight Machine-to-Machine, LwM2M, protocol including at least one LwM2M object.
In Example 24, the subject-matter of any one of Examples 22 or 23 can optionally include that the communication network operational data received from the at least one communication terminal in accordance with the LwM2M protocol includes at least one of the following LwM2M objects: Connectivity Monitoring, Connectivity Statistics, 5GNR Connectivity, Device, Location, Cellular Connectivity and LwM2M Bearer Selection; and that the received radio communication network operational data includes at least one LwM2M object.
In Example 25, the subject-matter of Example 24 can optionally include that each received LwM2M object includes at least one parameter, wherein
In Example 26, the subject-matter of any one of Examples 22 to 25 can optionally include that controlling the operation of the communication network includes at least one of: determining overloaded and/or under-utilized communication networks, traffic routing, Quality of Service, QoS, profile provisioning, supervision of the at least one communication terminal, handover decisions for the at least one communication terminal, behavioral information of the at least one communication terminal, determining a relevance of the at least one communication terminal, and determining network upgrade requirements.
In Example 27, the subject-matter of any one of Examples 22 to 26 can optionally include that the radio communication network is a Cellular Wide Area radio communication network configured in accordance with a 3GPP standard.
In Example 28, the subject-matter of any one of Examples 22 to 26 can optionally include that the radio communication network is a Short Range radio communication network.
Example 29 is a device for operating a radio communication network. The device may include means for receiving radio communication network operational data from at least one communication terminal in accordance with a communication device management protocol, and means for determining communication network operation parameters based on the received radio communication network operational data to control the operation of the communication network.
In Example 30, the subject-matter of Example 29 can optionally include that the device includes means to store the radio communication network operational data.
In Example 31, the subject-matter of any one of Examples 29 or 30 can optionally include that the communication device management protocol is a Lightweight Machine-to-Machine, LwM2M, protocol including at least one LwM2M object.
In Example 32, the subject-matter of Example 31 can optionally include that the communication network operational data received from the at least one communication terminal in accordance with the LwM2M protocol includes at least one of the following LwM2M objects: Connectivity Monitoring, Connectivity Statistics, 5GNR Connectivity, Device, Location, Cellular Connectivity and LwM2M Bearer Selection; and that the received radio communication network operational data includes at least one LwM2M object.
In Example 33, the subject-matter of Example 32 can optionally include that each received LwM2M object includes at least one parameter, wherein
In Example 34, the subject-matter of any one of Examples 29 to 33 can optionally include that controlling the operation of the communication network includes at least one of: determining overloaded and/or under-utilized communication networks, traffic routing, Quality of Service, QoS, profile provisioning, supervision of the at least one communication terminal, handover decisions for the at least one communication terminal, behavioral information of the at least one communication terminal, determining a relevance of the at least one communication terminal, and determining network upgrade requirements.
In Example 35, the subject-matter of any one of Examples 29 to 34 can optionally include that the radio communication network is a Cellular Wide Area radio communication network configured in accordance with a 3GPP standard.
In Example 36, the subject-matter of any one of Examples 29 to 34 can optionally include that the radio communication network is a Short Range radio communication network.
While the invention has been particularly shown and described with reference to specific embodiments, it should be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. The scope of the invention is thus indicated by the appended claims and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced.