The present disclosure relates to communication systems. More particularly, the present disclosure relates to apparatuses and methods for scheduling and priority handling for data transmission.
Mission critical communication services are services that require preferential handling compared to normal telecommunication services, e.g. in support of police or fire brigade. Mission Critical Push-to-Talk (MCPTT) has been developed to send speech bursts, targeting public safety. Now, Mission Critical Data (MCData) is being developed to send non-real time data (for example, messages and files) to first responders. A first responder may be a policeman or a fire brigade person or ambulance personnel.
MBMS are point-to-multipoint interface specifications for wireless technologies such as 3rd Generation Partnership Project Long-Term Evolution (“3GPP LTE”), Wide-band Code Division Multiple Access (“WCDMA”), Universal Mobile Telecommunication System (“WMTS”), Enhanced Voice-Data Optimized (“EVDO”)/High Rate Packet Data (“HRPD”), and Digital Video Broadcast (“DVB”). MBMS supports both broadcast and multicast transmission modes. The MBMS broadcast mode is used to deliver Internet Protocol (“IP”) packets to terminals in a certain area. This is achieved via MBMS transport bearers which are setup for all cells in which the service should be available and continuously transmit as long as the service is running. Each MBMS transport bearer can be a Point-to-Multipoint (“PtM”) bearer that can be simultaneously received by multiple terminals.
The new functionalities which MBMS provides to servers or content providers (or MCPTT ASes or GCS ASes) are grouped in a new functional node called the Broadcast/Multicast Service Center (“BM-SC”). The BM-SC provides a functional interface—xMB interface between servers or content providers (or other API invokers) and the MBMS service offered by a cellular network, and controls the set-up and release of MBMS transport bearers and the scheduling of MBMS transmissions.
MCData aims to re-use MBMS file delivery features. The xMB interface should be extended. The xMB interface allows a MCData server to control the transmission process. The xMB interface (cf 3GPP specification TS 26.348) supports a push mode and a pull mode for MC Data ingestion. In case of the Push Mode, the server acts as MCData Server, which can ingest files without any intermedia node into the BM-SC. In case of the Pull Mode, the BM-SC fetches the MCData file from a content server/content host function. The server or other organizations may store the MC Data file on that content host function. The server is send providing an URL to the BM-SC so that the BM-SC can fetch the correct file. MCData transmission should re-use the MBMS Download delivery functions as defined in TS 26.346 (Clause 7).
MBMS Download Delivery is based on File Delivery over Unidirectional Transport (FLUTE) (RFC 3926). One of the FLUTE features is the so-called File Delivery Table (FDT) Instance Expiration mechanisms, which controls the deletion of association between the Transport Object identification (TOI) with the file metadata. After expiration, the UE (as receiver) and also the BM-SC (as sender) will release all resources, which are allocated to a certain Transport Object and delete all information. In order to save resources on the BM-SC and the UE side, the BM-SC should avoid long FDT expiration times. The UE and the BM-SC should keep resources allocated only during those times, when according data can be actually received.
The FDT Expiration time is absolute timestamp, typically expressed in Network Time Protocol (NTP) format. The BM-SC calculates the expiration as
FDT expiration=start_transmit+((1+FEC Overhead)*filesize/GBR)+safety (1)
Where
When the FDT Expiration Time (carried in the FLUTE FDT Expiry value) is expressed in a different time format such as Epoch time (i.e. time reference at 1.1.1970), then the start_transmit timestamp shall also be expressed in the same time format (e.g. Epoch time).
For Public Safety, likely only small bitrate bearers are used. Alternatively, several public safety organizations should share the same MBMS bearer. Traffics from different organizations are separated on higher layer. Different organizations and different persons in organizations create messages with different priorities. In principle, the organizations are independent from each other, but still share the same transmission resources (i.e. one MBMS bearer pipe with a constant bitrate).
Currently, there is no technical solution available to control the scheduling process of the BM-SC. Currently, the BM-SC is only forwarding messages & files of a single organization (e.g. one server by one organization) onto a bearer and the single organization is fully responsible for the scheduling.
Currently, the BM-SC is controlled using xMB, which is subdivided into control plane and user plane. The control plane is used to establish sessions and services. Any new session needs to be announced to UEs, so that UEs know the access information. Service announcement via MC Services is typically realized using unicast (i.e. a Session initiation protocol (SIP) message carries the service access information via GC1).
Therefore, it is an object of the present disclosure to solve at least the above-mentioned problem.
According to a first aspect of the present disclosure, a method for using Multimedia Broadcast Multicast Services (“MBMS”) bearers in a network is provided. The method comprising: receiving properties and a sharing policy for an MBMS bearer and an instruction on which servers are authorized to share the MBMS bearer from a master server; and associating a session from an authorized server to the shared MBMS bearer according to the sharing policy when requested by the authorized server.
According to a second aspect of the present disclosure, a method for using MBMS bearers in a network is provided. The method comprising: requesting to create an MBMS bearer; authorizing servers to share the MBMS bearer; and sending properties and a sharing policy of the MBMS bearer and an instruction on which servers are authorized to share the MBMS bearer.
According to a third aspect of the present disclosure, a service node, for using MBMS bearers in a network is provided. The service node comprising: a processing circuitry; and a storage medium storing instructions that, when executed by the processing circuitry, cause the service node to: receiving properties and a sharing policy of an MBMS bearer and an instruction on which servers are authorized to share the MBMS bearer from a master server; and associating a session from an authorized server to the shared MBMS bearer according to the sharing policy when requested by the authorized server.
According to a fourth aspect of the present disclosure, a computing device, for using MBMS bearers in a network is provided. the computing device comprising: a processing circuitry; and a storage medium storing instructions that, when executed by the processing circuitry, cause the computing device to: requesting to create an MBMS bearer; authorizing servers to share the MBMS bearer; and sending properties and a sharing policy of the MBMS bearer and an instruction on which servers are authorized to share the MBMS bearer.
According to a fifth aspect of the present disclosure, a computer program product is provided, comprising a computer readable storage medium storing instruction that, when executed by at least one processor of a computing system, cause a computing system to perform the method any of the aspects.
The invention will be described in detail by reference to the following drawings, in which:
Embodiments of the present disclosure will be described more fully hereinafter with reference to the accompanying drawings, in which embodiments of the disclosure are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Like numbers refer to like elements throughout.
The terminology used herein is for the purpose of describing to particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises”, “comprising”, “includes” and/or “including” used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms used herein should be interpreted as having a meaning that is consistent with their meaning in the context of this specification and the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
Embodiments of the disclosure will be described below with reference to the drawings.
The overarching (master) server 102 is responsible for configuring and controlling the shared MBMS bearers, including the sharing policies and which servers are authorized to access the shared MBMS bearer. There may be multiple shared MBMS bearers in the system being used by a same or a different set of servers.
The servers 104 are also named as agencies, content providers, 3rd party content providers or Application Programming Interface (API) invokers. Only authorized servers 104 are allowed to send messages via the shared MBMS bearer to the UEs 108 (also named as “receivers”) which are associated to the authorized servers 104. In
The BM-SC 106 is the node which is actually offering the MBMS transmission. In the present disclosure, the BM-SC 106 is aware of the sharing policies configured by overarching server 102, and grants accesses to a shared MBMS bearer to multiple servers. It is to be noted that, traditionally the BM-SC grants accesses to an MBMS bearer only to a single server and shields transactions from other servers. This principle of shielding transactions of other servers is also called multi-tenants support or concern separation within as-a-Service (aaS) to offerings.
The UEs 108 are separated into groups. The group separation is realized using either UDP ports with the same IP Multicast destination address for all groups; or combination of IP Multicast destination addresses and UDP ports.
Reference is now made to
Step 201: the master server (called “overarching agency” here is not depicted in the figure) instructs the BM-SC which servers are authorized to share a certain bearer, and configures a sharing policy. The sharing policy comprising queuing non-real time data transmission policy and interleaving non-real time data transmission policy, which will be further described in
Additionally or alternatively, some new xMB procedures may be needed to query the configuration of shared MBMS bearers.
Additionally or alternatively, the shared MBMS bearer (in terms of bitrate/GBR and target MBMS Service Area/List of SAIs) may always be created by the master server, or the shared MBMS bearer may be created by any agency on a need base (i.e. some or all the agencies can take the role of a master agency).
Step 202: server 1 creates a new shared bearer session using xMB Create Session Procedure. Server 1 provides a shared MBMS bearer ID as input, so that the BM-SC creates a new session using an existing MBMS bearer configuration.
Step 203: BM-SC acknowledges the session creation, and provides the access information to server 1.
The server may update the session parameters, which is not depicted in
Step 204: server 1 provides the access metadata to UE 1, which is associated with server 1. Since GC1 interface for unicast is used for service announcement, this step may require some time until all UEs affiliated with server 1 received the access metadata.
Steps 205-207: server 2 creates an xMB session on the same share MBMS bearer as server 1 (same as step 202, 203 and 204). For clarity, the description of the steps will not be repeated herein.
Now, the setup is ready to use, and BM-SC starts waiting for file transmission requests.
Step 208: server 1 desires to send a file to the affiliated UEs. Herein we take pull mode for example, server 1 uploads the file onto a content host, which could be a CDN origin server or a regular HTTP WebServer. WebDav or other upload procedures may be used.
Step 209: Server 1 gets the URLs under which the newly uploaded file is available for download. It should be noted that, when a CDN is used, then in particular the host part and some path parts are CDN provider specific.
Step 210: Server 1 uses xMB procedures to add a new file to the transmission session (i.e. send a transmission request for a file to the BM-SC). In one embodiment, the server adds a new priority indicator to the request. The BM-SC verifies that the requesting server is actually authorized to use the priority. In another embodiment, the BM-SC derives the priority from the server information (e.g. username password or access token in the HTTP request), which is provided with the transmission request. It is to be noted that, there may be some time between the upload (step 208) and the command to the BM-SC (step 210). It is to be noted that, in some implementations, there may be a dedicated preparation procedure to give some time to the BM-SC for transmission preparation.
Step 211: BM-SC requests the file/non-real time data from the content host. In Step 212, the content host provides the file/non-real time data.
In Step 213, the BM-SC partitions the file/non-real time data, and sends the file on the shared MBMS bearer. In an alternative embodiment, the BM-SC also calculates the FEC redundancy. In addition, the BM-SC also determines the transmission duration for the file and sets the FDT expiration (also referred to as FDT Instance Expiry). As stated above, the transmission duration can be calculated in formula (1): FDT expiration=start_transmit+((1+FEC_Overhead)*filesize/GBR)+safety.
Reference is now made to
Before the master server (called “Master Agency” in the flow diagram) creates a service, the master server authorizes which servers can share a MBMS bearer and configures the sharing policy.
In step 301 the master server creates a service. In step 302, BM-SC acknowledges that the service is created, and feeds back the ID for the service. In Step 303, master server updates the service using parameters which comprising: Service Class, Service Name, Push Notification URL, Service announcement Mode (=server). The BM-SC acknowledges the update of the service in step 304. Then, in step 305, the master server requests to get the service, and the BM-SC updates the service by sending Service ID, Service Class and Service Name back to the master server.
After the creation of the service, in step 307, the master server requests to create a bearer for the service, and sends the ID for the service to the BM-SC. There are two options to create a new Shared MBMS Bearers. Option 1: A new flag or a new enumerate value to an xMB session definition, which turns the xMB service & xMB session into a shared MBMS bearer session. When using a flag, this flag may express a “is shared MBMS bearer”. When an enumerate, there may be more than two options, e.g. add the needed session resource information. Option 2: A new “create shared MBMS bearer” procedure, which contains some properties from the xMB session. In particular the MaxBitrate (GBR), MSA (List of SAIs). The Shared MBMS bearer can be associated to the xMB service so that all sessions of that xMB service are associated to the Shared MBMS Bearer. Alternatively, the bearer-id is always provided with the service identifier when creating a new session.
In step 308, the master BM-SC acknowledges the creation of the bearer, and sends the ID for the bearer back to the master server. In step 309, the master server updates the bearer using parameters which comprising: Session Start (meaning the time that the session starts), Session Stop (meaning the time that the session stops), quality of service (QoS) Information, Geographical area (Service Area Ids (SAI) list). The BM-SC acknowledges the update of the bearer in step 310. Now, the service and the shared bearer provisioning is completed.
When the server (slave server) desires to send a file/non-real time data, it gets the shared bearer information in step 311, and updates the service with push Notification URL (allows the server to receive notifications from the BM-SC) in step 312.
In step 313, the slave server creates a session under the above bearer ID (or the API service ID of the shared service). In step 314, BM-SC acknowledges that the bearer has been created. In step 315, the slave server updates the session using the parameters, comprising: Session Type, FEC, Ingest Mode (Push/Pull), and, in case of the Pull mode, the File List. In step 316, the BM-SC acknowledged the update of the session. In step 317, the slave server gets the session, and in step 318, the BM-SC acknowledges the get of the session by sending the parameters SDP, in case of Push Mode also the Push URL for push mode. To be specific, In case of PULL Mode, the BM-SC gets the file list, which describes the files to pull. In case of Push mode, the BM-SC provides the push URL, so that the server can push files.
In step 320, when the start time of the session reaches (step 319), the BM-SC starts to communicate with the LTE broadcast network (LTE BC) by sending session start request. In step 321, BM-SC receives the session start response.
In an alternative embodiment, the BM-SC may send suspend information on session for server 2, so that all UEs affiliated with server 2 know the minimum suspend duration.
In the second sharing policy of the MBMS bearer, the inter-server prioritization may be provisioned once at setup or when new servers are on boarded. There are at least two prioritization schemes. In prioritization Scheme 1, the master server defines a single priority to each server. As a result, any file from the same server will be treated with the same priority.
In case of prioritization scheme 1, the BM-SC determines the file priority based on the authentication & authorization scheme (which can be realized using username/password or access token).
In case of prioritization scheme 2, would allow to assigns priority level range to each server, so that each server is authorized to use priority levels within the priority level range. For example, the master server provisions the highest priority which the server is authorized to use. For example, there can be priority levels for MCData sessions between 1 and 10, where 10 indicates the highest priority. A first server is authorized to use the priority levels between 1 and 8, while another server is only authorized to use priority levels 1 to 6. So, the first server can send low priority files, so that other servers can still get priority.
In case of prioritization scheme 2, there is a new parameter in the file attributes, indicating the priority for the file. In case of Pull ingest mode, the new priority parameter can be added into the File List (Check Table 5.4-5 “Additional properties for Files” in TS 26.348, Rel 16). The BM-SC uses the authorization & authentication scheme (e.g. username password in the HTTP headers) to verify, that the server is actually authorized to use a certain priority value. In case of push mode, the priority can be added as new HTTP header onto every HTTP PUT requests. Another alternative would be to give all files in a Push session the same priority, e.g. by adding a priority into the common Session Properties (cf Table 5.4-1 “List of Session Properties” of TS 26.348 Rel 16).
When multiple servers share a bearer for MCData services, the MBMS bearer capacity may be exclusively associated to on server at a time. However, in some cases (e.g. for sharing with speech), the shared MBMS bearer is not exclusively allocated to the transmission of one server. Instead, the transmission bitrate is shared.
In one embodiment, the shared MBMS bearer should carry MCPTT (speech) and MCData. MCPTT consist of one or more speech bursts. A speech burst is a short period of time, where MCPTT data is send (speech data). When no one is speaking, then there is no MCPTT data, meaning the burst is over. It should be noted that, the MCPTT data has a constant bitrate. e.g. 40 kbps.
In an alternative embodiment, a new notification can be sent, so that the UE is notified for a file transmission pause. When it is clear that the shared MBMS bearer is allocated to a different server for a known duration, the UE can stop listening to the shared MBMS bearer and save battery. At time t3, speech data of speech burst #2 starts arriving. At time t4, file#B+1 starts arriving. And the bitrate assigned to file #B+1 is bFD=GBR−bMCPTT. When speech burst#2 ends, the bitrate being assigned to file#B+1 is back to GBR.
When reducing the bitrate, there are consequences to consider. In an alternative embodiment, the file data is repaired after being received by UE. Via the transmission duration, the UE may determine the start of (unicast)_file repair procedure.
In a preferred embodiment, the BM-SC may verify the request of the authorized server to access the shared MBMS bearer. It should be verified that: whether a content provider is authorized to access the shared MBMS bearer. It should be noted that, there may be multiple shared MBMS bearers in the system (used by the same or a different set of content providers). It also be verified that whether the request of the content provider according to the sharing policy.
In a preferred embodiment, at the beginning of the session, the BM-SC may announcing a transmission duration to at least one affiliated UE of an authorized server. The transmission duration is mapped to the FDT Expiry mechanism of MBMS.
In a preferred embodiment, the sharing policy is queuing non-real time data transmission policy. The queuing non-real time data transmission policy does not allow pre-emptioning a non-real time data transmission of an ongoing session.
In another preferred embodiment, the sharing policy is interleaving non-real time data transmission policy. The interleaving non-real time data transmission policy allows suspending a non-real time data transmission of an ongoing session for a non-real time data transmission of a higher priority,
In a preferred embodiment, the interleaving non-real time transmission policy also allows reduing the bitrate of the ongoing non-real time data transmission when one or more other data transmission bursts comes in, in order to send the non-real time data and the one or more other data transmission burts simultaneously. Since the file may be damaged in the case of lower biterate, in a preferred embodiment, the non-real time data is repaired after being received by the UE.
In a preferred embodiment, the interleaving non-real time data transmission is based on the sharing policy of the authorized servers. The sharing policy may be a first sharing policy defined by the master server, in which a single priority is assigned to each server. The BM-SC determines the file priority based on the authentication & authorization scheme. The sharing policy may be a second sharing policy defined by the master server, in which the master server assigns priority level range to each server, so each server is authorized to use priority levels within the priority level range. In a preferred embodiment, the server may add a priority indicator to the request to create sessions on the shared bearer, and the BM-SC may verify the requesting server is authorized to use the priority,
In a preferred embodiment, the BM-SC sending a suspend notification to at least one affiliated UE of the authorized server delivering an ongoing transmission, when an ongoing transmission is suspending for a duration. In an embodiment, the suspend notification may comprise a prolonged transmission duration. In another embodiment, the suspend notification may comprise a minimum suspend duration mapped to the FDT Expiry mechanism. In another embodiment, the suspend notification may comprise a notification that notifying the affiliated UE to stop receiving the shared bearer for an indicated time, the indicated time may be the calculated prolonged transmission time.
In a preferred embodiment, the master server can also be a regular server, and requests to send non-real time data as well.
In an embodiment, the master server also sends bearer information to the authorized servers, so the authorized servers are informed of which bearer to use.
In a preferred embodiment, the sharing policy is queuing non-real time data transmission policy. The queuing non-real time data transmission policy does not allow pre-emptioning a non-real time data transmission of an ongoing session.
In another preferred embodiment, the sharing policy is interleaving non-real time data transmission policy. The interleaving non-real time data transmission policy allows suspending a non-real time data transmission of an ongoing session for a non-real time data transmission of a higher priority,
In a preferred embodiment, the interleaving non-real time transmission policy also allows reduing the bitrate of the ongoing non-real time data transmission when one or more other data transmission bursts comes in, in order to send the non-real time data and the one or more other data transmission burts simultaneously. Since the file may be damaged in the case of lower biterate, in a preferred embodiment, the non-real time data is repaired after being received by the UE.
In an embodiment, the master server further configures the sharing policy of the servers.
In a preferred embodiment, the master server may assigning a single priority for each server. In another preferred embodiment, the master server assign a priority level range to each server, so that each server is authorized to use priorities levels within the priority level range.
The present disclosure is described below with reference to block diagrams and/or flowchart illustrations of methods, apparatus (systems) and/or computer program products according to embodiments of the disclosure. It is understood that blocks of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, and/or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer and/or other programmable data processing apparatus, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks.
Accordingly, the present disclosure may be embodied in hardware and/or in software (including firmware, resident software, micro-code, etc.). Furthermore, the present disclosure may take the form of a computer program product on a computer-usable or computer-readable storage medium having computer-usable or computer-readable program code embodied in the medium for use by or in connection with an instruction execution system. In the context of this document, a computer-usable or computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
Likewise, a computing device (master server) for using Multimedia Broadcast Multicast Services (“MBMS”) bearers in a network can also be implemented by a similar functional unit. It comprising: a processing circuitry; and a storage medium storing instructions that, when executed by the processing circuitry, cause the computing device to: requesting to create an MBMS bearer; authorizing servers to share the MBMS bearer; and sending properties and a sharing policy of the MBMS bearer and an instruction on which servers are authorized to share the MBMS bearer.
While the present systems and methods have been described in particular detail with reference to specific exemplary embodiments thereof, it should also be appreciated that numerous modifications and alternative embodiments may be devised by those of ordinary skill in the art without departing from the scope of the present disclosure. For example, embodiments wherein devices or systems are disclosed which are to be arranged and/or constructed for performing a specified method or function inherently disclose the method or function as such and/or in combination with other disclosed embodiments of methods or systems. Furthermore, embodiments of methods are considered to inherently disclose their implementation in respective hardware, where possible, in combination with other disclosed embodiments of methods or systems. Furthermore, methods that can be embodied as program instructions, e.g. on a non-transient computer-readable storage medium, are considered to be inherently disclosed as such an embodiment.
The term “UE” used herein may indicate all forms of devices enabled to communicate via a communication network, such as mobile telephones (“cellular” telephones) and laptops with mobile termination, and thus can be, for example, portable, pocket, hand-held devices, such as mobile phones, smart phones, personal digital assistants (PDA); computer-included devices, such as desktops, laptops; vehicles, or other devices, such as meters, household appliances, medical appliances, multimedia devices, etc.
While the exemplary embodiments of the present invention have been illustrated and described, it will be understood by those skilled in the art that various changes and modifications may be made, and equivalents may be substituted for elements thereof without departing from the true scope of the present invention. In addition, many modifications may be made to adapt to a particular situation and the teaching of the present invention without departing from its central scope. Therefore, it is intended that the present invention is not be limited to the particular embodiment disclosed as the best mode contemplated for carrying out the present invention, but that the present invention include all embodiments falling within the scope of the appended claims.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/CN2019/071342 | 1/11/2019 | WO | 00 |