The present specification relates to mobile communications.
3rd generation partnership project (3GPP) long-term evolution (LTE) is a technology for enabling high-speed packet communications. Many schemes have been proposed for the LTE objective including those that aim to reduce user and provider costs, improve service quality, and expand and improve coverage and system capacity. The 3GPP LTE requires reduced cost per bit, increased service availability, flexible use of a frequency band, a simple structure, an open interface, and adequate power consumption of a terminal as an upper-level requirement.
Work has started in international telecommunication union (ITU) and 3GPP to develop requirements and specifications for new radio (NR) systems. 3GPP has to identify and develop the technology components needed for successfully standardizing the new RAT timely satisfying both the urgent market needs, and the more long-term requirements set forth by the ITU radio communication sector (ITU-R) international mobile telecommunications (IMT)-2020 process. Further, the NR should be able to use any spectrum band ranging at least up to 100 GHz that may be made available for wireless communications even in a more distant future.
The NR targets a single technical framework addressing all usage scenarios, requirements and deployment scenarios including enhanced mobile broadband (eMBB), massive machine-type-communications (mMTC), ultra-reliable and low latency communications (URLLC), etc. The NR shall be inherently forward compatible.
In the handover process of the terminal, when remapping is performed because the target base station does not support the network slice used before the handover, the problem is how the terminal can recognize this.
The updated information may be transmitted to the terminal by making an information update request by the AMF.
The present specification may have various effects.
For example, through the procedure disclosed in this specification, it is possible to increase communication efficiency by continuing to use the PDU session previously used by the terminal through network remapping.
Effects that can be obtained through specific examples of the present specification are not limited to the effects listed above. For example, various technical effects that a person having ordinary skill in the related art can understand or derive from the present specification may exist. Accordingly, the specific effects of the present specification are not limited to those explicitly described herein, and may include various effects that can be understood or derived from the technical characteristics of the present specification.
The following techniques, apparatuses, and systems may be applied to a variety of wireless multiple access systems. Examples of the multiple access systems include a code division multiple access (CDMA) system, a frequency division multiple access (FDMA) system, a time division multiple access (TDMA) system, an orthogonal frequency division multiple access (OFDMA) system, a single carrier frequency division multiple access (SC-FDMA) system, and a multicarrier frequency division multiple access (MC-FDMA) system. CDMA may be embodied through radio technology such as universal terrestrial radio access (UTRA) or CDMA2000. TDMA may be embodied through radio technology such as global system for mobile communications (GSM), general packet radio service (GPRS), or enhanced data rates for GSM evolution (EDGE). OFDMA may be embodied through radio technology such as institute of electrical and electronics engineers (IEEE) 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20, or evolved UTRA (E-UTRA). UTRA is a part of a universal mobile telecommunications system (UMTS). 3rd generation partnership project (3GPP) long term evolution (LTE) is a part of evolved UMTS (E-UMTS) using E-UTRA. 3GPP LTE employs OFDMA in DL and SC-FDMA in UL. Evolution of 3GPP LTE includes LTE-A (advanced), LTE-A Pro, and/or 5G NR (new radio).
For convenience of description, implementations of the present disclosure are mainly described in regards to a 3GPP based wireless communication system. However, the technical features of the present disclosure are not limited thereto. For example, although the following detailed description is given based on a mobile communication system corresponding to a 3GPP based wireless communication system, aspects of the present disclosure that are not limited to 3GPP based wireless communication system are applicable to other mobile communication systems.
For terms and technologies which are not specifically described among the terms of and technologies employed in the present disclosure, the wireless communication standard documents published before the present disclosure may be referenced.
In the present disclosure, “A or B” may mean “only A”, “only B”, or “both A and B”. In other words, “A or B” in the present disclosure may be interpreted as “A and/or B”. For example, “A, B or C” in the present disclosure may mean “only A”, “only B”, “only C”, or “any combination of A, B and C”.
In the present disclosure, slash (/) or comma (,) may mean “and/or”. For example, “A/B” may mean “A and/or B”. Accordingly, “A/B” may mean “only A”, “only B”, or “both A and B”. For example, “A, B, C” may mean “A, B or C”.
In the present disclosure, “at least one of A and B” may mean “only A”, “only B” or “both A and B”. In addition, the expression “at least one of A or B” or “at least one of A and/or B” in the present disclosure may be interpreted as same as “at least one of A and B”.
In addition, in the present disclosure, “at least one of A, B and C” may mean “only A”, “only B”, “only C”, or “any combination of A, B and C”. In addition, “at least one of A, B or C” or “at least one of A, B and/or C” may mean “at least one of A, B and C”.
Also, parentheses used in the present disclosure may mean “for example”. In detail, when it is shown as “control information (PDCCH)”, “PDCCH” may be proposed as an example of “control information”. In other words, “control information” in the present disclosure is not limited to “PDCCH”, and “PDCCH” may be proposed as an example of “control information”. In addition, even when shown as “control information (i.e., PDCCH)”, “PDCCH” may be proposed as an example of “control information”.
Technical features that are separately described in one drawing in the present disclosure may be implemented separately or simultaneously.
Although not limited thereto, various descriptions, functions, procedures, suggestions, methods and/or operational flowcharts of the present disclosure disclosed herein can be applied to various fields requiring wireless communication and/or connection (e.g., 5G) between devices.
Hereinafter, the present disclosure will be described in more detail with reference to drawings. The same reference numerals in the following drawings and/or descriptions may refer to the same and/or corresponding hardware blocks, software blocks, and/or functional blocks unless otherwise indicated.
The 5G usage scenarios shown in
Three main requirement categories for 5G include (1) a category of enhanced mobile broadband (eMBB), (2) a category of massive machine type communication (mMTC), and (3) a category of ultra-reliable and low latency communications (URLLC).
Referring to
The BSs 200 and the network 300 may be implemented as wireless devices and a specific wireless device may operate as a BS/network node with respect to other wireless devices.
The wireless devices 100a to 100f represent devices performing communication using radio access technology (RAT) (e.g., 5G new RAT (NR)) or LTE) and may be referred to as communication/radio/5G devices. The wireless devices 100a to 100f may include, without being limited to, a robot 100a, vehicles 100b-1 and 100b-2, an extended reality (XR) device 100c, a hand-held device 100d, a home appliance 100e, an IoT device 100f, and an artificial intelligence (AI) device/server 400. For example, the vehicles may include a vehicle having a wireless communication function, an autonomous driving vehicle, and a vehicle capable of performing communication between vehicles. The vehicles may include an unmanned aerial vehicle (UAV) (e.g., a drone). The XR device may include an AR/VR/Mixed Reality (MR) device and may be implemented in the form of a head-mounted device (HMD), a head-up display (HUD) mounted in a vehicle, a television, a smartphone, a computer, a wearable device, a home appliance device, a digital signage, a vehicle, a robot, etc. The hand-held device may include a smartphone, a smartpad, a wearable device (e.g., a smartwatch or a smartglasses), and a computer (e.g., a notebook). The home appliance may include a TV, a refrigerator, and a washing machine. The IoT device may include a sensor and a smartmeter.
In the present disclosure, the wireless devices 100a to 100f may be called user equipments (UEs). A UE may include, for example, a cellular phone, a smartphone, a laptop computer, a digital broadcast terminal, a personal digital assistant (PDA), a portable multimedia player (PMP), a navigation system, a slate personal computer (PC), a tablet PC, an ultrabook, a vehicle, a vehicle having an autonomous traveling function, a connected car, an UAV, an AI module, a robot, an AR device, a VR device, an MR device, a hologram device, a public safety device, an MTC device, an IoT device, a medical device, a FinTech device (or a financial device), a security device, a weather/environment device, a device related to a 5G service, or a device related to a fourth industrial revolution field.
The UAV may be, for example, an aircraft aviated by a wireless control signal without a human being onboard.
The VR device may include, for example, a device for implementing an object or a background of the virtual world. The AR device may include, for example, a device implemented by connecting an object or a background of the virtual world to an object or a background of the real world. The MR device may include, for example, a device implemented by merging an object or a background of the virtual world into an object or a background of the real world. The hologram device may include, for example, a device for implementing a stereoscopic image of 360 degrees by recording and reproducing stereoscopic information, using an interference phenomenon of light generated when two laser lights called holography meet.
The public safety device may include, for example, an image relay device or an image device that is wearable on the body of a user.
The MTC device and the IoT device may be, for example, devices that do not require direct human intervention or manipulation. For example, the MTC device and the IoT device may include smartmeters, vending machines, thermometers, smartbulbs, door locks, or various sensors.
The medical device may be, for example, a device used for the purpose of diagnosing, treating, relieving, curing, or preventing disease. For example, the medical device may be a device used for the purpose of diagnosing, treating, relieving, or correcting injury or impairment. For example, the medical device may be a device used for the purpose of inspecting, replacing, or modifying a structure or a function. For example, the medical device may be a device used for the purpose of adjusting pregnancy. For example, the medical device may include a device for treatment, a device for operation, a device for (in vitro) diagnosis, a hearing aid, or a device for procedure.
The security device may be, for example, a device installed to prevent a danger that may arise and to maintain safety. For example, the security device may be a camera, a closed-circuit TV (CCTV), a recorder, or a black box.
The FinTech device may be, for example, a device capable of providing a financial service such as mobile payment. For example, the FinTech device may include a payment device or a point of sales (POS) system.
The weather/environment device may include, for example, a device for monitoring or predicting a weather/environment.
The wireless devices 100a to 100f may be connected to the network 300 via the BSs 200. An AI technology may be applied to the wireless devices 100a to 100f and the wireless devices 100a to 100f may be connected to the AI server 400 via the network 300. The network 300 may be configured using a 3G network, a 4G (e.g., LTE) network, a 5G (e.g., NR) network, and a beyond-5G network. Although the wireless devices 100a to 100f may communicate with each other through the BSs 200/network 300, the wireless devices 100a to 100f may perform direct communication (e.g., sidelink communication) with each other without passing through the BSs 200/network 300. For example, the vehicles 100b-1 and 100b-2 may perform direct communication (e.g., vehicle-to-vehicle (V2V)/vehicle-to-everything (V2X) communication). The IoT device (e.g., a sensor) may perform direct communication with other IoT devices (e.g., sensors) or other wireless devices 100a to 100f.
Wireless communication/connections 150a, 150b and 150c may be established between the wireless devices 100a to 100f and/or between wireless device 100a to 100f and BS 200 and/or between BSs 200. Herein, the wireless communication/connections may be established through various RATs (e.g., 5G NR) such as uplink/downlink communication 150a, sidelink communication (or device-to-device (D2D) communication) 150b, inter-base station communication 150c (e.g., relay, integrated access and backhaul (IAB)), etc. The wireless devices 100a to 100f and the BSs 200/the wireless devices 100a to 100f may transmit/receive radio signals to/from each other through the wireless communication/connections 150a, 150b and 150c. For example, the wireless communication/connections 150a, 150b and 150c may transmit/receive signals through various physical channels. To this end, at least a part of various configuration information configuring processes, various signal processing processes (e.g., channel encoding/decoding, modulation/demodulation, and resource mapping/de-mapping), and resource allocating processes, for transmitting/receiving radio signals, may be performed based on the various proposals of the present disclosure.
AI refers to the field of studying artificial intelligence or the methodology that can create it, and machine learning refers to the field of defining various problems addressed in the field of AI and the field of methodology to solve them. Machine learning is also defined as an algorithm that increases the performance of a task through steady experience on a task.
Robot means a machine that automatically processes or operates a given task by its own ability. In particular, robots with the ability to recognize the environment and make self-determination to perform actions can be called intelligent robots. Robots can be classified as industrial, medical, home, military, etc., depending on the purpose or area of use. The robot can perform a variety of physical operations, such as moving the robot joints with actuators or motors. The movable robot also includes wheels, brakes, propellers, etc., on the drive, allowing it to drive on the ground or fly in the air.
Autonomous driving means a technology that drives on its own, and autonomous vehicles mean vehicles that drive without user's control or with minimal user's control. For example, autonomous driving may include maintaining lanes in motion, automatically adjusting speed such as adaptive cruise control, automatic driving along a set route, and automatically setting a route when a destination is set. The vehicle covers vehicles equipped with internal combustion engines, hybrid vehicles equipped with internal combustion engines and electric motors, and electric vehicles equipped with electric motors, and may include trains, motorcycles, etc., as well as cars. Autonomous vehicles can be seen as robots with autonomous driving functions.
Extended reality is collectively referred to as VR, AR, and MR. VR technology provides objects and backgrounds of real world only through computer graphic (CG) images. AR technology provides a virtual CG image on top of a real object image. MR technology is a CG technology that combines and combines virtual objects into the real world. MR technology is similar to AR technology in that they show real and virtual objects together. However, there is a difference in that in AR technology, virtual objects are used as complementary forms to real objects, while in MR technology, virtual objects and real objects are used as equal personalities.
NR supports multiples numerologies (and/or multiple subcarrier spacings (SCS)) to support various 5G services. For example, if SCS is 15 kHz, wide area can be supported in traditional cellular bands, and if SCS is 30 kHz/60 kHz, dense-urban, lower latency, and wider carrier bandwidth can be supported. If SCS is 60 kHz or higher, bandwidths greater than 24.25 GHz can be supported to overcome phase noise.
The NR frequency band may be defined as two types of frequency range, i.e., FR1 and FR2. The numerical value of the frequency range may be changed. For example, the frequency ranges of the two types (FR1 and FR2) may be as shown in Table 1 below. For ease of explanation, in the frequency ranges used in the NR system, FR1 may mean “sub 6 GHz range”, FR2 may mean “above 6 GHz range,” and may be referred to as millimeter wave (mmW).
As mentioned above, the numerical value of the frequency range of the NR system may be changed. For example, FR1 may include a frequency band of 410 MHz to 7125 MHz as shown in Table 2 below. That is, FR1 may include a frequency band of 6 GHz (or 5850, 5900, 5925 MHz, etc.) or more. For example, a frequency band of 6 GHz (or 5850, 5900, 5925 MHz, etc.) or more included in FR1 may include an unlicensed band. Unlicensed bands may be used for a variety of purposes, for example for communication for vehicles (e.g., autonomous driving).
Here, the radio communication technologies implemented in the wireless devices in the present disclosure may include narrowband internet-of-things (NB-IoT) technology for low-power communication as well as LTE, NR and 6G. For example, NB-IoT technology may be an example of low power wide area network (LPWAN) technology, may be implemented in specifications such as LTE Cat NB1 and/or LTE Cat NB2, and may not be limited to the above-mentioned names. Additionally and/or alternatively, the radio communication technologies implemented in the wireless devices in the present disclosure may communicate based on LTE-M technology. For example, LTE-M technology may be an example of LPWAN technology and be called by various names such as enhanced machine type communication (eMTC). For example, LTE-M technology may be implemented in at least one of the various specifications, such as 1) LTE Cat 0, 2) LTE Cat M1, 3) LTE Cat M2, 4) LTE non-bandwidth limited (non-BL), 5) LTE-MTC, 6) LTE Machine Type Communication, and/or 7) LTE M, and may not be limited to the above-mentioned names. Additionally and/or alternatively, the radio communication technologies implemented in the wireless devices in the present disclosure may include at least one of ZigBee, Bluetooth, and/or LPWAN which take into account low-power communication, and may not be limited to the above-mentioned names. For example, ZigBee technology may generate personal area networks (PANs) associated with small/low-power digital communication based on various specifications such as IEEE 802.15.4 and may be called various names.
Referring to
In
The first wireless device 100 may include at least one transceiver, such as a transceiver 106, at least one processing chip, such as a processing chip 101, and/or one or more antennas 108.
The processing chip 101 may include at least one processor, such a processor 102, and at least one memory, such as a memory 104. It is exemplarily shown in
The processor 102 may control the memory 104 and/or the transceiver 106 and may be configured to implement the descriptions, functions, procedures, suggestions, methods and/or operational flowcharts described in the present disclosure. For example, the processor 102 may process information within the memory 104 to generate first information/signals and then transmit radio signals including the first information/signals through the transceiver 106. The processor 102 may receive radio signals including second information/signals through the transceiver 106 and then store information obtained by processing the second information/signals in the memory 104.
The memory 104 may be operably connectable to the processor 102. The memory 104 may store various types of information and/or instructions. The memory 104 may store a software code 105 which implements instructions that, when executed by the processor 102, perform the descriptions, functions, procedures, suggestions, methods and/or operational flowcharts disclosed in the present disclosure. For example, the software code 105 may implement instructions that, when executed by the processor 102, perform the descriptions, functions, procedures, suggestions, methods and/or operational flowcharts disclosed in the present disclosure. For example, the software code 105 may control the processor 102 to perform one or more protocols. For example, the software code 105 may control the processor 102 to perform one or more layers of the radio interface protocol.
Herein, the processor 102 and the memory 104 may be a part of a communication modem/circuit/chip designed to implement RAT (e.g., LTE or NR). The transceiver 106 may be connected to the processor 102 and transmit and/or receive radio signals through one or more antennas 108. Each of the transceiver 106 may include a transmitter and/or a receiver. The transceiver 106 may be interchangeably used with radio frequency (RF) unit(s). In the present disclosure, the first wireless device 100 may represent a communication modem/circuit/chip.
The second wireless device 200 may include at least one transceiver, such as a transceiver 206, at least one processing chip, such as a processing chip 201, and/or one or more antennas 208.
The processing chip 201 may include at least one processor, such a processor 202, and at least one memory, such as a memory 204. It is exemplarily shown in
The processor 202 may control the memory 204 and/or the transceiver 206 and may be configured to implement the descriptions, functions, procedures, suggestions, methods and/or operational flowcharts described in the present disclosure. For example, the processor 202 may process information within the memory 204 to generate third information/signals and then transmit radio signals including the third information/signals through the transceiver 206. The processor 202 may receive radio signals including fourth information/signals through the transceiver 106 and then store information obtained by processing the fourth information/signals in the memory 204.
The memory 204 may be operably connectable to the processor 202. The memory 204 may store various types of information and/or instructions. The memory 204 may store a software code 205 which implements instructions that, when executed by the processor 202, perform the descriptions, functions, procedures, suggestions, methods and/or operational flowcharts disclosed in the present disclosure. For example, the software code 205 may implement instructions that, when executed by the processor 202, perform the descriptions, functions, procedures, suggestions, methods and/or operational flowcharts disclosed in the present disclosure. For example, the software code 205 may control the processor 202 to perform one or more protocols. For example, the software code 205 may control the processor 202 to perform one or more layers of the radio interface protocol.
Herein, the processor 202 and the memory 204 may be a part of a communication modem/circuit/chip designed to implement RAT (e.g., LTE or NR). The transceiver 206 may be connected to the processor 202 and transmit and/or receive radio signals through one or more antennas 208. Each of the transceiver 206 may include a transmitter and/or a receiver. The transceiver 206 may be interchangeably used with RF unit. In the present disclosure, the second wireless device 200 may represent a communication modem/circuit/chip.
Hereinafter, hardware elements of the wireless devices 100 and 200 will be described more specifically. One or more protocol layers may be implemented by, without being limited to, one or more processors 102 and 202. For example, the one or more processors 102 and 202 may implement one or more layers (e.g., functional layers such as physical (PHY) layer, media access control (MAC) layer, radio link control (RLC) layer, packet data convergence protocol (PDCP) layer, radio resource control (RRC) layer, and service data adaptation protocol (SDAP) layer). The one or more processors 102 and 202 may generate one or more protocol data units (PDUs) and/or one or more service data unit (SDUs) according to the descriptions, functions, procedures, suggestions, methods and/or operational flowcharts disclosed in the present disclosure. The one or more processors 102 and 202 may generate messages, control information, data, or information according to the descriptions, functions, procedures, suggestions, methods and/or operational flowcharts disclosed in the present disclosure. The one or more processors 102 and 202 may generate signals (e.g., baseband signals) including PDUs, SDUs, messages, control information, data, or information according to the descriptions, functions, procedures, suggestions, methods and/or operational flowcharts disclosed in the present disclosure and provide the generated signals to the one or more transceivers 106 and 206. The one or more processors 102 and 202 may receive the signals (e.g., baseband signals) from the one or more transceivers 106 and 206 and acquire the PDUs, SDUs, messages, control information, data, or information according to the descriptions, functions, procedures, suggestions, methods and/or operational flowcharts disclosed in the present disclosure.
The one or more processors 102 and 202 may be referred to as controllers, microcontrollers, microprocessors, or microcomputers. The one or more processors 102 and 202 may be implemented by hardware, firmware, software, or a combination thereof. As an example, one or more application specific integrated circuits (ASICs), one or more digital signal processors (DSPs), one or more digital signal processing devices (DSPDs), one or more programmable logic devices (PLDs), or one or more field programmable gate arrays (FPGAs) may be included in the one or more processors 102 and 202. The descriptions, functions, procedures, suggestions, methods and/or operational flowcharts disclosed in the present disclosure may be implemented using firmware or software and the firmware or software may be configured to include the modules, procedures, or functions. Firmware or software configured to perform the descriptions, functions, procedures, suggestions, methods and/or operational flowcharts disclosed in the present disclosure may be included in the one or more processors 102 and 202 or stored in the one or more memories 104 and 204 so as to be driven by the one or more processors 102 and 202. The descriptions, functions, procedures, suggestions, methods and/or operational flowcharts disclosed in the present disclosure may be implemented using firmware or software in the form of code, commands, and/or a set of commands.
The one or more memories 104 and 204 may be connected to the one or more processors 102 and 202 and store various types of data, signals, messages, information, programs, code, instructions, and/or commands. The one or more memories 104 and 204 may be configured by read-only memories (ROMs), random access memories (RAMs), electrically erasable programmable read-only memories (EPROMs), flash memories, hard drives, registers, cash memories, computer-readable storage media, and/or combinations thereof. The one or more memories 104 and 204 may be located at the interior and/or exterior of the one or more processors 102 and 202. The one or more memories 104 and 204 may be connected to the one or more processors 102 and 202 through various technologies such as wired or wireless connection.
The one or more transceivers 106 and 206 may transmit user data, control information, and/or radio signals/channels, mentioned in the descriptions, functions, procedures, suggestions, methods and/or operational flowcharts disclosed in the present disclosure, to one or more other devices. The one or more transceivers 106 and 206 may receive user data, control information, and/or radio signals/channels, mentioned in the descriptions, functions, procedures, suggestions, methods and/or operational flowcharts disclosed in the present disclosure, from one or more other devices. For example, the one or more transceivers 106 and 206 may be connected to the one or more processors 102 and 202 and transmit and receive radio signals. For example, the one or more processors 102 and 202 may perform control so that the one or more transceivers 106 and 206 may transmit user data, control information, or radio signals to one or more other devices. The one or more processors 102 and 202 may perform control so that the one or more transceivers 106 and 206 may receive user data, control information, or radio signals from one or more other devices.
The one or more transceivers 106 and 206 may be connected to the one or more antennas 108 and 208 and the one or more transceivers 106 and 206 may be configured to transmit and receive user data, control information, and/or radio signals/channels, mentioned in the descriptions, functions, procedures, suggestions, methods and/or operational flowcharts disclosed in the present disclosure, through the one or more antennas 108 and 208. In the present disclosure, the one or more antennas 108 and 208 may be a plurality of physical antennas or a plurality of logical antennas (e.g., antenna ports).
The one or more transceivers 106 and 206 may convert received user data, control information, radio signals/channels, etc., from RF band signals into baseband signals in order to process received user data, control information, radio signals/channels, etc., using the one or more processors 102 and 202. The one or more transceivers 106 and 206 may convert the user data, control information, radio signals/channels, etc., processed using the one or more processors 102 and 202 from the base band signals into the RF band signals. To this end, the one or more transceivers 106 and 206 may include (analog) oscillators and/or filters. For example, the one or more transceivers 106 and 206 can up-convert OFDM baseband signals to OFDM signals by their (analog) oscillators and/or filters under the control of the one or more processors 102 and 202 and transmit the up-converted OFDM signals at the carrier frequency. The one or more transceivers 106 and 206 may receive OFDM signals at a carrier frequency and down-convert the OFDM signals into OFDM baseband signals by their (analog) oscillators and/or filters under the control of the one or more processors 102 and 202.
In the implementations of the present disclosure, a UE may operate as a transmitting device in uplink (UL) and as a receiving device in downlink (DL). In the implementations of the present disclosure, a BS may operate as a receiving device in UL and as a transmitting device in DL. Hereinafter, for convenience of description, it is mainly assumed that the first wireless device 100 acts as the UE, and the second wireless device 200 acts as the BS. For example, the processor(s) 102 connected to, mounted on or launched in the first wireless device 100 may be configured to perform the UE behavior according to an implementation of the present disclosure or control the transceiver(s) 106 to perform the UE behavior according to an implementation of the present disclosure. The processor(s) 202 connected to, mounted on or launched in the second wireless device 200 may be configured to perform the BS behavior according to an implementation of the present disclosure or control the transceiver(s) 206 to perform the BS behavior according to an implementation of the present disclosure.
In the present disclosure, a BS is also referred to as a node B (NB), an eNode B (eNB), or a gNB.
The wireless device may be implemented in various forms according to a use-case/service (refer to
Referring to
The additional components 140 may be variously configured according to types of the wireless devices 100 and 200. For example, the additional components 140 may include at least one of a power unit/battery, input/output (I/O) unit (e.g., audio I/O port, video I/O port), a driving unit, and a computing unit. The wireless devices 100 and 200 may be implemented in the form of, without being limited to, the robot (100a of
In
Referring to
A UE 100 includes a processor 102, a memory 104, a transceiver 106, one or more antennas 108, a power management module 110, a battery 112, a display 114, a keypad 116, a subscriber identification module (SIM) card 118, a speaker 120, and a microphone 122.
The processor 102 may be configured to implement the descriptions, functions, procedures, suggestions, methods and/or operational flowcharts disclosed in the present disclosure. The processor 102 may be configured to control one or more other components of the UE 100 to implement the descriptions, functions, procedures, suggestions, methods and/or operational flowcharts disclosed in the present disclosure. Layers of the radio interface protocol may be implemented in the processor 102. The processor 102 may include ASIC, other chipset, logic circuit and/or data processing device. The processor 102 may be an application processor. The processor 102 may include at least one of a digital signal processor (DSP), a central processing unit (CPU), a graphics processing unit (GPU), a modem (modulator and demodulator). An example of the processor 102 may be found in SNAPDRAGON™ series of processors made by Qualcomm®, EXYNOS™ series of processors made by Samsung®, a series of processors made by Apple®, HELIO™ series of processors made by MediaTek®, ATOM™ series of processors made by Intel® or a corresponding next generation processor.
The memory 104 is operatively coupled with the processor 102 and stores a variety of information to operate the processor 102. The memory 104 may include ROM, RAM, flash memory, memory card, storage medium and/or other storage device. When the embodiments are implemented in software, the techniques described herein can be implemented with modules (e.g., procedures, functions, etc.) that perform the descriptions, functions, procedures, suggestions, methods and/or operational flowcharts disclosed in the present disclosure. The modules can be stored in the memory 104 and executed by the processor 102. The memory 104 can be implemented within the processor 102 or external to the processor 102 in which case those can be communicatively coupled to the processor 102 via various means as is known in the art.
The transceiver 106 is operatively coupled with the processor 102, and transmits and/or receives a radio signal. The transceiver 106 includes a transmitter and a receiver. The transceiver 106 may include baseband circuitry to process radio frequency signals. The transceiver 106 controls the one or more antennas 108 to transmit and/or receive a radio signal.
The power management module 110 manages power for the processor 102 and/or the transceiver 106. The battery 112 supplies power to the power management module 110.
The display 114 outputs results processed by the processor 102. The keypad 116 receives inputs to be used by the processor 102. The keypad 116 may be shown on the display 114.
The SIM card 118 is an integrated circuit that is intended to securely store the international mobile subscriber identity (IMSI) number and its related key, which are used to identify and authenticate subscribers on mobile telephony devices (such as mobile phones and computers). It is also possible to store contact information on many SIM cards.
The speaker 120 outputs sound-related results processed by the processor 102. The microphone 122 receives sound-related inputs to be used by the processor 102.
Hereinafter, network slicing to be introduced in next-generation mobile communication will be described.
Next-generation mobile communication introduces the concept of network slicing in order to provide various services through one network. Here, network slicing is a combination of network nodes having functions necessary to provide a specific service. A network node constituting a slice instance may be a hardware independent node or a logically independent node.
Each slice instance may be composed of a combination of all nodes necessary to configure the entire network. In this case, one slice instance may provide a service to the UE alone.
Alternatively, a slice instance may be composed of a combination of some of the nodes constituting the network. In this case, the slice instance may provide a service to the UE in association with other existing network nodes without providing a service to the UE alone. In addition, a plurality of slice instances may provide services to the UE in association with each other.
A slice instance differs from a dedicated core network in that all network nodes including a core network (CN) node and a RAN can be separated. In addition, slice instances differ from dedicated core networks in that simply network nodes can be logically separated.
During the handover process, the target NG-RAN may not be able to continuously support the network slice currently being served to the UE by the source NG-RAN after handover. In this case, the PDU session related to the corresponding network slice must be released. However, in order to ensure the continuity of the service previously provided to the terminal, the network slice related to the corresponding PDU session may be re-mapped to a network slice that the target NG-RAN can support. At this time, the Target NG-RAN and the AMF include and transmit re-mapped network slice information in the Allowed NSSAI to be delivered to the UE. However, if the terminal does not know that the network slice associated with the corresponding PDU session has been re-mapped, the corresponding PDU session is eventually released because the information about network slice related to the PDU session currently in use is not included in the newly received Allowed NSSAI, which is a problem.
<Disclosure of this Specification>
Hereinafter, network slice and S-NSSAI (single network slice selection assistance information) may be used interchangeably.
Certain steps in the procedures below may be performed concurrently or in parallel, or may be performed in reversed order.
The following drawings are made to explain a specific example of the present specification. Since the names of specific devices or names of specific signals/messages/fields described in the drawings are provided as examples, the technical features of the present specification are not limited to the specific names used in the drawings below.
4. AMF may transmit information such as Requested NSSAI and Subscribed S-NSSAI(s) requested to NSSF (Network Slice Selection Function) and request allocation of Allowed NSSAI for the terminal.
At this time, when the network slice remapping indicator is received in step 3, the corresponding information may also be transmitted to the NSSF to inform that network slice remapping is possible for the terminal.
Note: In the process of the UE performing the Mobility Registration Update, if there are any PDU sessions previously created for the UE associated with the remapped network slice, S-NSSAI value for the corresponding remapped network slice may also be delivered to NSSF.
Note: If the AMF can directly determine Allowed NSSAI or Candidate NSSAI according to the Operator's policy, steps 4 and 5 may be performed by the AMF rather than NSSF.
In step 0, when the NG-RAN already has a remapping policy for each network slice, step 6 may be omitted or the remapping policy generated in step 6 may be updated.
Also, AMF may deliver the candidate NSSAI determined in step 5 to NG-RAN. When network slice remapping occurs in a subsequent handover process, NG-RAN may refer to candidate NSSAI. Through the Candidate NSSAI, the NG-RAN may avoid the case where the UE selects an unusable S-NSSAI as a remapped network slice.
If the AMF determines a new network slice remapping policy in step 6, the AMF may deliver it to the NG-RAN so that the NG-RAN can refer to it in a handover process that will occur later.
Note: It is also possible for AMF to send configured NSSAI to NG-RAN instead of candidate NSSAI. In this case, the NG-RAN may refer to the configured NSSAI and the List of S-NSSAI(s) supported by AMF in the network slice remapping process.
Note: A Downlink NAS Transport message may be used instead of an Initial Context Setup Request message.
Note: AMF may include network slice remapping policy information in a Registration Accept message or other NAS message transmitted to the terminal. In this case, when the UE recognizes that network slice remapping has occurred as shown in
Alternatively, in step 8, the NG-RAN may transmit network slice remapping policy information to the UE using an RRC message.
Note: Information on SMF capable of supporting network slice remapping may be configured in AMF or included in subscription information of UDM. Alternatively, the AMF may perform SMF discovery through a NRF (Network Repository Function). At this time, the AMF may also transmit information such as a network slice remapping indicator indicating whether network slice remapping is allowed for the UE to the NRF. Based on this, the NRF may deliver information about the SMF capable of supporting network slice remapping to the AMF. In this process, the NRF may also deliver a network slice list that each SMF can support to the AMF. Corresponding information may be configured in advance in the NRF, or may be stored together when the SMF registers with the NRF.
AMF, not SMF, may generate a network slice remapping policy for the UE. In this case, the AMF must determine a network slice remapping policy so that a remapped S-NSSAI that the corresponding SMF can support is selected among the network slice list received through the NRF. The AMF can also receive network slice list information that the corresponding SMF can support directly from the SMF in step 11, not from the NRF.
Note: SMF may create a network slice remapping policy for each PDU session. In this case, AMF may deliver Candidate NSSAI or Configured NSSAI information to SMF together. Alternatively, when the AMF creates a network slice remapping policy for each PDU session, delivery of corresponding information may be omitted.
Note: If the NF managing the network slice quota is PCF, step 6 may be omitted. At this time, the SMF can check the network slice limit (Slice quota) through steps 7 and 8. Alternatively, if the NF managing the network slice limit (Slice Quota) is an AMF or an NF directly connected to the AMF, the network slice limit (Slice Quota) may be checked immediately after step 2.
Note: Even if the network slice remapping policy for the UE has already been assigned during the registration process, the corresponding PDU session can be updated with the remapping policy generated in step 9.
Note: If AMF, not SMF, creates a network slice remapping policy for the corresponding PDU session, the corresponding process may be executed after step 11. In this case, the SMF may transmit information related to remapping (e.g., Slice Remapping Control) to the AMF in step 11 so that the AMF can generate a network slice remapping policy.
Note: The SMF may include information such as the type (e.g., IMS voice, internet) or priority of the service provided through the corresponding PDU session in the network slice remapping policy. Alternatively, the SMF may be delivered to the NG-RAN in the form of a separate indication.
When the SMF creates a network slice remapping policy for the corresponding PDU session, the network slice remapping policy created in step 9 may be transmitted to the AMF together.
In addition, the Namf_Communication_N1N2MessageTransfer message may also include a PDU Session Establishment Accept message to be delivered to the terminal.
In addition, when the UE transfers the PDN connection serviced by the EPS to the 5GS, the SMF may add an indication notifying the NG-RAN through the AMF. Upon receiving the corresponding indication, the NG-RAN may know that the corresponding PDU session is being transferred from EPS to 5GS. Therefore, in order to continue to provide services to the UE through the corresponding PDU session, when the original S-NSSAI is not available in the NG-RAN (e.g., network slice resource shortage or non-supported slice), network slice remapping for the corresponding PDU session is executed unconditionally. Note: An indication indicating that the corresponding PDU session has been transferred from EPS to 5GS may be transmitted to the NG-RAN through steps 11 and 12. Alternatively, in step 9, it may be included in a network slice remapping policy and transmitted.
Note: AMF may include network slice remapping policy information in a PDU Session Establishment Accept message or other NAS message transmitted to the terminal. In this case, when the UE recognizes that network slice remapping has occurred as shown in
Alternatively, in step 13, the NG-RAN may transmit network slice remapping policy information to the UE using an RRC message.
In addition, if the original S-NSSAI for the corresponding PDU session cannot be supported, or if the resources for the original S-NSSAI are insufficient within the NG-RAN, the NG-RAN may determine a remapped S-NSSAI for the corresponding PDU.
In addition, Mapping of original S-NSSAI to remapped S-NSSAI information may be included in the RRC message to be delivered to the UE. Through the corresponding information, since the original S-NSSAI cannot be used in the NG-RAN, the UE may be notified that the remapped S-NSSAI should be used instead. Therefore, when the UE tries to create a new PDU session related to the original S-NSSAI later, the UE includes the Remapped S-NSSAI instead of the original S-NSSAI in the PDU Session Establishment Request message.
Alternatively, a network slice remapping policy used for network slice remapping may be included in the RRC message. Through the corresponding information, it is possible to inform the UE that the original S-NSSAI cannot be used in the NG-RAN. If the terminal subsequently wants to create a new PDU session related to the original S-NSSAI, the UE may select the new S-NSSAI according to the network slice remapping policy and include it in the PDU Session Establishment Request.
Alternatively, in
Alternatively, information related to network slice remapping may not be included in the RRC message.
Note: Instead of delivering Mapping of original S-NSSAI to remapped S-NSSAI information to the terminal through an RRC message as in step 4, it is also possible to inform the terminal of the corresponding information through a NAS message after step 5.
Alternatively, the URSP rule for the original S-NSSAI and the remapped S-NSSAI may be updated to the UE through steps 11 and 12.
At this time, if NG-RAN determines network slice remapping in step 3, it may include the remapped S-NSSAI for the corresponding PDU session and the reason for this (Slice resource shortage or non-supported slice) and transmit it to AMF.
If the quota for the corresponding S-NSSAI exceeds the maximum value, steps 8 and 9 may be omitted.
Note: If the NF that manages the network slice quota is PCF, step 7 may be skipped and the network slice quota may be checked through step 8. Alternatively, if the NF managing the network slice quota is an AMF or an NF directly connected to the AMF, the network slice quota may be checked immediately after step 5.
If the quota exceeds the maximum value in step 7, AMF may be notified that the context update for the corresponding PDU session has failed, and the reason (i.e., slice quota limit) may be delivered together. In addition, a wait timer value may be set and transmitted together to prevent the NG-RAN from performing remapping or recovery to the corresponding network slice for a certain period of time.
Note: The wait timer value itself may be configured in advance in the NG-RAN, and when a cause value related to the slice quota limit is received from AMF, the corresponding wait timer may be operated.
Note: PCF in charge of UE policy and PCF in charge of SM policy may be different.
For example, in a situation where the network slice for PDU session #1 for which APP #1 was receiving service was remapped from S-NSSAI-A to S-NSSAI-B, even if App #2 newly want to use the service for Slice B, the URSP rule may be updated so that PDU Session #1 can be used equally. However, if the network slice for PDU session #1 is returned to S-NSSAI-A, App #2 cannot use PDU session #1, so creating a new PDU Session #2 for S-NSSAI-B is required to provide service for slice B.
Alternatively, in a situation where the network slice for PDU session #1 for which APP #1 was receiving service is remapped from S-NSSAI-A to S-NSSAI-B, if App #2 newly wants to use service for Slice B, the URSP rule may be updated to create a new PDU Session #2 for S-NSSAI-B.
In addition, when the AMF knows that the S-NSSAI requested by the UE must be remapped (for example, when the NG-RAN does not support the S-NSSAI requested by the UE, or the AMF is notified in advance that resources for NSSAI requested by the UE in the NG-RAN are insufficient), remapped S-NSSAI may be selected based on a network slice remapping policy per UE or per network slice.
Note: Information on SMF capable of supporting network slice remapping may be configured in AMF or included in subscription information of UDM. Alternatively, when the AMF performs SMF discovery through the NRF, the AMF may transmit information such as a network slice remapping indicator indicating whether network slice remapping is allowed for the UE to the NRF together. Based on this, the NRF may deliver information about the SMF capable of supporting network slice remapping to the AMF. In this process, a list of network slices that each SMF can support may be delivered together. Corresponding information may be configured in advance in the NRF, or may be stored together when the SMF registers with the NRF.
If an AMF other than the SMF creates a network slice remapping policy for the UE, network slice remapping policy must be determined for the remapped S-NSSAI to be selected from the list of network slices received through the NRF that the corresponding SMF can support. The AMF may also receive network slice list information that the corresponding SMF can support directly from the SMF in step 11, not from the NRF.
Note: AMF knows that the S-NSSAI requested by the UE needs to be remapped, but if it knows that the network slice remapping policy should be determined per PDU session, the AMF may transmit indication that network slice remapping instead of the Remapped S-NSSAI in step 3 is required and the reason for remapping (when the NG-RAN does not support the S-NSSAI requested by the UE or when the AMF is notified in advance that the resource for the S-NSSAI requested by the UE in the NG-RAN is insufficient) together.
Alternatively, after receiving the network slice remapping policy per PDU session from the SMF in step 12, the AMF may determine the Remapped S-NSSAI, inform the SMF again using Nsmf_PDUSession_UpdateSMContext, and perform network slice quota check for Remapped S-NSSAI through the same process as in step 6. If the quota check passes, the remapped S-NSSAI and the reason for remapping may be notified to the PCF in charge of SM policy through Npcf_SMPolicyControl_Update.
Note: AMF may transmit original S-NSSAI, candidate NSSAI (or configured NSSAI), and allowed NSSAI to NSSF and request a remapped S-NSSAI for the corresponding PDU session to NSSF.
In addition, when the AMF executes network slice remapping for the corresponding PDU session in step 2, the Remapped S-NSSAI is notified to the SMF.
Note: If the SMF creates a network slice remapping policy for each PDU session, the AMF may deliver Candidate NSSAI or Configured NSSAI information to the SMF together. Alternatively, when the AMF creates a network slice remapping policy for each PDU session, delivery of corresponding information may be omitted.
Note: If the NF that manages the network slice quota is PCF, step 6 may be skipped and the network slice quota may be checked through steps 7 and 8. Alternatively, if the NF managing the network Slice Quota is an AMF or an NF directly connected to the AMF, the network Slice Quota may be checked immediately after step 2.
Note: Even if the network slice remapping policy for the UE has already been assigned during the registration process, the corresponding PDU session can be updated with the remapping policy generated in step 9.
If AMF, not SMF, creates a network slice remapping policy for the corresponding PDU session, the corresponding process may be executed after step 12. In this case, the SMF may transmit information related to remapping (e.g., Slice Remapping Control) to the AMF in step 12 so that the AMF can generate a network slice remapping policy. In this process, a list of network slices that can be supported by the corresponding SMF may be delivered together.
The SMF may include information such as the type (e.g., IMS voice, internet) or priority of the service provided through the corresponding PDU session in the network slice remapping policy. Alternatively, the SMF may be delivered to the NG-RAN in the form of a separate indication.
In addition, the corresponding message may also include a PDU Session Establishment Accept message to be delivered to the terminal. Remapped S-NSSAI information determined in step 2 or step 10 may be included in the PDU Session Establishment Accept message delivered to the terminal.
In addition, when the UE transfers the PDN connection serviced by the EPS to the 5GS, the SMF may add an indication notifying the NG-RAN through the AMF. Upon receiving the corresponding indication, the NG-RAN may know that the corresponding PDU session is being transferred from EPS to 5GS. Therefore, in order to continue to provide services to the UE through the corresponding PDU session, when the original S-NSSAI is not available in the NG-RAN (e.g., network slice resource shortage or non-supported slice), network slice remapping for the corresponding PDU session is executed.
Note: An indication indicating that the corresponding PDU session has been transferred from EPS to 5GS may be transmitted to the NG-RAN through steps 12 and 14. Alternatively, in step 9, it may be included in a network slice remapping policy and transmitted.
NOTE: A PCF in charge of UE policy and a PCF in charge of SM policy may be different.
In addition, remapped S-NSSAI information for the corresponding PDU session may be included and transmitted.
AMF may include network slice remapping policy information in a PDU Session Establishment Accept message or other NAS message transmitted to the terminal. In this case, when the UE recognizes that network slice remapping has occurred as shown in
Alternatively, in step 15, the NG-RAN may transmit network slice remapping policy information to the UE using an RRC message.
Note: As shown in
Instead of including Remapped S-NSSAI information in the PDU Session Establishment Accept message delivered to the UE in step 12, Mapping of original S-NSSAI to remapped S-NSSAI information may be included in the RRC message to be delivered to the UE through NG-RAN. Through the corresponding information, since the original S-NSSAI cannot be used in the NG-RAN, the UE may be notified that the remapped S-NSSAI should be used instead. Therefore, when the UE tries to create a new PDU session related to the original S-NSSAI later, the UE includes the Remapped S-NSSAI instead of the original S-NSSAI in the PDU Session Establishment Request message.
Alternatively, a network slice remapping policy used for network slice remapping may be included in the RRC message. Through the corresponding information, it is possible to inform the UE that the original S-NSSAI cannot be used in the NG-RAN. If the terminal subsequently wants to create a new PDU session related to the original S-NSSAI, the UE may select the new S-NSSAI according to the network slice remapping policy and include it in the PDU Session Establishment Request.
Alternatively, in
Alternatively, information related to network slice remapping may not be included in the RRC message at all.
Note: URSP rules for original S-NSSAI and remapped S-NSSAI may be updated to the UE through steps 13 and 17.
Note: For example, in a situation where the network slice for PDU session #1 for which APP #1 was receiving service was remapped from S-NSSAI-A to S-NSSAI-B, even if App #2 newly want to use the service for Slice B, the URSP rule may be updated so that PDU Session #1 can be used equally. However, if the network slice for PDU session #1 is returned to S-NSSAI-A, App #2 cannot use PDU session #1, so creating anew PDU Session #2 for S-NSSAI-B is required to provide service for slice B.
Alternatively, in a situation where the network slice for PDU session #1 for which APP #1 was receiving service is remapped from S-NSSAI-A to S-NSSAI-B, if App #2 newly wants to use service for Slice B, the URSP rule may be updated to create a new PDU Session #2 for S-NSSAI-B.
Note: If configured NSSAI is received instead of candidate NSSAI from AMF during the registration process, the corresponding information may be included.
Note: If a specific PDU session has already been remapped to a remapped S-NSSAI rather than the original S-NSSAI through PDU session establishment, service request, or handover, NG-RAN-1 may deliver remapped S-NSSAI information together with the original S-NSSAI in step 2. NG-RAN-2 may determine whether network slice recovery can be performed with the original S-NSSAI again for the corresponding PDU session. If NG-RAN-2 still cannot provide the original S-NSSAI for the corresponding PDU session, when NG-RAN-2 determines a new network slice remapping, whether the remapped S-NSSAI used by NG-RAN-1 can be continuously used may be determined. If NG-RAN-2 can continue to provide the remapped S-NSSAI used by NG-RAN-1, it is also possible to preferentially select it. This can reduce the process of updating the remapped S-NSSAI used by NG-RAN-1 to another remapped S-NSSAI to be used by NG-RAN-2 in AMF, SMF, or PCF.
In addition, Mapping of original S-NSSAI to remapped S-NSSAI information may be included in the RRC message to be delivered to the UE through NG-RAN-1. Through the corresponding information, since the original S-NSSAI cannot be used in NG-RAN-2, it is possible to inform the UE that the remapped S-NSSAI should be used instead. Therefore, when the UE tries to create a new PDU session related to the original S-NSSAI later, the PDU Session Establishment Request message may include the Remapped S-NSSAI instead of the original S-NSSAI.
Alternatively, a network slice policy used for network slice remapping may be included in the RRC message. Through the corresponding information, it is possible to inform the UE that the original S-NSSAI cannot be used in NG-RAN-2. If the terminal subsequently wants to create anew PDU session related to the original S-NSSAI, it may select the new S-NSSAI according to the network slice remapping policy and include it in the PDU Session Establishment Request.
Alternatively, when the terminal receives a network slice remapping policy from the network in advance in the process of
Alternatively, information related to network slice remapping may not be included in the RRC message at all.
Note: As in steps 4 and 5, Mapping of original S-NSSAI to remapped S-NSSAI information may be delivered to the terminal through an RRC message, but it is also possible to inform the terminal of the information through a NAS message after step 7.
Alternatively, the URSP rule for the original S-NSSAI and the remapped S-NSSAI may be updated to the UE through steps 13 and 17.
In addition, each SMF in charge of the PDU session for which network slice remapping has been executed is notified that the network slice for the corresponding PDU session has changed from the original S-NSSAI to the remapped S-NSSAI, and the reason may be delivered together.
If the quota for the corresponding S-NSSAI exceeds the maximum value, steps 10 and 11 may be omitted.
Note: If the NF that manages the network slice quota is PCF, step 9 may be skipped and the network slice quota may be checked through step 10. Alternatively, if the NF managing the network slice quota is an AMF or an NF directly connected to the AMF, the network slice quota may be checked immediately after step 7.
If the quota for the corresponding S-NSSAI exceeds the maximum value in step 9, AMF may be notified that the context update for the corresponding PDU session has failed, and the reason (i.e., slice quota limit) may be delivered together. In addition, a wait timer value may be set and transmitted together to prevent the NG-RAN from performing remapping or recovery to the corresponding network slice for a certain period of time.
Note: The wait timer value itself may be configured in advance in the NG-RAN, and when a cause value related to the slice quota limit is received from AMF, the corresponding timer may be operated.
Note: PCF in charge of UE policy and PCF in charge of SM policy may be different.
Note: At this time, AMF may determine a new Allowed NSSAI by referring to the remapped S-NSSAI determined by NG-RAN-2 in step 3.
Note: even if a UE moves from an existing registration area and enters NG-RAN-2 belonging to a new NW area and S-NSSAI-1 for a specific PDU session that is supported by NG-RAN-1 is not supported by NG-RAN-2, AMF may include S-NSSAI-1 in the new allowed NSSAI. However, since S-NSSAI-1 is not supported in NG-RAN-2, it may be prevented that a new PDU session establishment request based on S-NSSAI-1 is transmitted by sending a new indication to the terminal is sent to NG-RAN-2.
In addition, even if the terminal does not receive information that the corresponding PDU session has been performed network slice remapping during the handover process, even if S-NSSAI-1 is not included in the new Allowed NSSAI through the corresponding indication from the AMF during the Mobility Registration Update process or Re-mapped S-NSSAI information for the corresponding PDU session, it is possible to inform the terminal not to release the PDU session based on the existing S-NSSAI-1.
For example, in a situation where the network slice for PDU session #1 for which APP #1 was receiving service was remapped from S-NSSAI-A to S-NSSAI-B, even if App #2 newly want to use the service for Slice B, the URSP rule may be updated so that PDU Session #1 can be used equally. However, if the network slice for PDU session #1 is returned to S-NSSAI-A, App #2 cannot use PDU session #1, so creating a new PDU Session #2 for S-NSSAI-B is required to provide service for slice B.
Alternatively, in a situation where the network slice for PDU session #1 for which APP #1 was receiving service is remapped from S-NSSAI-A to S-NSSAI-B, if App #2 newly wants to use service for Slice B, the URSP rule may be updated to create a new PDU Session #2 for S-NSSAI-B.
In addition, when the UE transfers the PDN connection serviced by the EPS to the 5GS, the SMF may add an indication notifying the NG-RAN through the AMF. Upon receiving the corresponding indication, the NG-RAN may know that the corresponding PDU session is being transferred from EPS to 5GS. Therefore, in order to continue to provide service to the UE through the corresponding PDU session, if the original S-NSSAI is not available in the NG-RAN (e.g., slice resource shortage or non-supported slice), network slice remapping for the corresponding PDU session may be performed.
Note: If configured NSSAI is included instead of Candidate NSSAI, NG-RAN may refer to configured NSSAI and List of S-NSSAI(s) supported by AMF when remapping network slices.
Note: If a specific PDU session has already been remapped to a remapped S-NSSAI rather than the original S-NSSAI through PDU session establishment, service request, or handover, the AMF may deliver remapped S-NSSAI information together with the original S-NSSAI in step 4. NG-RAN-2 may determine whether network slice recovery can be performed with the original S-NSSAI again for the corresponding PDU session. If NG-RAN-2 still cannot provide the original S-NSSAI for the corresponding PDU session, when NG-RAN-2 determines a new network slice remapping, whether the remapped S-NSSAI used by NG-RAN-1 can be continuously used may be determined. If NG-RAN-2 can continue to provide the remapped S-NSSAI used by NG-RAN-1, it is also possible to preferentially select it. This can reduce the process of updating the remapped S-NSSAI used by NG-RAN-1 to another remapped S-NSSAI to be used by NG-RAN-2 in AMF, SMF, or PCF.
In addition, Mapping of original S-NSSAI to remapped S-NSSAI information may be included in the RRC message to be delivered to the UE through NG-RAN-1. Through the corresponding information, since the original S-NSSAI cannot be used in NG-RAN-2, it is possible to inform the UE that the remapped S-NSSAI should be used instead. Therefore, when the UE tries to create a new PDU session related to the original S-NSSAI later, the PDU Session Establishment Request message may include the Remapped S-NSSAI instead of the original S-NSSAI.
Alternatively, a network slice policy used for network slice remapping may be included in the RRC message. Through the corresponding information, it is possible to inform the UE that the original S-NSSAI cannot be used in NG-RAN-2. If the terminal subsequently wants to create anew PDU session related to the original S-NSSAI, it may select the new S-NSSAI according to the network slice remapping policy and include it in the PDU Session Establishment Request.
Alternatively, when the terminal receives a network slice remapping policy from the network in advance in the process of
Alternatively, information related to network slice remapping may not be included in the RRC message.
Note: Instead of delivering Mapping of original S-NSSAI to remapped S-NSSAI information to the terminal through an RRC message as in steps 6 and 14, it is also possible to inform the terminal of the corresponding information through a NAS message after step 7.
Alternatively, the URSP rule for the original S-NSSAI and the remapped S-NSSAI may be updated to the UE through steps 12 and 19.
In addition, each SMF in charge of the PDU session for which network slice remapping has been executed is notified that the network slice for the corresponding PDU session has changed from the original S-NSSAI to the remapped S-NSSAI, and the reason may be delivered together.
If the quota for the corresponding S-NSSAI exceeds the maximum value, steps 9 and 10 may be omitted.
Note: If the NF that manages the network slice quota is PCF, step 8 may be skipped and the network slice quota may be checked through step 9. Alternatively, if the NF managing the network slice quota is an AMF or an NF directly connected to the AMF, the network slice quota may be checked immediately after step 6.
If the quota for remapped S-NSSAI exceeds the maximum value in step 8, AMF may be notified that the context update for the corresponding PDU session has failed, and the reason (i.e., slice quota limit) may be delivered together. In addition, a wait timer value may be set and transmitted together to prevent the NG-RAN from performing remapping or recovery to the corresponding network slice for a certain period of time.
Note: The wait timer value itself may be configured in advance in the NG-RAN, and when a cause value related to the slice quota limit is received from AMF, the corresponding timer may be operated.
Note: PCF in charge of UE policy and PCF in charge of SM policy may be different.
If the network slice quota check for the remapped S-NSSAI fails, a cause value and a wait timer value may be transmitted to the NG-RAN using a separate NGAP message.
Note: At this time, AMF may determine a new Allowed NSSAI by referring to the remapped S-NSSAI determined by NG-RAN-2 in step 5.
Note: even if a UE moves from an existing registration area and enters NG-RAN-2 belonging to a new NW area and S-NSSAI-1 for a specific PDU session that is supported by NG-RAN-1 is not supported by NG-RAN-2, AMF may include S-NSSAI-1 in the new allowed NSSAI. However, since S-NSSAI-1 is not supported in NG-RAN-2, it may be prevented that a new PDU session establishment request based on S-NSSAI-1 is transmitted by sending a new indication to the terminal is sent to NG-RAN-2.
In addition, even if the terminal does not receive information that the corresponding PDU session has been performed network slice remapping during the handover process, even if S-NSSAI-1 is not included in the new Allowed NSSAI through the corresponding indication from the AMF during the Mobility Registration Update process or Re-mapped S-NSSAI information for the corresponding PDU session, it is possible to inform the terminal not to release the PDU session based on the existing S-NSSAI-1.
For example, in a situation where the network slice for PDU session #1 for which APP #1 was receiving service was remapped from S-NSSAI-A to S-NSSAI-B, even if App #2 newly want to use the service for Slice B, the URSP rule may be updated so that PDU Session #1 can be used equally. However, if the network slice for PDU session #1 is returned to S-NSSAI-A, App #2 cannot use PDU session #1, so creating a new PDU Session #2 for S-NSSAI-B is required to provide service for slice B.
Alternatively, in a situation where the network slice for PDU session #1 for which APP #1 was receiving service is remapped from S-NSSAI-A to S-NSSAI-B, if App #2 newly wants to use service for Slice B, the URSP rule may be updated to create a new PDU Session #2 for S-NSSAI-B.
Note: If a specific PDU session has already been remapped to a remapped S-NSSAI rather than the original S-NSSAI through PDU session establishment, service request, or handover, the AMF may determine whether network slice recovery may be performed with the original S-NSSAI again for the corresponding PDU session. If NG-RAN-2 still cannot provide the original S-NSSAI for the corresponding PDU session, when AMF decides to remap a new network slice, whether the remapped S-NSSAI used by NG-RAN-1 can be continuously used may be determined. If NG-RAN-2 can continue to provide the remapped S-NSSAI used by NG-RAN-1, it is also possible for the AMF to preferentially select it. This can reduce the process of updating the remapped S-NSSAI used by NG-RAN-1 to another remapped S-NSSAI to be used by NG-RAN-2 in AMF, SMF, or PCF.
In addition, the reason for remapping the network slice and the value of the remapped S-NSSAI may be additionally transmitted to the SMF managing the PDU session remapped from the original S-NSSAI to the remapped S-NSSAI through step 3.
If the quota for the corresponding S-NSSAI exceeds the maximum value, steps 6 and 7 may be omitted.
Note: If the NF that manages the network slice quota is PCF, step 5 may be skipped and the network slice quota may be checked through step 6. Alternatively, if the NF managing the network slice quota is an AMF or an NF directly connected to the AMF, the network slice quota may be checked immediately after step 3.
If the quota for the corresponding S-NSSAI exceeds the maximum value in step 5, AMF may be notified that the context update for the corresponding PDU session has failed, and the reason (i.e., slice quota limit) may be delivered together. In addition, a wait timer value may be set and transmitted together to prevent the AMF from performing remapping or recovery to the corresponding network slice for a certain period of time.
In addition, when the UE transfers the PDN connection serviced by the EPS to the 5GS, the SMF may add an indication notifying the NG-RAN through the AMF. Upon receiving the corresponding indication, the NG-RAN may know that the corresponding PDU session is being transferred from EPS to 5GS. Therefore, in order to continue to provide service to the UE through the corresponding PDU session, if the original S-NSSAI is not available in the NG-RAN (e.g., slice resource shortage or non-supported slice), network slice remapping for the corresponding PDU session may be performed.
In addition, Mapping of original S-NSSAI to remapped S-NSSAI information may be included in the RRC message to be delivered to the UE through NG-RAN-1. Through the corresponding information, since the original S-NSSAI cannot be used in NG-RAN-2, it is possible to inform the UE that the remapped S-NSSAI should be used instead. Therefore, when the UE tries to create a new PDU session related to the original S-NSSAI later, the PDU Session Establishment Request message may include the Remapped S-NSSAI instead of the original S-NSSAI.
Alternatively, a network slice policy used for network slice remapping may be included in the RRC message. Through the corresponding information, it is possible to inform the UE that the original S-NSSAI cannot be used in NG-RAN-2. If the terminal subsequently wants to create anew PDU session related to the original S-NSSAI, it may select the new S-NSSAI according to the network slice remapping policy and include it in the PDU Session Establishment Request.
Alternatively, when the terminal receives a network slice remapping policy from the network in advance in the process of
Alternatively, information related to network slice remapping may not be included in the RRC message at all.
Note: Instead of delivering Mapping of original S-NSSAI to remapped S-NSSAI information to the terminal through an RRC message as in steps 10 and 14, it is also possible to inform the terminal of the corresponding information through a NAS message after step 10.
Alternatively, the URSP rule for the original S-NSSAI and the remapped S-NSSAI may be updated to the UE through steps 12 and 19.
NOTE: A PCF in charge of UE policy and a PCF in charge of SM policy may be different.
Note: At this time, AMF may determine a new Allowed NSSAI by referring to the remapped S-NSSAI determined by NG-RAN-2 in step 5.
Note: even if a UE moves from an existing registration area and enters NG-RAN-2 belonging to a new NW area and S-NSSAI-1 for a specific PDU session that is supported by NG-RAN-1 is not supported by NG-RAN-2, AMF may include S-NSSAI-1 in the new allowed NSSAI. However, since S-NSSAI-1 is not supported in NG-RAN-2, it may be prevented that a new PDU session establishment request based on S-NSSAI-1 is transmitted by sending a new indication to the terminal is sent to NG-RAN-2.
In addition, even if the terminal does not receive information that the corresponding PDU session has been performed network slice remapping during the handover process, even if S-NSSAI-1 is not included in the new Allowed NSSAI through the corresponding indication from the AMF during the Mobility Registration Update process or Re-mapped S-NSSAI information for the corresponding PDU session, it is possible to inform the terminal not to release the PDU session based on the existing S-NSSAI-1.
Note: For example, in a situation where the network slice for PDU session #1 for which APP #1 was receiving service was remapped from S-NSSAI-A to S-NSSAI-B, even if App #2 newly want to use the service for Slice B, the URSP rule may be updated so that PDU Session #1 can be used equally. However, if the network slice for PDU session #1 is returned to S-NSSAI-A, App #2 cannot use PDU session #1, so creating anew PDU Session #2 for S-NSSAI-B is required to provide service for slice B.
Alternatively, in a situation where the network slice for PDU session #1 for which APP #1 was receiving service is remapped from S-NSSAI-A to S-NSSAI-B, if App #2 newly wants to use service for Slice B, the URSP rule may be updated to create a new PDU Session #2 for S-NSSAI-B.
If the quota for the original S-NSSAI exceeds the maximum value, step 5 may be omitted.
Note: If the NF that manages the network slice quota is PCF, step 4 may be skipped and the network slice quota may be checked through step 5. Alternatively, if the NF managing the network slice quota is an AMF or an NF directly connected to the AMF, the network slice quota may be checked immediately after step 2.
If the quota for the remapped S-NSSAI exceeds the maximum value in step 4, AMF may be notified that the context update for the corresponding PDU session has failed, and the reason (i.e., slice quota limit) may be delivered together. In addition, a wait timer value may be set and transmitted together to prevent the NG-RAN from performing remapping or recovery to the corresponding network slice for a certain period of time.
Note: The wait timer value itself may be configured in advance in the NG-RAN, and when a cause value related to the slice quota limit is received from AMF, the corresponding timer may be operated.
Note: PCF in charge of UE policy and PCF in charge of SM policy may be different.
Based on the received RRC message, the terminal may include the original S-NSSAI as it is in the PDU Session Establishment Request message when attempting to create a new PDU session related to the original S-NSSAI later.
Alternatively, information related to network slice remapping may not be included in the RRC message at all.
Note: Instead of delivering slice recovery to original S-NSSAI information to the terminal through an RRC message as in step 9, it is also possible to inform the terminal of the corresponding information through a NAS message after step 7.
Alternatively, the URSP rule for the original S-NSSAI and the remapped S-NSSAI may be updated to the UE through steps 7 and 10.
For example, in a situation where the network slice for PDU session #1 for which APP #1 was receiving service was remapped from S-NSSAI-A to S-NSSAI-B, even if App #2 newly want to use the service for Slice B, the URSP rule may be updated so that PDU Session #1 can be used equally. However, if the network slice for PDU session #1 is returned to S-NSSAI-A, App #2 cannot use PDU session #1, so creating a new PDU Session #2 for S-NSSAI-B is required to provide service for slice B.
Alternatively, in a situation where the network slice for PDU session #1 for which APP #1 was receiving service is remapped from S-NSSAI-A to S-NSSAI-B, if App #2 newly wants to use service for Slice B, the URSP rule may be updated to create a new PDU Session #2 for S-NSSAI-B.
Note: If the NF managing the network slice quota is AMF or an NF directly connected to AMF, the network slice quota may be checked immediately after step 1.
If the quota for S-NSSAI associated with the corresponding PDU session exceeds the maximum value in step 3, AMF may be notified that the context update for the corresponding PDU session has failed, and the reason (i.e., slice quota limit) may be delivered together. In addition, a wait timer value may be set and transmitted together to prevent the NG-RAN from performing remapping or recovery to the corresponding network slice for a certain period of time.
Note: The wait timer value itself may be configured in advance in the NG-RAN, and when a cause value related to the slice quota limit is received from AMF, the corresponding timer may be operated.
Note: If the SMF needs to update the CN Tunnel Info of UPF information for the N3 tunnel, it may perform N4 Session Modification procedure with the UPF before step 4.
The message may also include a network slice remapping policy to be delivered to the NG-RAN, network slice remapping control, and Candidate NSSAI. In addition, a service accept message to be delivered to the terminal may be included. The Service Accept message may include a re-activation PDU session list.
For example, in the case of network slice recovery, slice recovery to original S-NSSAI information may be delivered to the UE through an RRC message to inform the UE that the original S-NSSAI can be used again in the NG-RAN.
If network slice remapping has occurred, Mapping of original S-NSSAI to remapped S-NSSAI information may be delivered to indicate that the original S-NSSAI cannot be used in NG-RAN, so remapped S-NSSAI must be used instead.
Alternatively, a network slice remapping policy used for network slice remapping may be included in the RRC message. Through the corresponding information, it is possible to inform the UE that the original S-NSSAI cannot be used in NG-RAN-2. If the UE subsequently wants to create anew PDU session related to the original S-NSSAI, it may select the new S-NSSAI according to the network slice remapping policy and include it in the PDU Session Establishment Request.
Alternatively, when the terminal receives a network slice remapping policy from the network in advance in the process described in
Therefore, based on the received RRC message, the terminal may determine what S-NSSAI value to include in the PDU Session Establishment Request message when trying to create a new PDU session related to the original S-NSSAI later.
Alternatively, information related to network slice remapping may not be included in the RRC message at all.
Note: Instead of delivering network slice recovery or network slice remapping information to the terminal through an RRC message as in step 7, it is also possible to inform the terminal of the corresponding information through a NAS message after step 14.
Alternatively, the URSP rules for the original S-NSSAI and the remapped S-NSSAI may be updated to the UE through steps 14 and 15 to suit the situation of network slice recovery or network slice remapping.
If the NG-RAN selects a value different from the Last served S-NSSAI in step 6, it can be transmitted including the contents thereof. That is, whether it is a Mapping of original S-NSSAI to remapped S-NSSAI situation or a slice recovery to original S-NSSAI situation is also notified. In the case of Mapping of original S-NSSAI to remapped S-NSSAI, the reason (Slice resource shortage or non-supported slice) may be informed together.
If the quota for the corresponding S-NSSAI exceeds the maximum value, steps 11 and 12 may be omitted.
Alternatively, if the NG-RAN decides to use Last served S-NSSAI as it is in step 6, steps 10 and 11 may be omitted.
Note: If the NF that manages the network slice quota is PCF, step 10 may be skipped and the network slice quota may be checked through step 11. Alternatively, if the NF managing the network slice quota is an AMF or an NF directly connected to the AMF, the network slice quota may be checked immediately after step 8.
If the quota exceeds the maximum value in step 10, AMF may be notified that the context update for the corresponding PDU session has failed, and the reason (i.e., slice quota limit) may be delivered together. In addition, a wait timer value may be set and transmitted together to prevent the NG-RAN from performing remapping or recovery to the corresponding network slice for a certain period of time.
Note: The wait timer value itself may be configured in advance in the NG-RAN, and when a cause value related to the slice quota limit is received from AMF, the corresponding timer may be operated.
Note: PCF in charge of UE policy and PCF in charge of SM policy may be different.
For example, in a situation where the network slice for PDU session #1 for which APP #1 was receiving service was remapped from S-NSSAI-A to S-NSSAI-B, even if App #2 newly want to use the service for Slice B, the URSP rule may be updated so that PDU Session #1 can be used equally. However, if the network slice for PDU session #1 is returned to S-NSSAI-A, App #2 cannot use PDU session #1, so creating a new PDU Session #2 for S-NSSAI-B is required to provide service for slice B.
Alternatively, in a situation where the network slice for PDU session #1 for which APP #1 was receiving service is remapped from S-NSSAI-A to S-NSSAI-B, if App #2 newly wants to use service for Slice B, the URSP rule may be updated to create a new PDU Session #2 for S-NSSAI-B.
In addition, the S-NSSAI list supported by other NG-RANs located around the NG-RAN may be delivered to the AMF along with AMF region information. The AMF may use the corresponding information to determine the allowed NSSAI so that the allowed NSSAI can be guaranteed even in the NG-RAN located around the registration area of the terminal during the subsequent registration process of the terminal.
Note: If configured NSSAI is received instead of candidate NSSAI from AMF during the registration process, the corresponding information can be included.
If NG-RAN-2 (=Target NG-RAN) determines that the PDU session cannot be serviced even through network slice remapping, it may be determined that the PDU session maintains for a while so that the UE and 5GC can finish service of the corresponding PDU session. Therefore, it may be determined to temporarily create a new data transmission tunnel between NG-RAN-1 and NG-RAN-2 while maintaining the NG-U connection of NG-RAN-1 for the corresponding PDU session. And, in order to transmit data on the corresponding PDU session to the UE, NG-RAN-2 may allocate a new bearer configuration for the corresponding PDU session to the UE. At this time, bearer configuration may be assigned considering the S-NSSAI currently available in NG-RAN-2, not the original S-NSSAI, and the candidate NSSAI or configured NSSAI for the UE.
Through this, NG-RAN-1 may know that handover the PDU session to NG-RAN-2 is not performed, and for a while, service is performed through NG-U connection between NG-RAN-1 and UPF, and the Xn tunnel between NG-RAN-1 and NG-RAN-1.
In addition, bearer configuration information newly allocated by NG-RAN-2 for a PDU session related to rejected S-NSSAI may be included in an RRC message to be delivered to the UE through NG-RAN-1. Through this information, it may be notified to the UE that the original S-NSSAI cannot be used in NG-RAN-2, and instead, the service for the corresponding PDU session can be provided using a bearer for another S-NSSAI for a while. Therefore, the UE may not attempt to create a new PDU session related to the original S-NSSAI later.
NG-RAN-1 may deliver downlink data received from UPF to NG-RAN-2 using an Xn tunnel for data forwarding. NG-RAN-2 may store the received data until the terminal accesses it.
The UE and NG-RAN-2 may transmit and receive UL/DL data. NG-RAN-2 may transmit uplink data (UL data) to UPF and receive downlink data (DL data) from UPF through NG-RAN-1.
NOTE: Step 14 may be executed before steps 12 and 13. In this case, AMF may reflect the result received in step 7 when determining a new Allowed NSSAI. For example, if it is determined that NG-U connection in NG-RAN-1 is still used because S-NSSAI-1 for a specific PDU session is supported by NG-RAN-1 but not supported by NG-RAN-2, AMF may include S-NSSAI-1 in the new allowed NSSAI. However, since S-NSSAI-1 is not supported in NG-RAN-2, a new indication is transmitted, to the UE, to prevent sending anew PDU session establishment request based on S-NSSAI-1 to NG-RAN-2. Also, in the handover process, as in step 5, even if the terminal does not receive information that the corresponding PDU session is not handed over to NG-RAN-2 and is still connected through the NG-U connection of NG-RAN-1, a corresponding indication from the AMF may inform so that the UE does not release the PDU session based on the existing S-NSSAI-1.
In addition, as follows, when a UE moves to an NG-RAN that does not support S-NSSAI for the PDU session currently in use, it may be considered that the S-NSSAI for the corresponding PDU session is changed so that the UE can receive the minimum service.
The original network slice associated with the PDU session may be supported by both the source and target NG-RAN nodes. However, during handover, PDU sessions related to the network slice may be rejected due to high load related to network slice at the target NG-RAN node. As a result, service for the original slice may be interrupted. Therefore, the target NG-RAN node may perform network slice remapping. After that, the target NG-RAN node may recover sufficient resources to realize the original slice. In this case, the remapped network slice may be remapped back to the original network slice.
In case of network slice resource shortage, the remapped network slice may be remapped to the original network slice again when the NG-RAN node recovers enough resources to provide the original network slice.
However, the resources recovered at the target NG-RAN node may not be sufficient to provide all PDU sessions related to the original slice. That is, some PDU sessions may be provided in the original network slice, but other PDU sessions may still be provided in the remapped slice. Therefore, the NG-RAN may select a PDU session to be remapped to the original network slice.
In case of network slice resource shortage, a method for supporting network slice recovery (i.e., remapping a remapped slice to an original slice) may be proposed.
The network slice currently in use by the UE may be supported by both the source and target NG-RAN nodes. Upon handover, the target node may fail to accept the UE with at least one of the S-NSSAIs that the UE is currently using in the source NG-RAN node, for example due to high load related to network slice on the target node. In this situation service for the ongoing network slice(s) that have failed may be disrupted.
As shown in
When the UE moves to the target NG-RAN node in RA2, the target NG-RAN node may remap the original network slice (Slice #1) associated with PDU session #1 to the remapped slice (slice #2). After the Inter-RA handover is completed, the UE may start a Mobility Registration Update procedure to align the network slice supported by the new RA2 between the UE and the network. The UE may include the S-NSSAI applicable to each active PDU session in the Requested NSSAI. Since PDU session #1 is ongoing in the target NG-RAN node and the UE does not know the network slice remapping for the PDU session, the UE may transmit the Requested NSSAI (={Slice #1}) and the list of PDU sessions to be activated (={PDU session #1}) together with a registration request message.
Based on information from the UE, subscription information from the UDM and local configuration, the AMF may determine an allowed NSSAI for the UE. Since slice #1 is not supported by NG-RAN nodes, slice #1 may not be included in the allowed NSSAI. When the UE can no longer use the slice, the AMF may inform the SMF of the PDU session ID of which the PDU session corresponding to the corresponding S-NSSAI should be released. SMF may release the PDU session. Accordingly, PDU session #1 may be released by the network during a Mobility Registration Update procedure. However, in inter-RA handover, the target NG-RAN node may indicate to AMF that the network slice related to PDU session #1 has been remapped to slice #2. Therefore, even if slice #1 is no longer available for the UE, the network slice remapping instruction may prevent the AMF from requesting the SMF to release PDU session #1.
Even if the original network slice is not included in the allowed NSSAI, the PDU session related to the original network slice may be maintained in AMF based on the slice remapping indication of the NG-RAN node.
However, from the UE point of view, there may be a mismatch between the allowed NSSAI and the network slice associated with the active PDU session. The UE receives an allowed NSSAI that does not include slice #1, but may still have PDU session #1 associated with slice #1. PDU session #1 may be released from the UE as follows.
For each PDU session active in the UE, if the allowed NSSAI does not contain any of the following:
If the original network slice is not included in the allowed NSSAI, the UE may perform release of the PDU session associated with the original slice.
During a Mobility Registration Update procedure after Inter-RA handover, if a PDU session related to network slice remapping is released in the UE, it is difficult to ensure service continuity in an unsupported network slice. To avoid this problem, the UE must be aware of network slice remapping. The UE may know the slice remapping decision from the network through RRC messages or NAS signaling.
To avoid discrepancies between the allowed NSSAI and the network slice associated with an active PDU session, the UE must be aware of slice remapping. To this end, the NG-RAN or AMF may notify the UE whenever a network slice remapping event occurs. This may cause additional signaling between the UE and the network. URSP rules to route traffic related to the remapped network slice may be needed to be updated. Therefore, there may be significant UE impact.
The UE's awareness of network slice remapping may cause significant UE impact. Whether and how the UE should be aware of network slice remapping may be suggested.
The AMF must inform the UE of the network slice remapping decision using NAS signaling in the Mobility Registration Update procedure.
However, even if slice #1 is not supported by the target NG-RAN node, AMF may include slice #1 in Allowed NSSAI during a Mobility Registration Update procedure. In this case, the UE may initiate a PDU session establishment procedure to establish another new PDU session related to slice #1. However, since the target NG-RAN node does not support Slice #1, it may reject the UE's PDU session establishment request. Thus, this may cause unnecessary signaling between the UE and the network. In order for the UE to request PDU session establishment for slice #1, the AMF may indicate to the UE that new PDU session establishment for slice #1 is not allowed due to slice remapping for slice #1.
During the Mobility Registration Update procedure, AMF may notify the UE of network slice remapping regardless of Slice #1 included in Allowed NSSAI.
It may be suggested that AMF instructs the UE to make a network slice remapping decision through NAS signaling.
The S-gNB may transmit a HANDOVER REQUEST message to the T-gNB.
If the UE's ongoing network slice(s) are rejected by the target gNB based on the network slice remapping policy, the T-gNB may determine network slice remapping or fallback. The T-gNB may transmit the network slice remapping or fallback decision to the S-gNB by including it in the HANDOVER REQUEST ACKNOWLEDGE message.
The T-gNB may send a network slice remapping or fallback decision to the AMF through a PATH SWITCH REQUEST message.
AMF may respond with a PATH SWITCH REQUEST ACKNOWLEDGE message.
AMF may reject the PDU session in the PDU Session Resource Released List IE.
The S-gNB may transmit a HANDOVER REQUIRED message to the T-gNB.
AMF may transmit a HANDOVER REQUEST message to the T-gNB.
If the network slice (s) in progress of the UE is rejected by the target gNB based on the network slice remapping policy, the T-gNB may include the remapping or fallback decision in the HANDOVER REQUEST ACKNOWLEDGE message sent to the AMF.
AMF may send a network slice remapping or fallback decision to the S-gNB through a HANDOVER COMMAND message.
The S-gNB may transmit a HANDOVER REQUIRED message to the AMF.
If the UE's ongoing network slice(s) is not supported by the T-gNB, the AMF may determine network slice remapping or fallback. In addition, the decision may be included in a HANDOVER REQUEST message and transmitted to the T-gNB.
The T-gNB may respond to the AMF with a HANDOVER REQUEST ACKNOWLEDGE message.
The AMF may transmit a network slice remapping or fallback decision to the S-gNB through a HANDOVER COMMAND message.
After the handover between RAs is completed, the UE may initiate a Mobility Registration Update procedure to align allowed NSSAIs between the UE and the network. According to the network slice remapping decision, the AMF may determine a newly allowed NSSAI for the UE. However, the terminal may not be aware of the network slice remapping decision. Therefore, since the original network slice is not included in the allowed NSSAI, the UE may perform local release of the PDU session related to the original network slice. To ensure service continuity in an unsupported network slice scenario, the AMF may inform the UE of the network slice remapping decision through NAS signaling during a Mobility Registration Update procedure.
The configuration of the target NG-RAN may can be assumed to be more static since the remapping policy must be verified by the tenant or operator. Therefore, the NG-RAN node may be configured in advance with a re-mapping policy by OAM. In this option, the unit of remapping policy is per network slice. That is, for each supported S-NSSAI, the target NG-RAN node can be configured with a list of possible remapped S-NSSAIs as follows.
The NG-RAN node may receive in advance the re-mapping policy in the NG Setup Response message (or any update in the AMF configuration Update message) from the CN. In this option the granularity of the re-mapping policy is the slice for each S-NSSAI supported by the target NG-RAN node. the CN may include in the NG Setup Response (respectively AMF Configuration Update) message an associated list of possible re-mapped S-NSSAI(s).
With NG handover request signaling, at the time of handover, the CN may include in the NG Handover Request message the current PDU Session, the associated S-NSSAI and also the list of S-NSSAI(s) to which this PDU session can be re-mapped.
In this option the granularity of the re-mapping policy can be either:
Example of per UE policy:
Example of per PDU session policy:
As a signaling from the source NG-RAN node, When the PDU session is created in the source NG-RAN node, the CN may include in the NGAP PDU Session Resource Setup Request message (or the Initial Context Setup Request message or the NG Handover Request message) the S-NSSAI associated with the PDU session. The list of S-NSSAI(s) to which this PDU session can be re-mapped. Also, in order to prioritize the PDU sessions related to the re-mapped S-NSSAI when the re-mapped S-NSSAI is re-assigned to the original S-NSSAI, the 5GC may provide to the NG-RAN the slice recovery priority for each PDU session based on e.g., the subscription.
At the time of subsequent Xn handover, the source NG-RAN node may include in the Xn Handover Request message the current PDU Session, the associated S-NSSAI and also the list of S-NSSAI(s) to which this PDU session can be mapped
In this option the granularity of the re-mapping policy can be either:
Even if the terminal moves to an NG-RAN that does not support S-NSSAI for the PDU session currently in use, because service can be continuously provided, unnecessary latency may be reduced because it is not needed process of establishing a new PDU session. In addition, since it is possible to ensure that the terminal selects a remapped slice within the network slice list available for use, it is possible to prevent a case of wasting network slice resources due to incorrect remapped slice selection.
The drawings may be executed individually or together with other drawings.
The first message may include information indicating that a UE (User Equipment) needs to perform handover.
The handover request message may include information on a first network slice related to PDU (Protocol Data Unit) session that UE wants to use.
The second message may include remapping information.
The remapping information may include information indicating that remapping from the first network slice to a second network slice has been performed.
The network slice information may be updated by PCF (Policy Control Function) and transmitted to the UE.
The AMF may determine Allowed NSSAI (Network Slice Selection Assistance Information) including the first network slice information or the second network slice information.
The AMF may transmit, to the UE, the Allowed NSSAI.
The AMF may transmit, to the UE, a first indication instructing the UE to skip establishment request for a new PDU session related to the first network slice, based on the Allowed NSSAI including the first network slice information.
The AMF may transmit, to the UE, a second indication instructing the UE to skip release for the PDU session, based on the Allowed NSSAI including the second network slice information.
The PCF may trigger to update for URSP (UE Route Selection Policy) rule for the PDU session to be used for service request for the second network slice.
The PCF may trigger to update for URSP rule for a new PDU session to be created for service request for the second network slice.
The AMF may receive, from the target base station, recovery information.
The recovery information may include information indicating that remapping from the second network slice to the first network slice has been performed for the PDU session.
The AMF may transmit, to the SMF, a request message for new update for the network slice information, based on the recover information.
The network slice information may be updated by the PCF and transmitted to the UE.
The remapping information may be updated by PCF (Policy Control Function).
The remapping information may include information indicating that remapping from the first network slice to a second network slice has been performed.
The UE may receive, from an AMF (access and mobility management function), Allowed Network Slice Selection Assistance Information (NSSAI) including the first network slice information or the second network slice information.
The UE may receive, from the AMF, a first indication instructing to skip establishment request for a new PDU session related to the first network slice, based on the Allowed NSSAI including the first network slice information.
The UE may receive, from the AMF, a second indicator instructing to skip release for the PDU session, based on the Allowed NSSAI including the second network slice information.
Hereinafter, an AMF for providing communication in a wireless communication system according to some embodiments of the present specification will be described.
For example, the AMF may include a processor, transceiver and memory.
For example, a processor may be configured to be operably coupled with a memory and a processor.
The AMF receives, from a source base station, a first message, wherein the first message includes information indicating that a UE (User Equipment) needs to perform handover.
The AMF may transmit, to a target base station, a handover request message. The handover request message may include information on a first network slice related to PDU (Protocol Data Unit) session that UE wants to use.
The AMF may receive, from the target base station, a second message. The second message may include remapping information. The remapping information may include information indicating that remapping from the first network slice to a second network slice has been performed.
The AMF may transmit, to a SMF (Session Management Function), an update request message for network slice information for the PDU session, based on the remapping information. The network slice information may be updated by PCF (Policy Control Function) and transmitted to the UE.
Hereinafter, a non-volatile computer-readable medium storing one or more instructions for providing communication according to some embodiments of the present specification will be described.
According to some embodiments of the present disclosure, the technical features of the present disclosure may be directly implemented as hardware, software executed by a processor, or a combination of the two. For example, in wireless communication, a method performed by a wireless device may be implemented in hardware, software, firmware, or any combination thereof. For example, the software may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, removable disk, CD-ROM, or other storage medium.
Some examples of a storage medium are coupled to the processor such that the processor can read information from the storage medium. Alternatively, the storage medium may be integrated into the processor. The processor and storage medium may reside in the ASIC. For another example, a processor and a storage medium may reside as separate components.
Computer-readable media can include tangible and non-volatile computer-readable storage media.
For example, non-volatile computer-readable media may include random access memory (RAM), such as synchronization dynamic random access memory (SDRAM), read-only memory (ROM), or non-volatile random access memory (NVRAM). Read-only memory (EEPROM), flash memory, magnetic or optical data storage media, or other media that can be used to store instructions or data structures or Non-volatile computer readable media may also include combinations of the above.
Further, the methods described herein may be realized at least in part by computer-readable communication media that carry or carry code in the form of instructions or data structures and that can be accessed, read, and/or executed by a computer.
According to some embodiments of the present disclosure, a non-transitory computer-readable medium has one or more instructions stored thereon. The stored one or more instructions may be executed by a processor of the UE.
The stored one or more stored instructions cause processors to: performing PDU session establishment procedure through a first network slice; receiving, from a source base station, remapping information, wherein the remapping information is updated by PCF (Policy Control Function), wherein the remapping information includes information indicating that remapping from the first network slice to a second network slice has been performed; performing handover from the source base station to a target base station; skipping release for the PDU session, based on the remapping information.
The present specification may have various effects.
For example, through the procedure disclosed in this specification, it is possible to increase communication efficiency by continuing to use the PDU session previously used by the terminal through network remapping.
Effects that can be obtained through specific examples of the present specification are not limited to the effects listed above. For example, various technical effects that a person having ordinary skill in the related art can understand or derive from the present specification may exist. Accordingly, the specific effects of the present specification are not limited to those explicitly described herein, and may include various effects that can be understood or derived from the technical characteristics of the present specification.
The claims described herein may be combined in various ways. For example, the technical features of the method claims of the present specification may be combined and implemented as an apparatus, and the technical features of the apparatus claims of the present specification may be combined and implemented as a method. In addition, the technical features of the method claim of the present specification and the technical features of the apparatus claim may be combined to be implemented as an apparatus, and the technical features of the method claim of the present specification and the technical features of the apparatus claim may be combined and implemented as a method. Other implementations are within the scope of the following claims.
Number | Date | Country | Kind |
---|---|---|---|
10-2020-0138603 | Oct 2020 | KR | national |
10-2020-0146220 | Nov 2020 | KR | national |
10-2021-0022132 | Feb 2021 | KR | national |
This application is the National Stage filing under 35 U.S.C. 371 of International Application No. PCT/KR2021/015040, filed on Oct. 25, 2021, which claims the benefit of earlier filing date and right of priority to Korean Application Nos. 10-2020-0138603, filed on Oct. 23, 2020, 10-2020-0146220, filed on Nov. 4, 2020, and 10-2021-0022132, filed on Feb. 18, 2021, the contents of which are all incorporated by reference herein in their entirety.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/KR2021/015040 | 10/25/2021 | WO |