The non-limiting and exemplary embodiments of the present disclosure generally relate to the technical field of communications, and specifically to methods and apparatuses for setting up session with required QoS (quality of service).
This section introduces aspects that may facilitate a better understanding of the disclosure. Accordingly, the statements of this section are to be read in this light and are not to be understood as admissions about what is in the prior art or what is not in the prior art.
A server (such as Application Function (AF), application server (AS), Edge Application Server (EAS), or Edge Enabler Server (EES), etc.) may interact with a core network (such as 3rd Generation Partnership Project (3GPP) core network) in order to set up session with required QoS. For example, the server may invoke 3GPP core network function application programming interfaces (API) directly, if it is an entity trusted by the 3GPP core network. The server may invoke 3GPP core network capabilities through the EES. The server may invoke the 3GPP core network capability through the capability exposure functions, such as network exposure function (NEF) or service capability exposure function (SCEF).
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Table 5.14.2.1.2-1 of 3GPP TS 29.122 V17.1.0, the disclosure of which is incorporated by reference herein in its entirety, describes definition of type AsSessionWithQoSSubscription.
According to Table 5.14.2.1.2-1, Flow description(s) comprised in Nnef_AFsessionWithQoS_Create request message describes the IP data flow which requires QoS. IP flow description can not support traffic filter for encrypted traffic (such as HTTPS traffic). In addition, several application services may be deployed on the same AF, which means the AF exposes the same IP address and port (e.g. port number 443 for HTTPS), which makes the IP flow description impossible to distinguish different application services on the same AF.
To overcome or mitigate at least one above mentioned problems or other problems, an improved solution for setting up session with required QoS may be desirable.
In a first aspect of the disclosure, there is provided a method performed by a server. The method comprises sending a packet flow description (PFD) management request to an exposure function entity. The PFD management request comprises at least one PFD comprising information used for traffic detection of a specific application service and an application identifier corresponding to the specific application service. The method further comprises providing specific quality of service (QoS) information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS to a policy function entity.
In an embodiment, the information used for traffic detection of the specific application service comprises at least one of a domain name or a uniform resource locator.
In an embodiment, the domain name comprises Transport Layer Security Server Name Indication (TLS SNI).
In an embodiment, the traffic detection of the specific application service comprises encrypted traffic detection of the specific application service.
In an embodiment, providing the specific QoS information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS to the policy function entity comprises directly sending a message comprising the specific QoS information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS to the policy function entity or providing the specific QoS information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS to the policy function entity via the exposure function entity.
In an embodiment, the policy function entity comprises at least one of policy control function (PCF), or policy and charging rules function (PCRF).
In an embodiment, the exposure function entity comprises at least one of network exposure function (NEF), or service capability exposure function (SCEF).
In an embodiment, the server comprises at least one of an edge enabler server or an application server.
In an embodiment, when the server is an edge enabler server, the method further comprises receiving a request for establishing a data session with the specific QoS from an edge application server, wherein the request comprises the information used for traffic detection of the specific application service.
In an embodiment, the request further comprises the application identifier corresponding to the specific application service.
In an embodiment, when the application identifier corresponding to the specific application service is absent in the request, the method further comprises deriving the application identifier corresponding to the specific application service.
In an embodiment, the method further comprises checking whether the edge application server is authorized.
In an embodiment, when the request is for a group of use equipments (UEs) identified by a UE group identifier (ID) or for a single UE identified by a UE ID, the method further comprises sending an event monitoring request for session status of the data session to the exposure function entity. The method further comprises receiving a notification for session status of the data session from the exposure function entity.
In an embodiment, the method further comprises sending a response for the request to the edge application server.
In an embodiment, the data session comprises a protocol data unit (PDU) data session between an application client and the edge application server.
In a second aspect of the disclosure, there is provided a method performed by an edge application server. The method comprises sending a request for establishing a data session with specific quality of service (QoS) to an edge enabler server. The request comprises information used for traffic detection of a specific application service.
In an embodiment, the request is for a group of use equipments (UEs) identified by a UE group identifier (ID) or for a single UE identified by a UE ID.
In an embodiment, the method further comprises receiving a response for the request from the edge enabler server.
In a third aspect of the disclosure, there is provided a method performed by an exposure function entity. The method comprises receiving a packet flow description (PFD) management request from a server. The PFD management request comprises at least one PFD comprising information used for traffic detection of a specific application service and an application identifier corresponding to the specific application service. The method further comprises processing the PFD management request.
In an embodiment, the method further comprises receiving an event monitoring request for session status of a data session from the server. The method further comprises sending a notification for session status of the data session to the server.
In an embodiment, the method further comprises receiving a message comprising specific QoS information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS from the server. In an embodiment, the method further comprises sending a message comprising the specific QoS information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS to a policy function entity.
In a fourth aspect of the disclosure, there is provided a server. The server comprises a processor and a memory coupled to the processor. Said memory contains instructions executable by said processor. Said server is operative to send a packet flow description (PFD) management request to an exposure function entity. The PFD management request comprises at least one PFD comprising information used for traffic detection of a specific application service and an application identifier corresponding to the specific application service. Said server is further operative to provide specific quality of service (QoS) information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS to a policy function entity.
In a fifth aspect of the disclosure, there is provided an edge application server. The edge application server comprises a processor and a memory coupled to the processor. Said memory contains instructions executable by said processor. Said edge application server is operative to send a request for establishing a data session with specific quality of service (QoS) to an edge enabler server. The request comprises information used for traffic detection of a specific application service.
In a sixth aspect of the disclosure, there is provided an exposure function entity. The exposure function entity comprises a processor and a memory coupled to the processor. Said memory contains instructions executable by said processor. Said exposure function entity is operative to receive a packet flow description (PFD) management request from a server. The PFD management request comprises at least one PFD comprising information used for traffic detection of a specific application service and an application identifier corresponding to the specific application service. Said exposure function entity is further operative to process the PFD management request.
In a seventh aspect of the disclosure, there is provided a server. The server comprises a first sending module and a providing module . The first sending module may be configured to send a packet flow description (PFD) management request to an exposure function entity. The PFD management request comprises at least one PFD comprising information used for traffic detection of a specific application service and an application identifier corresponding to the specific application service. The providing module may be configured to provide specific quality of service (QoS) information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS to a policy function entity.
In an embodiment, the server further comprises a first receiving module configured to receive a request for establishing a data session with the specific QoS from an edge application server. The request comprises the information used for traffic detection of the specific application service.
In an embodiment, the server further comprises a deriving module configured to derive the application identifier corresponding to the specific application service when the application identifier corresponding to the specific application service is absent in the request.
In an embodiment, the server further comprises a checking module configured to checking whether the edge application server is authorized.
In an embodiment, the server further comprises a second sending module configured to send an event monitoring request for session status of the data session to the exposure function entity
In an embodiment, the server further comprises a second receiving module configured to receive a notification for session status of the data session from the exposure function entity.
In an embodiment, the server further comprises a third sending module configured to sending a response for the request to the edge application server.
In an eighth aspect of the disclosure, there is provided an edge enabler server. The edge enabler server comprises a sending module . The sending module may be configured to send a request for establishing a data session with specific quality of service (QoS) to an edge enabler server. The request comprises information used for traffic detection of a specific application service.
In an embodiment, the edge enabler server further comprises a receiving module configured to receive a response for the request from the edge enabler server.
In a ninth aspect of the disclosure, there is provided an exposure function entity. The exposure function entity comprises a first receiving module and a processing module . The first receiving module may be configured to receive a packet flow description (PFD) management request from a server. The PFD management request comprises at least one PFD comprising information used for traffic detection of a specific application service and an application identifier corresponding to the specific application service. The processing module may be configured to process the PFD management request.
In an embodiment, the exposure function entity further comprises a second receiving module configured to receive an event monitoring request for session status of a data session from the server.
In an embodiment, the exposure function entity further comprises a first sending module configured to send a notification for session status of the data session to the server.
In an embodiment, the exposure function entity further comprises a third receiving module configured to receive a message comprising specific QoS information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS from the server
In an embodiment, the exposure function entity further comprises a second sending module configured to sending a message comprising the specific QoS information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS to a policy function entity.
In a tenth aspect of the disclosure, there is provided a computer program product comprising instructions which, when executed on at least one processor, cause the at least one processor to carry out any of the methods according to the first, second and third aspects of the disclosure.
In an eleventh aspect of the disclosure, there is provided a computer-readable storage medium storing instructions which, when executed on at least one processor, cause the at least one processor to carry out any of the methods according to the first, second and third aspects of the disclosure.
Embodiments herein afford many advantages, of which a non-exhaustive list of examples follows. Some embodiments herein may support traffic filter for encrypted traffic (such as HTTPS traffic). Some embodiments herein may enable (encrypted) traffic detection of a specific application service. Some embodiments herein may provide domain name for encrypted traffic detection in QoS API. Some embodiments herein provide domain name to distinguish different application services. The embodiments herein are not limited to the features and advantages mentioned above. A person skilled in the art will recognize additional features and advantages upon reading the following detailed description.
The above and other aspects, features, and benefits of various embodiments of the present disclosure will become more fully apparent, by way of example, from the following detailed description with reference to the accompanying drawings, in which like reference numerals or letters are used to designate like or equivalent elements. The drawings are illustrated for facilitating better understanding of the embodiments of the disclosure and not necessarily drawn to scale, in which:
The embodiments of the present disclosure are described in detail with reference to the accompanying drawings. It should be understood that these embodiments are discussed only for the purpose of enabling those skilled persons in the art to better understand and thus implement the present disclosure, rather than suggesting any limitations on the scope of the present disclosure. Reference throughout this specification to features, advantages, or similar language does not imply that all of the features and advantages that may be realized with the present disclosure should be or are in any single embodiment of the disclosure. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present disclosure. Furthermore, the described features, advantages, and characteristics of the disclosure may be combined in any suitable manner in one or more embodiments. One skilled in the relevant art will recognize that the disclosure may be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the disclosure.
As used herein, the term “network” refers to a network following any suitable communication standards such as new radio (NR), long term evolution (LTE), LTE-Advanced, wideband code division multiple access (WCDMA), high-speed packet access (HSPA), Code Division Multiple Access (CDMA), Time Division Multiple Address (TDMA), Frequency Division Multiple Access (FDMA), Orthogonal Frequency-Division Multiple Access (OFDMA), Single carrier frequency division multiple access (SC-FDMA) and other wireless networks. A CDMA network may implement a radio technology such as Universal Terrestrial Radio Access (UTRA), etc. UTRA includes WCDMA and other variants of CDMA. A TDMA network may implement a radio technology such as Global System for Mobile Communications (GSM). An OFDMA network may implement a radio technology such as Evolved UTRA (E-UTRA), Ultra Mobile Broadband (UMB), IEEE 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20, Flash-OFDMA, Ad-hoc network, wireless sensor network, etc. In the following description, the terms “network” and “system” can be used interchangeably. Furthermore, the communications between two devices in the network may be performed according to any suitable communication protocols, including, but not limited to, the communication protocols as defined by a standard organization such as 3GPP. For example, the communication protocols may comprise the first generation (1G), 2G, 3G, 4G, 4.5G, 5G communication protocols, and/or any other protocols either currently known or to be developed in the future.
The term “network device” or “network node” or “network function” refers to any suitable network function (NF) which can be implemented in a network entity (physical or virtual) of a communication network. For example, the network function can be implemented either as a network element on a dedicated hardware, as a software instance running on a dedicated hardware, or as a virtualized function instantiated on an appropriate platform, e.g. on a cloud infrastructure. For example, the 5G system (5GS) may comprise a plurality of NFs such as AMF (Access and mobility Function), SMF (Session Management Function), AUSF (Authentication Service Function), UDM (Unified Data Management), PCF (Policy Control Function), AF (Application Function), NEF (Network Exposure Function), UPF (User plane Function) and NRF (Network Repository Function), RAN (radio access network), SCP (service communication proxy), NWDAF (network data analytics function), NSSF (Network Slice Selection Function), NSSAAF (Network Slice-Specific Authentication and Authorization Function), etc. For example, the 4G system (such as LTE) may include MME (Mobile Management Entity), HSS (home subscriber server), Policy and Charging Rules Function (PCRF), Packet Data Network Gateway (PGW), PGW control plane (PGW-C), Serving gateway (SGW), SGW control plane (SGW-C), E-UTRAN Node B (eNB), etc. In other embodiments, the network function may comprise different types of NFs for example depending on a specific network.
The term “terminal device” refers to any end device that can access a communication network and receive services therefrom. By way of example and not limitation, the terminal device refers to a mobile terminal, user equipment (UE), or other suitable devices. The UE may be, for example, a Subscriber Station (SS), a Portable Subscriber Station, a Mobile Station (MS), or an Access Terminal (AT). The terminal device may include, but not limited to, a portable computer, an image capture terminal device such as a digital camera, a gaming terminal device, a music storage and a playback appliance, a mobile phone, a cellular phone, a smart phone, a voice over IP (VOIP) phone, a wireless local loop phone, a tablet, a wearable device, a personal digital assistant (PDA), a portable computer, a desktop computer, a wearable terminal device, a vehicle-mounted wireless terminal device, a wireless endpoint, a mobile station, a laptop-embedded equipment (LEE), a laptop-mounted equipment (LME), a USB dongle, a smart device, a wireless customer-premises equipment (CPE) and the like. In the following description, the terms “terminal device”, “terminal”, “user equipment” and “UE” may be used interchangeably. As one example, a terminal device may represent a UE configured for communication in accordance with one or more communication standards promulgated by the 3GPP (3rd Generation Partnership Project), such as 3GPP′ LTE standard or NR standard. As used herein, a “user equipment” or “UE” may not necessarily have a “user” in the sense of a human user who owns and/or operates the relevant device. In some embodiments, a terminal device may be configured to transmit and/or receive information without direct human interaction. For instance, a terminal device may be designed to transmit information to a network on a predetermined schedule, when triggered by an internal or external event, or in response to requests from the communication network. Instead, a UE may represent a device that is intended for sale to, or operation by, a human user but that may not initially be associated with a specific human user.
As yet another example, in an Internet of Things (IoT) scenario, a terminal device may represent a machine or other device that performs monitoring and/or measurements, and transmits the results of such monitoring and/or measurements to another terminal device and/or network equipment. The terminal device may in this case be a machine-to-machine (M2M) device, which may in a 3GPP context be referred to as a machine-type communication (MTC) device. As one particular example, the terminal device may be a UE implementing the 3GPP narrow band internet of things (NB-IoT) standard. Particular examples of such machines or devices are sensors, metering devices such as power meters, industrial machinery, or home or personal appliances, for example refrigerators, televisions, personal wearables such as watches etc. In other scenarios, a terminal device may represent a vehicle or other equipment that is capable of monitoring and/or reporting on its operational status or other functions associated with its operation.
References in the specification to “one embodiment,” “an embodiment,” “an example embodiment,” and the like indicate that the embodiment described may include a particular feature, structure, or characteristic, but it is not necessary that every embodiment includes the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to affect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
It shall be understood that although the terms “first” and “second” etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and similarly, a second element could be termed a first element, without departing from the scope of example embodiments. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed terms.
As used herein, the phrase “at least one of A and B” or “at least one of A or B” should be understood to mean “only A, only B, or both A and B.” The phrase “A and/or B” should be understood to mean “only A, only B, or both A and B”.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises”, “comprising”, “has”, “having”, “includes” and/or “including”, when used herein, specify the presence of stated features, elements, and/or components etc., but do not preclude the presence or addition of one or more other features, elements, components and/or combinations thereof.
It is noted that these terms as used in this document are used only for ease of description and differentiation among nodes, devices or networks etc. With the development of the technology, other terms with the similar/same meanings may also be used.
In the following description and claims, unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skills in the art to which this disclosure belongs.
3GPP TS 23.558 V17.0.0, the disclosure of which is incorporated by reference herein in its entirety, specifies application layer architecture, procedures and information flows necessary for enabling edge applications over 3GPP networks. It includes architectural requirements for enabling edge applications, application layer architecture fulfilling the architecture requirements and procedures to enable the deployment of edge applications.
One of the main areas focused on is to minimize the impact to Edge based applications. So they do not need major Application redevelopment for UE use at the Edge.
EDGE-3 reference point enables interactions between the Edge Enabler Server and the Edge Application Servers (EAS). It supports:
The other reference points are described in clause 6.5 of 3GPP TS 23.558 V17.0.0.
One important functionality in the edge enabling layer is the EES exposed capabilities which include EES capabilities and exposed 3GPP core network capabilities. The 3GPP core network capabilities may be exposed from EES to the Edge Application Server(s) with enhancement, e.g.:
The Edge Enabler Server exposes the Session with QoS API to the Edge Application Server in order to support the setup of a data session between Application Client and Edge Application Server with a specific QoS and the modification of the QoS of this data session.
The Session with QoS API exposed by the Edge Enabler Server relies on the northbound Policy Authorization Service API exposed by the PCF (Policy Control Function) as specified in 3GPP TS 23.502 V17.0.0 and 3GPP TS 23.503 V17.0.0, the disclosure of which is incorporated by reference herein in its entirety, if the Edge Enabler Server is connected to the PCF via the N5 reference point, or on the northbound AF Session with QoS Service API exposed by the NEF as specified in 3GPP TS 23.502 V17.0.0 and 3GPP TS 23.503 V17.0.0, if the Edge Enabler Server is connected to the PCF via a Network Exposure Function (NEF).
Step 1. The EAS requests establishment of a data session between the AC and the EAS with a specific QoS (either QoS reference or bandwidth). If the data session can adjust to different QoS parameter combinations, the request may include a list of alternative QoS references in a priority order. The EAS shall include the UE's IP address, UE ID (identifier) or UE Group ID, the DNN (Data Network Name) and S-NSSAI (Single Network Slice Selection Assistance Information) used for the data session between AC and EAS. With the same request the EAS subscribes to receive certain session with QoS event notifications (e.g. notifications related to QoS monitoring, usage monitoring for sponsored data connectivity and/or QoS targets can no longer (or can again) be fulfilled).
Step 2. The EES checks if the EAS is authorized for this operation for the UE. If authorized, then the following services of 3GPP CN (core network) may be used by the EES:
The usage of step 2a and step 2b is as follows:
Step 3. If the operation in step 2 is successful, the EES responds with a Context ID and a Result. The Context ID is to be used by the EAS for further requests (e.g. session with QoS update requests) pertaining to the same UE. If the EAS is not authorized or any other failure happens during the operation, the EES provides a rejection response with cause information.
Step 4. When the EES receives the corresponding UE IP (Internet protocol) address for the single UE or UE group member from the PDU session status notification sent by the 3GPP core network, the EES requests data session with specific QoS as described in step 2b.
The EES will report the resource allocation outcome, e.g. the successful allocation of the Service Data Flow(s) related to the data session, with a separate session with QoS notify operation (see 3GPP TS 23.503 V 17.0.0, clause 6.1.3.18).
Step 1. The EES detects a user plane event associated with the established session (i.e. it receives a Policy Authorization Notify operation from the PCC or an AF Session with QoS Notify operation from the NEF as described in 3GPP TS 23.501 V17.0.0 and 3GPP TS 23.502 V17.0.0). The EES determines to notify the session with QoS event notification information (e.g., resource allocation outcome or information that the QoS targets can no longer (or can again) be fulfilled) to the EASs which have subscribed to the session with QoS event notification.
Step 2. The EES sends a session with QoS event notification to the EAS. The EES includes the session with QoS event notification information of the UE.
The existing session with QoS API only supports the IP flow description. For example, Table 1 describes the information elements for a Session with QoS create request from the EAS to the EES. Table 1 is same as Table 8.6.6.3.2-1 of 3GPP TS 23.558 V17.0.0.
As shown in Table 1, only IP (Internet protocol) flow description is supported in the Session with QoS create request from the EAS to the EES. IP flow description may represent a 3-tuple with protocol, server IP and server port for UL(uplink)/DL(downlink) application traffic Nowadays, the encrypted traffic volume (e.g. HTTPS (Hypertext Transfer Protocol Secure)) is increasing rapidly year by year in Internet. IP flow description can not support traffic filter for encrypted traffic (such as HTTPS traffic), which may make the Edge-3 QoS API less attractive to the EAS developer. In addition, several application services may be deployed on the same EAS, which means the EAS exposes the same IP address and port (e.g. port number 443 for HTTPS), which makes the IP flow description impossible to distinguish different application services on the same EAS.
Step 1. The AF sends a request to reserve resources for an AF session using Nnef_AFsessionWithQoS_Create request message (UE address, AF Identifier, Flow description(s), QoS reference, (optional) Alternative Service Requirements (containing one or more QoS reference parameters in a prioritized order)) to the NEF. Optionally, a period of time or a traffic volume for the requested QoS can be included in the AF request. The NEF assigns a Transaction Reference ID to the Nnef_AFsessionWithQoS_Create request. The AF may in addition provide the following parameters: Requested 5GS delay, Requested GFBR (Guaranteed Flow Bit Rate), Requested MFBR (Maximum Flow Bit Rate), flow direction, Burst Size (optional), Burst Arrival Time (optional) at UE (uplink) or UPF (User Plane Function) (downlink), Periodicity (optional), Time domain (optional).
The other steps of
Although the subject matter described herein may be implemented in any appropriate type of system using any suitable components, the embodiments disclosed herein are described in relation to a communication system complied with the exemplary system architectures illustrated in
In accordance with an exemplary embodiment, the UE can establish a signaling connection with the AMF over the reference point N1, as illustrated in
As further illustrated in
Various NFs shown in
The system architecture shows the architecture for a UE used for MTC connecting to the 3GPP network (UTRAN (Universal Terrestrial Radio Access Network), E-UTRAN (Evolved UTRAN), GERAN (GSM EDGE (Enhanced Data rates for GSM Evolution) Radio Access Network), etc.) via the Um/Uu/LTE-Uu interfaces. The system architecture also shows the 3GPP network service capability exposure to SCS and AS.
As further illustrated in
The end-to-end communications, between the MTC Application in the UE and the MTC Application in the external network, uses services provided by the 3GPP system, and optionally services provided by a Services Capability Server (SCS).
The MTC Application in the external network is typically hosted by an Application Server (AS) and may make use of an SCS for additional value added services. The 3GPP system provides transport, subscriber management and other communication services including various architectural enhancements motivated by, but not restricted to, MTC (e.g. control plane device triggering).
Different models are foreseen for machine type of traffic in what relates to the communication between the AS and the 3GPP system and based on the provider of the SCS. The different architectural models that are supported by the Architectural Reference model include the Direct model, Indirect model and Hybrid model as described in 3GPP TS 23.682 V16.9.0.
At block 702, the server may send a packet flow description (PFD) management request to an exposure function entity. The PFD management request may comprise at least one PFD comprising information used for traffic detection of a specific application service and an application identifier corresponding to the specific application service. The application identifier corresponding to the specific application service may be received from a network node (such as EAS) or determined by the server for example based on a local policy.
The server may be any suitable server. In an embodiment, the server may comprise at least one of an edge enabler server or application server (such as AF, EAS, etc.).
The exposure function entity may be any suitable network function which can support exposure of capabilities and events, secure provision of information from external application to a core network, etc. In an embodiment, the exposure function entity may comprise at least one of network exposure function (NEF) or service capability exposure function (SCEF). It is noted that NEF may be combined with SCEF.
The PFD management request may be used by the server to provision or remove one or more PFD(s) belonging to an application identifier in a core network node such as Unified Data Repository (UDR). PFD sets belonging to different application identifiers can be managed with the same PFD management request message.
The PFD may further comprise any other suitable information such as PFD ID, dnProtocol, etc. PFD ID identifies a PFD of an application identifier. dnProtocol indicates the additional protocol and protocol field for domain names to be matched. dnProtocol may only be provided when domain names attribute is present in the PFD.
In an embodiment, the PFD may be same as the definition of type Pfd as described in 3GPP TS 29.122 V17.1.0.
The information used for traffic detection of the specific application service may comprise any suitable information which can be used for traffic detection of the specific application service. In an embodiment, the information used for traffic detection of the specific application service may comprise at least one of a domain name or a uniform resource locator (URL). The domain name may indicate an FQDN (Fully Qualified Domain Name) or a regular expression as a domain name matching criteria. The URL may indicate a URL or a regular expression which is used to match the significant parts of the URL.
In an embodiment, the domain name may be the domain name for the application traffic and the applicable protocol. For example, the domain name may be Transport Layer Security Server Name Indication (TLS SNI).
In an embodiment, the traffic detection of the specific application service comprises encrypted traffic detection of the specific application service.
In an embodiment, the traffic detection of the specific application service comprises unencrypted traffic detection of the specific application service.
In an embodiment, the PFD management request may be Nnef_PFDManagement_Create request or Nnef_PFDManagement_Update request as described in 3GPP TS 23.502 V 17.0.0.
At block 704, the server may provide specific quality of service (QoS) information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS to a policy function entity. The QoS information may take any suitable forms. For example, the server may provide a QoS reference which may identify a pre-defined QoS information.
The policy function entity may be an entity which can provide policy rule(s) to control plane function(s) to enforce them. In an embodiment, the policy function entity may comprise at least one of policy control function (PCF) or policy and charging rules function (PCRF).
The server may provide the specific QoS information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS to the policy function entity in various ways.
In an embodiment, the server may directly send a message comprising the specific QoS information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS to the policy function entity. For example if the server is an entity trusted by the core network, the server may invoke core network function APIs directly to provide the specific QoS information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS to the policy function entity.
In an embodiment, when the server is EAS, the server may invoke 3GPP core network capabilities through the EES to provide the specific QoS information and the application identifier corresponding to the specific application service to the policy function entity.
In an embodiment, the server may invoke the 3GPP core network capability through the exposure function entity (i.e. SCEF or NEF) to provide the specific QoS information and the application identifier corresponding to the specific application service to the policy function entity.
In an embodiment, the server may invokes the Policy Authorization Create service or the AF Session with QoS service with the 3GPP core network (PCF or NEF, respectively) as described in 3GPP TS 23.501 V17.0.0 and 3GPP TS 23.502 V17.0.0, providing the specific QoS (QoS reference or bandwidth) to the PCF as described in 3GPP TS 23.503 V17.0.0, clause 6.1.3.22. Additionally, the server may subscribe to notifications of resource allocation outcome and to other events described in clause 6.1.3.18 of 3GPP TS 23.503 V17.0.0, e.g. notifications of when the QoS targets can no longer (or can again) be fulfilled.
For example, at least one of Npcf_PolicyAuthorization_Create request message, Npcf_PolicyAuthorization_Update request message, Nnef_AFsessionWithQoS_Create request message, Nnef_AFsessionWithQoS_Update request message as described in 3GPP TS 23.502 V17.0.0 may be used in block 704 to provide the specific QoS information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS to the policy function entity.
In an embodiment, the server may further provide the information used for traffic detection of the specific application service to the policy function entity at block 704.
At block 802, the server may receive a request for establishing a data session with the specific QoS from an edge application server. The request comprises the information used for traffic detection of the specific application service.
In an embodiment, the data session comprises a protocol data unit (PDU) data session between an application client and the edge application server.
In an embodiment, the request further comprises the application identifier corresponding to the specific application service.
At block 804, when the application identifier corresponding to the specific application service is absent in the request, the server may derive the application identifier corresponding to the specific application service. For example, the server may derive the application identifier corresponding to the specific application service based on local policy. As another embodiment, the server may maintain a mapping table between the information used for traffic detection of the specific application service information and the application identifier corresponding to the specific application service. The server may derive the application identifier corresponding to the specific application service based on the mapping table.
At block 806, the server may check whether the edge application server is authorized. For example, when the edge application server is authorized, the edge application server may perform blocks 808, 810, 812, 814 and 816, otherwise the request may be rejected and the method 800 may go to block 816.
At block 808, when the request is for a group of use equipments (UEs) identified by a UE group identifier (ID) or for a single UE identified by a UE ID, the server may send an event monitoring request for session status of the data session to the exposure function entity.
At block 810, the server may receive a notification for session status of the data session from the exposure function entity.
At block 812, the server may send a packet flow description (PFD) management request to an exposure function entity. The PFD management request comprises at least one PFD comprising information used for traffic detection of a specific application service and an application identifier corresponding to the specific application service
At block 814, the server may provide specific quality of service (QoS) information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS to a policy function entity. In an embodiment, the server may further provide the information used for traffic detection of the specific application service to the policy function entity.
At block 816, the server may send a response for the request to the edge application server. For example, if the operation in blocks 812 and 814 is successful, the server responds with a context ID and a Result. The context ID is to be used by the EAS for further requests (e.g. session with QoS update requests) pertaining to the same UE. If the EAS is not authorized or any other failure happens during the operation in blocks 812 and 814, the server provides a rejection response with cause information.
At block 902, the edge application server may send a request for establishing a data session with a specific QoS to an edge enabler server. The request comprises information used for traffic detection of a specific application service.
At block 904, optionally, the edge application server may receive a response for the request from the edge enabler server.
At block 1002, the exposure function entity may receive a packet flow description (PFD) management request from a server. The PFD management request comprises at least one PFD comprising information used for traffic detection of a specific application service and an application identifier corresponding to the specific application service.
At block 1004, the exposure function entity may process the PFD management request. For example, the exposure function entity may process the PFD management request as described in clause 4.18.2 of 3GPP TS 23.502 V 17.0.0.
At block 1102, the exposure function entity may receive an event monitoring request for session status of a data session from the server. For example, the server may send the event monitoring request at block 808 of
At block 1104, the exposure function entity may send a notification for session status of the data session to the server.
For example, when the exposure function entity is NEF, the exposure function entity may use Nnef_EventExposure_subscribe request as described in clause 4.15.3.2.3 of 3GPP TS 23.502 V 17.0.0 to subscribe to notifications for session status of the data session.
At block 1202, the exposure function entity may receive a message comprising specific QoS information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS from the server.
At block 1204, the exposure function entity may send a message comprising the specific QoS information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS to a policy function entity.
For example, the exposure function entity may receive Nnef_AFsessionWithQoS_Create request message comprises the specific QoS information and the application identifier corresponding to the specific application service from the server. The exposure function entity may authorize the Nnef_AFsessionWithQoS_Create request and may apply policies to control the overall amount of pre-defined QoS authorized for the server. If the authorisation is not granted, the exposure function entity may replies to the server with a result value indicating that the authorisation failed. If the authorisation is granted, the exposure function entity interacts with the policy function entity by triggering a Npcf_PolicyAuthorization_Create request and provides UE address, AF Identifier, Flow description(s), the QoS reference and the optional Alternative Service Requirements (containing one or more QoS reference parameters in a prioritized order). Any optionally received period of time or traffic volume is also included and mapped to sponsored data connectivity information.
In an embodiment, the exposure function entity may further send the information used for traffic detection of the specific application service to the policy function entity at block 1204.
According to various embodiments, it proposed to add domain name for encrypted traffic filter for QoS API. The current definition of QoS API only allows IP flow description, nowadays, the encrypted traffic volume (e.g. HTTPS) is increasing rapidly year by year in Internet. Not supporting traffic filter for encrypted traffic will make the Edge-3 QoS API less attractive to the EAS developer. With the support of application ID in setting up required QoS, the AF can provide application ID for identifying detailed traffic flow filter. This allows traffic filters other than IP 5-tuple to be provided by the AF. The EAS should be able to provide domain name for encrypted traffic detection in QoS API.
In an embodiment, 3GPP TS 23.558 V17.0.0 may be amended as following.
Step 1. The EAS requests establishment of a data session between the AC and the EAS with a specific QoS (either QoS reference or bandwidth). If the data session can adjust to different QoS parameter combinations, the request may include a list of alternative QoS references in a priority order. The EAS shall include the UE's IP address, UE ID or UE Group ID, the DNN and S-NSSAI used for the data session between AC and EAS. With the same request the EAS subscribes to receive certain session with QoS event notifications (e.g. notifications related to QoS monitoring, usage monitoring for sponsored data connectivity and/or QoS targets can no longer (or can again) be fulfilled).
Step 2. The EES checks if the EAS is authorized for this operation for the UE. If authorized, then the following services of 3GPP CN may be used by the EES: Step 2a. the EES invokes the PFD management procedure with the 3GPP core network, as described in 3GPP TS 23.502 [3].
Step 2b. the EES invokes the Event Monitoring service for PDU session status with the 3GPP core network, as described in 3GPP TS 23.502 [3].
Step 2c. the EES invokes the Policy Authorization Create service or the AF Session with QoS service with the 3GPP core network (PCF or NEF, respectively) as described in 3GPP TS 23.501 V17.0.0 and 3GPP TS 23.502 V17.0.0, providing the specific QoS (QoS reference or bandwidth) to the PCF as described in 3GPP TS 23.503 V17.0.0, clause 6.1.3.22. Additionally, the EES may subscribe to notifications of resource allocation outcome and to other events described in clause 6.1.3.18 of 3GPP TS 23.503 V17.0.0, e.g. notifications of when the QoS targets can no longer (or can again) be fulfilled.
The usage of step 2a, 2b and step 2c of
Step 3. If the operation in step 2 of
Step 4. When the EES receives the corresponding UE IP address for the single UE or UE group member from the PDU session status notification sent by the 3GPP core network, the EES requests data session with specific QoS as described in step 2c of
NOTE: The EES will report the resource allocation outcome, e.g. the successful allocation of the Service Data Flow(s) related to the data session, with a separate session with QoS notify operation (see TS 23.503 V17.0.0, clause 6.1.3.18).
8.6.6.3.2 Session with QoS Create Request
Table 8.6.6.3.2-1 describes the information elements for a Session with QoS create request from the EAS to the EES.
8.6.6.3.4 Session with QoS Update Request
Table 8.6.6.3.4-1 describes the information elements for a Session with QoS update request from the EAS to the EES.
When required, the EES may utilize:
The various blocks/steps shown in above Figures may be viewed as method steps, and/or as operations that result from operation of computer program code, and/or as a plurality of coupled logic circuit elements constructed to carry out the associated function(s). The schematic flow chart diagrams described above are generally set forth as logical flow chart diagrams. As such, the depicted order and labeled steps are indicative of specific embodiments of the presented methods. Other steps and methods may be conceived that are equivalent in function, logic, or effect to one or more steps, or portions thereof, of the illustrated methods. Additionally, the order in which a particular method occurs may or may not strictly adhere to the order of the corresponding steps shown.
Embodiments herein afford many advantages, of which a non-exhaustive list of examples follows. Some embodiments herein may support traffic filter for encrypted traffic (such as HTTPS traffic). Some embodiments herein may enable (encrypted) traffic detection of a specific application service. Some embodiments herein may provide domain name for encrypted traffic detection in QoS API. Some embodiments herein provide domain name to distinguish different application services. The embodiments herein are not limited to the features and advantages mentioned above. A person skilled in the art will recognize additional features and advantages upon reading the following detailed description.
The apparatus 1400 comprises at least one processor 1421, such as a digital processor (DP), and at least one memory (MEM) 1422 coupled to the processor 1421. The apparatus 1420 may further comprise a transmitter TX and receiver RX 1423 coupled to the processor 1421. The MEM 1422 stores a program (PROG) 1424. The PROG 1424 may include instructions that, when executed on the associated processor 1421, enable the apparatus 1420 to operate in accordance with the embodiments of the present disclosure. A combination of the at least one processor 1421 and the at least one MEM 1422 may form processing means 1425 adapted to implement various embodiments of the present disclosure.
Various embodiments of the present disclosure may be implemented by computer program executable by one or more of the processor 1421, software, firmware, hardware or in a combination thereof.
The MEM 1422 may be of any type suitable to the local technical environment and may be implemented using any suitable data storage technology, such as semiconductor based memory devices, magnetic memory devices and systems, optical memory devices and systems, fixed memories and removable memories, as non-limiting examples.
The processor 1421 may be of any type suitable to the local technical environment, and may include one or more of general purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs) and processors based on multicore processor architecture, as non-limiting examples.
In an embodiment where the apparatus is implemented as or at the server, the memory 1422 contains instructions executable by the processor 1421, whereby the server operates according to any step of any of the methods related to the server as described above.
In an embodiment where the apparatus is implemented as or at the edge application server, the memory 1422 contains instructions executable by the processor 1421, whereby the edge application server operates according to any step of the methods related to the edge application server as described above.
In an embodiment where the apparatus is implemented as or at the exposure function entity, the memory 1422 contains instructions executable by the processor 1421, whereby the exposure function entity operates according to any step of the methods related to the exposure function entity as described above.
In an embodiment, the server 1500 further comprises a first receiving module 1506 configured to receive a request for establishing a data session with the specific QoS from an edge application server. The request comprises the information used for traffic detection of the specific application service.
In an embodiment, the server 1500 further comprises a deriving module 1508 configured to derive the application identifier corresponding to the specific application service when the application identifier corresponding to the specific application service is absent in the request.
In an embodiment, the server 1500 further comprises a checking module 1510 configured to checking whether the edge application server is authorized.
In an embodiment, the server 1500 further comprises a second sending module 1512 configured to send an event monitoring request for session status of the data session to the exposure function entity
In an embodiment, the server 1500 further comprises a second receiving module 1514 configured to receive a notification for session status of the data session from the exposure function entity.
In an embodiment, the server 1500 further comprises a third sending module 1516 configured to sending a response for the request to the edge application server.
In an embodiment, the edge enabler server 1600 further comprises a receiving module 1604 configured to receive a response for the request from the edge enabler server.
In an embodiment, the exposure function entity 1700 further comprises a second receiving module 1706 configured to receive an event monitoring request for session status of a data session from the server.
In an embodiment, the exposure function entity 1700 further comprises a first sending module 1708 configured to send a notification for session status of the data session to the server.
In an embodiment, the exposure function entity 1700 further comprises a third receiving module 1710 configured to receive a message comprising specific QoS information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS from the server
In an embodiment, the exposure function entity 1700 further comprises a second sending module 1712 configured to sending a message comprising the specific QoS information and the application identifier corresponding to the specific application service for requesting data session with the specific QoS to a policy function entity.
The term unit or module may have conventional meaning in the field of electronics, electrical devices and/or electronic devices and may include, for example, electrical and/or electronic circuitry, devices, modules, processors, memories, logic solid state and/or discrete devices, computer programs or instructions for carrying out respective tasks, procedures, computations, outputs, and/or displaying functions, and so on, as such as those that are described herein.
With function units, the server, exposure function entity or the edge application server may not need a fixed processor or memory, any computing resource and storage resource may be arranged from the server, exposure function entity or the edge application server in the communication system. The introduction of virtualization technology and network computing technology may improve the usage efficiency of the network resources and the flexibility of the network.
According to an aspect of the disclosure it is provided a computer program product being tangibly stored on a computer readable storage medium and including instructions which, when executed on at least one processor, cause the at least one processor to carry out any of the methods as described above.
According to an aspect of the disclosure it is provided a computer-readable storage medium storing instructions which when executed by at least one processor, cause the at least one processor to carry out any of the methods as described above.
In addition, the present disclosure may also provide a carrier containing the computer program as mentioned above, wherein the carrier is one of an electronic signal, optical signal, radio signal, or computer readable storage medium. The computer readable storage medium can be, for example, an optical compact disk or an electronic memory device like a RAM (random access memory), a ROM (read only memory), Flash memory, magnetic tape, CD-ROM, DVD, Blue-ray disc and the like.
The techniques described herein may be implemented by various means so that an apparatus implementing one or more functions of a corresponding apparatus described with an embodiment comprises not only prior art means, but also means for implementing the one or more functions of the corresponding apparatus described with the embodiment and it may comprise separate means for each separate function or means that may be configured to perform one or more functions. For example, these techniques may be implemented in hardware (one or more apparatuses), firmware (one or more apparatuses), software (one or more modules), or combinations thereof. For a firmware or software, implementation may be made through modules (e.g., procedures, functions, and so on) that perform the functions described herein.
Exemplary embodiments herein have been described above with reference to block diagrams and flowchart illustrations of methods and apparatuses. It will be understood that each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, respectively, can be implemented by various means including computer program instructions. These computer program instructions may be loaded onto a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions which execute on the computer or other programmable data processing apparatus create means for implementing the functions specified in the flowchart block or blocks.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are contained in the above discussions, these should not be construed as limitations on the scope of the subject matter described herein, but rather as descriptions of features that may be specific to particular embodiments. Certain features that are described in the context of separate embodiments may also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment may also be implemented in multiple embodiments separately or in any suitable sub-combination.
While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any implementation or of what may be claimed, but rather as descriptions of features that may be specific to particular embodiments of particular implementations. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable sub-combination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a sub-combination or variation of a sub-combination.
It will be obvious to a person skilled in the art that, as the technology advances, the inventive concept can be implemented in various ways. The above described embodiments are given for describing rather than limiting the disclosure, and it is to be understood that modifications and variations may be resorted to without departing from the spirit and scope of the disclosure as those skilled in the art readily understand. Such modifications and variations are considered to be within the scope of the disclosure and the appended claims. The protection scope of the disclosure is defined by the accompanying claims.
Number | Date | Country | Kind |
---|---|---|---|
PCT/CN2021/104039 | Jul 2021 | WO | international |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/CN2022/102854 | 6/30/2022 | WO |