The present disclosure relates to methods and devices for enabling mitigation of radio traffic overload in at least one radio cell among a group of radio cells.
In the art, radio traffic overload continuously occurs in radio cells at a radio site in a mobile network. Specifically, in 5th Generation (5G) mobile networks, different types of services such as critical machine type, ultra-reliable low latency and mobile broadband communication that have different quality of service (QoS) requirements will be operating concurrently in the network. Radio traffic overload can normally be observed and is to be dealt with at run-time, or can be predicted to happen in the future and then be pre-empted. In any case, strategies need to be devised to handle radio traffic overload.
Several approaches can be used for resolving either current or predicted traffic overload events. One technique offloads main (or macro cell) traffic to a nearby small cell by means of a wireless communication device, commonly referred to as user equipment (UE), performing a handover from the macro cell to the smaller cell.
Another approach changes spectrum sharing ratio between network slices (i.e. network entities formed by dividing a network into flexible and scalable slices having a subset of the capacity of the total network), e.g. borrowing spectrum to one slice from another under-utilized slice, or from another radio access technology. Still another approach changes uplink-to-downlink ratio based on UE data consumption patterns, e.g. if a UE is receiving more data than it is sending, more bandwidth is allocated to the downlink (DL) rather than to the uplink (UL).
However, the approaches utilized for mitigating the cell overload situations are performed on a cell-by-cell basis. This has two main shortcomings. Firstly, this results in sub-optimization for the situation a cell is in. For example, constantly offloading UEs to a nearby small cell or neighbouring macro-cell will require repeated UE handover, when a change in UL/DL ratio may be a better choice.
Secondly, systemic effects of the decision for the data traffic overload are not taken into account as every cell unilaterally decides for itself which approach to select and does not coordinate its decision with other cells in the vicinity that may also be affected by the selected approach for mitigating traffic overload.
An objective is to solve, or at least mitigate, this problem in the art and to provide an improved method of enabling mitigation of radio traffic overload in a radio cell.
This objective is attained in a first aspect by a method of a supervising device of enabling mitigation of radio traffic overload in at least one radio cell among a group of radio cells. The method comprises acquiring a radio traffic capacity utilization metric of each of the group of radio cells, acquiring a proposed measure to be taken for mitigating radio traffic overload of said at least one radio cell from a device serving said at least one radio cell and from a device serving at least one of its neighbouring radio cells in the group, determining, based on the acquired radio traffic capacity utilization metrics and the acquired proposed measures to be taken, a selected measure to be taken for mitigating radio traffic overload of said at least one radio cell, and instructing the device serving said at least one radio cell to apply the selected measure for mitigating radio traffic overload of said at least one radio cell.
This objective is attained in a second aspect by a supervising device configured to enable mitigation of radio traffic overload in at least one radio cell among a group of radio cells, the supervising device comprising a processing unit and a memory, said memory containing instructions executable by said processing unit, whereby the supervising device is operative to acquire a radio traffic capacity utilization metric of each of the group of radio cells, acquire a proposed measure to be taken for mitigating radio traffic overload of said at least one radio cell from a device serving said at least one radio cell and from a device serving at least one of its neighbouring radio cells in the group, determine, based on the acquired radio traffic capacity utilization metrics and the acquired proposed measures to be taken, a selected measure to be taken for mitigating radio traffic overload of said at least one radio cell, and instruct the device serving said at least one radio cell to apply the selected measure for mitigating radio traffic overload of said at least one radio cell.
This objective is attained in a third aspect by a method of a supervising device of enabling mitigation of radio traffic overload in at least one radio cell among a group of radio cells. The method comprises acquiring a radio traffic capacity utilization metric of each of the group of radio cells, determining, based on the acquired radio traffic capacity utilization metrics from said at least one radio cell from a device serving said at least one radio cell and from a device serving at least one of its neighbouring radio cells in the group, a measure to be taken for mitigating radio traffic overload of said at least one radio cell, and instructing the device serving said at least one radio cell to apply the determined measure for mitigating radio traffic overload of said at least one radio cell.
This objective is attained in a fourth aspect by a supervising device configured to enable mitigation of radio traffic overload in at least one radio cell among a group of radio cells, the supervising device comprising a processing unit and a memory, said memory containing instructions executable by said processing unit, whereby the supervising device is operative to acquire a radio traffic capacity utilization metric of each of the group of radio cells, determine, based on the acquired radio traffic capacity utilization metrics from said at least one radio cell from a device serving said at least one radio cell and from a device serving at least one of its neighbouring radio cells in the group, a measure to be taken for mitigating radio traffic overload of said at least one radio cell, and to instruct the device serving said at least one radio cell to apply the determined measure for mitigating radio traffic overload of said at least one radio cell.
This objective is attained in a fifth aspect by a method of a device serving at least one radio cell of enabling mitigation of radio traffic overload in said at least one radio cell among a group of radio cells. The method comprises receiving, from a supervising device, a request for a proposed measure to be taken for mitigating radio traffic overload of said at least one radio cell, acquiring a radio traffic capacity utilization metric of at least one neighbouring radio cell, acquiring a proposed measure to be taken for mitigating radio traffic overload of said at least one radio cell from a device serving at least one neighbouring radio cell, determining, a measure to be taken for mitigating radio traffic overload of said at least one radio cell, determining, based on the acquired radio traffic capacity utilization metric, the acquired proposed measure to be taken for the at least one neighbouring cell and the determined measure to be taken for said at least one radio cell, a selected measure to be taken for mitigating radio traffic overload of said at least one radio cell, and applying the selected measure for mitigating radio traffic overload of said at least one radio cell.
This objective is attained in a sixth aspect by a device serving at least one radio cell being configured to enable mitigation of radio traffic overload in said at least one radio cell among a group of radio cells, the device comprising a processing unit and a memory, said memory containing instructions executable by said processing unit, whereby the device is operative to receive, from a supervising device, a request for a proposed measure to be taken for mitigating radio traffic overload of said at least one radio cell, acquire a radio traffic capacity utilization metric of at least one neighbouring radio cell, acquire a proposed measure to be taken for mitigating radio traffic overload of said at least one radio cell from a device serving at least one neighbouring radio cell, determine, a measure to be taken for mitigating radio traffic overload of said at least one radio cell, determine, based on the acquired radio traffic capacity utilization metric, the acquired proposed measure to be taken for the at least one neighbouring cell and the determined measure to be taken for said at least one radio cell, a selected measure to be taken for mitigating radio traffic overload of said at least one radio cell, and to apply the selected measure for mitigating radio traffic overload of said at least one radio cell.
Advantageously, by collecting measures to be taken from different neighbouring cells for mitigating radio traffic overload of a given radio cell—referred to herein as mitigation strategies—a best cell overload-mitigation strategy is determined given actual circumstances as indicated by reported radio traffic capacity utilization metrics from the cells rather than necessarily selecting the mitigation strategy proposed by the device serving the cell of which is subjected to overload. As a result, an informed decision is taken on the best strategy to apply.
Further advantageous is timing; the devices serving the cells may propose measures to be taken for mitigating radio traffic overload even without an indication of an imminent traffic overload event, but instead proactively create mitigation strategies, thereby providing readiness once an overload event occurs.
Advantageously, in contrast to a fully centralized approach for creating mitigation strategies, the embodiments disclosed herein allows for decentralized mitigation strategy creation thus enabling geofencing if needed: individual cells or cell groups need not disclose sensitive information to either other cells or a central entity, but instead share proposed hypothetical mitigation strategies.
In an embodiment, the acquiring of a proposed measure to be taken for mitigating radio traffic overload of said at least one radio cell comprises sending a request, to the device serving said at least one radio cell and to the device serving said at least one neighbouring cell for the proposed measure to be taken, and receiving, in response to the sent requests, the proposed measure to be taken from each of the devices.
In an embodiment, the request sent to the device serving said at least one radio cell and to the device serving said at least one neighbouring cell for the proposed measure to be taken comprises one or more of: a unique identifier of the device serving the cell indicated to be subjected to the radio traffic, a description of a radio traffic overload event occurring including time when the event is predicted to occur, severity and duration of the radio traffic overload event occurring, an indication of which slice or slices will experience the radio traffic overload event, one or more channels that will experience the overload event, and an indication of whether the radio traffic overload event occurs in downlink, uplink or both.
In an embodiment, neighbouring radio cells are identified from a neighbour relation table (NRT).
In an embodiment, it is detected from the acquired radio traffic capacity utilization metrics that a radio traffic overload event is indicated to occur in said at least one radio cell among the group of radio cells.
In an embodiment, the radio traffic event is detected to occur if the acquired radio traffic capacity utilization metric exceeds a radio traffic load threshold value at a current instant in time or is expected to exceed a radio traffic load threshold value at a later instant in time.
In an embodiment, the determining of the selected measure to be taken for mitigating radio traffic overload of said at least one radio cell comprises selecting, from the proposed measures, the measure which mitigates the radio traffic overload in said at least one radio cell the most, while not causing radio traffic load in said at least one neighbouring radio cell to increase, as indicated by the acquired radio traffic capacity utilization metric of each of the group of radio cells.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to “a/an/the element, apparatus, component, means, step, etc.” are to be interpreted openly as referring to at least one instance of the element, apparatus, component, means, step, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
Aspects and embodiments are now described, by way of example, with reference to the accompanying drawings, in which:
The aspects of the present disclosure will now be described more fully hereinafter with reference to the accompanying drawings, in which certain embodiments of the invention are shown.
These aspects may, however, be embodied in many different forms and should not be construed as limiting; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and to fully convey the scope of all aspects of invention to those skilled in the art. Like numbers refer to like elements throughout the description.
The OSS may for instance be responsible for providing network analysis information upon request from different network functions, for instance from the RBSs 10-14. For example, an RBS may request specific analysis information on the load level of a particular network slice. It is noted that the core network in practice comprises a great variety of entities and devices. However, for brevity only the OSS is shown.
As previously mentioned, when a cell or a part of a cell is suffering from—or is approaching—radio traffic overload, an RBS will typically select a strategy for mitigating the traffic overload occurring in the cell it is serving. For instance, it may be envisaged that first RBS 10 decides to handover a plurality of UEs from the cell 15 it is serving to the cell 16 served by second RBS 11. However, if the cell 16 of the second RBS 11 is on the verge of being overloaded while for instance the cell 17 served by third RBS 12 is underutilized, then the overload mitigating strategy of the first RBS 10 is not a preferred strategy.
In a first step, the OSS 20 acquires cell load information for all or a subset of the cells 15-19 in
The cell load information comprises a radio traffic capacity utilization metric indicating data capacity which is currently being utilized in the cell, or in different parts of the cell.
The OSS 20 continuously analyses the received radio traffic capacity utilization metric to determine whether or not any of the cells 15-19 shows indications of being overloaded, or if any one of the cells in fact is overloaded. The analysis may include predicting that the cell will become overloaded in the future using for example a machine learning model fit for time series analysis—for example an artificial Recurrent Neural Network (RNN)-based Long Short-Term Memory (LSTM) network. This LSTM network will act as a binary classifier, indicating a future overload event or not, given a time series of radio traffic capacity utilization as input.
The received radio traffic capacity utilization metric may be defined as ratio between currently utilized traffic capacity of the cell and total traffic capacity of the cell.
Further, it is envisaged that the cell load information may comprise a respective radio traffic capacity utilization metric for different parts, or slices, of a cell where resources are shared. In an example, it is envisaged that a cell shares resources between five slices, where the cell load information could define that slice1 utilizes 2% of the cell capacity, slice2 utilizes 14% of the cell capacity, slice3 utilizes 24% of the cell capacity, and so on. That is, it is possible for the OSS 20 to assess any overload issues on a sub-cell level.
Moreover, it may be envisaged that one radio traffic capacity utilization metric is given for UL traffic while another is given for DL traffic. The OSS 20 will typically hold a database comprising the radio traffic capacity utilization metric(s) for the different cells.
At some point, the OSS 20 detects or predicts—for example using a machine learning model such as LSTM or random forests, etc.—that a radio traffic overload situation occurs, or is about to occur, based on the radio traffic capacity utilization metrics received in steps S101a-S101c.
In this example, the OSS 20 detects in step S102 from the radio traffic capacity utilization metric received from the fifth RBS 14 that an overload is to occur in the cell 19 served by the fifth RBS 14. Since only the neighbouring cells 17, 18 are affected by a potential overload in fifth cell 19 (and not first cell 15 and second cell 16), the OSS 20 will in steps S103a-S103c send requests to the RBSs 12-14 affected by the overload to propose a measure to be taken for mitigating the radio traffic overload indicated to occur in the first cell 19. The measure of each RBS to be taken for mitigating the radio traffic overload indicated to occur in the first cell 19 will in the following be referred to as a mitigation strategy. It may be envisaged that a mitigation strategy of only one neighbouring RBS is acquired along with the mitigation strategy of the RBS 14 indicated to be subjected to overload, for instance in a scenario where not all neighbouring RBSs are capable of providing a mitigation strategy.
Even though in this embodiment it is describe that the OSS 20 is triggered to send the request for mitigation strategies after having detected that an overload indeed is indicated to be occurring in the fifth cell 19, it may be envisaged that the OSS 20 arbitrarily requests mitigation strategies without first having detected an overload situation (i.e. without performing step S102). In another example, the request for mitigation strategies may be triggered by the OSS 20 receiving a higher-level directive from the core network for instance for guiding decision processes in the core network; e.g. as a change in service-level agreement (SLA) of one or more subscribers.
Regardless of how the process is triggered, the OSS 20 may identify the neighbouring cells of a given cell by turning to a so-called neighbour relation table (NRT), which contains information about the neighbouring cells for a given cell (this is standardized and available for LTE and 5G networks). Alternatively, the OSS 20 may receive a higher-level directive identifying the neighbouring RBSs
In reply to receiving the requests in steps S103a-S103c, the respective RBS 12, 13, 14 responds with a proposed mitigation strategy in steps S104a-S104c and the OSS 20 determines in step S105 from the received mitigation strategies and the radio traffic capacity utilization metrics received in steps S101a-S101c which one is the most preferred, and finally instructs the fifth RBS 14 to apply the most preferred mitigation strategy in the fifth cell 19 in step S106. In order to determine the preferred strategy, OSS may be guided by the SLA specification, or predictions of the network state or the effect on Key Performance Indicators (KPIs) derived by ML models (possibly using similar methods as in [0041]) or statistical methods (Markov decision process or similar). The actual process may also involve various machine reasoning techniques for conflict resolution, constraint solving or satisfiability. As further shown in
Advantageously, with this embodiment, by collecting mitigation strategies of all (or at least most of) concerned cells, a best cell overload-mitigation strategy is determined given actual circumstances —as indicated by the acquired radio traffic capacity utilization metrics—rather than necessarily selecting the mitigation strategy proposed by the RBS the cell of which is subjected to overload. As a result, an informed decision is taken on the best strategy to apply.
It should be noted that if the OSS 20 would have detected in step S102 that an overload situation is to occur in for instance the third cell 17, the OSS 20 would have requested a mitigation strategy from all the RBSs 10-14, since they all constitute neighbours to the third cell 17 and thus be affected by an overload situation occurring in the third cell 17.
In this example, it is assumed that each RBS reports the cell load information for the corresponding cell. However, this could alternatively be performed by one or more specialized agents implemented in the RAN where each agent handles one or more cells.
Again with reference to
When the third RBS 13, the fourth RBS 14 and the fifth RBS 14 receive the request for a mitigation strategy in steps S103a, S103b and S103c, respectively, each RBS will create a strategy taking into account conditions prevailing in the corresponding cell 17, 18, 19. Creation of a strategy can be based on historical data, e.g. by means of using a statistical method. For example, if a particular RBS has created a specific strategy for 80% of the time that has proven successful, then it creates and suggests a similar strategy. In another example, creation of a strategy can be based on a machine learning model, which based on the data contained on the mitigation strategy request suggests the most suitable strategy. The model is trained on historical data of strategy creation from the particular RBS.
The creation of the strategy depends on the particular cell overload event, as well as the experience of the RBS itself. If for instance the duration of the event is short and the particular RBS was successful in the past by creating a strategy involving e.g. temporarily modifying UL/DL ratio, then the RBS can choose this strategy over others since it historically has proven successful.
A longer duration of the cell overload event could result in the RBS creating a different strategy, such as for example using handover to a smaller neighbouring cell for the most active UEs. The respective chosen strategy is then communicated to the OSS 20 as illustrated in steps S104a-S104c.
Further with reference to
Typically, the OSS 20 will in step Sins select, from the proposed measures/mitigation strategies of the RBSs, the measure which mitigates the radio traffic overload in the fifth cell 19 the most, while not causing radio traffic load in the neighbouring cells 17, 18 to increase, as indicated by the acquired radio traffic capacity utilization metric of each of the group of cells 17, 18, 19.
A number of parameters may be taken into account when determining the impact that the determined mitigation strategy will have; a reduction in the radio traffic capacity utilization metric in the overloaded cell 19 is a positive impact, while an increase in the metric in the third cell 17 and the fourth cell 18 is a negative impact.
Advantageously, negative impacts on neighbouring cells caused by local measures being taken in a cell being subjected to traffic overload is prevented.
In the following, an exemplifying scenario is discussed to illustrate how the OSS 20 may determine the impact that a mitigation strategy will have on a neighbouring cell.
After the third RBS 12, the fourth RBS 13 and the fifth RBS 14 has reported radio traffic capacity utilization metrics for the cell 17, 18, 19 that the respective RBS is serving (or for one or more slices of the cell), the OSS 20 will in step S102 determine whether or not an overload situation is approaching.
In the following example, it is assumed that three network slices (Slice 1, Slice 2 and Slice 3) are spanning the third cell 17, the fourth cell 18 and the fifth cell 19, and that a radio traffic capacity utilization metric is reported for each slice. In practice, each or a combination of network slices typically serve an enterprise customer or private individuals. For example, Slices 1 and 3 may serve some mission-critical enterprise application or applications such as teleoperation, e.g. remote surgery, remote driving, etc., while Slice 2 may serve private mobile subscribers which for instance use mobile broadband type of services to surf on their UEs.
Assuming that the following metrics are reported by the fifth RBS 14 in step S101c, where the numbers given specify current radio traffic utilization in relation to maximum radio traffic capacity of each slice in uplink and downlink, respectively:
In other words:
Now, the OSS 20 concludes in step S102 from the above-described cell load information received in step S101c that overloading of Slice 3 will occur by an event occurring in the fifth cell 19 at a given time t1, the event being for instance that further UEs using Slice 3 will be added to the fifth cell 19 at t1.
As can be intuitively concluded: Slice 3 is likely to have capacity to handle further UEs in the downlink since only 30% of the maximum downlink capacity of the slice utilized, but not in the uplink since the current utilization of the slice in the uplink amounts to 90% of the maximum uplink capacity for the slice.
The OSS 20 will thus request mitigation strategies in steps S103a-S103c and in response thereto receive a mitigation strategy from each one of the RBSs 12, 13, 14.
In this exemplifying embodiment, the following mitigation strategies are proposed by the RBSs 12, 13, 14:
Now, for the OSS 20 to determine the most preferred mitigation strategy to be applied, the OSS 20 needs to analyse the radio traffic capacity utilization metrics received in steps S101a-S101c to determine whether or not the RBSs 12, 13, 14 are negatively affected by a proposed mitigation strategy.
The OSS 20 will thus, taking into account the mitigation strategies received in steps S104a-S104c and the radio traffic capacity utilization metrics received in steps S101a-S101c, conclude the following:
As a result, the OSS 20 will send an instruction in step S106 to the fifth RBS 14 to apply the mitigation strategy determined in step S105 to be the best strategy; in other words strategy2 proposed by the fourth RBS 13 stipulating that traffic resources are re-allocated from Slice 2 to Slice 3 thereby increasing the maximum capacity of Slice 3 without negatively affecting any of the RSs 12, 13, 14.
In an embodiment, the OSS 20 determines in step S105 which mitigation strategy is most preferred by applying machine learning (ML). For instance, a time-series analysis approach may be applied that uses ML and a recurrent neural network (RRN) such as a long short-term memory (LSTM) architecture. This type of neural network may when trained properly use input data in the form of the reported radio traffic capacity utilization metrics for one or more cells or slices of a cell to predict whether or not a traffic overload event will occur. Alternatively, less sophisticated time series analysis methods may be used, for example time series regression.
In a more straightforward embodiment, the OSS 20 determines whether or not current radio traffic capacity utilization for a cell or slice exceeds a cell load threshold value, for instance above 85% of maximum capacity of the cell; if so a cell overload event is considered to occur.
In another embodiment, with reference to
In this embodiment, after the utilization metrics are reported in steps S101a-S101c, and the OSS 20 optionally determines in step S102 from the metrics that mitigation strategies should be requested (as previously discussed, this may be triggered without the metrics indicating a need for strategies), the OSS 20 sends a request for a mitigation strategy to one of the RBSs in step S201, in this case the fifth RBS 14.
Now, when the fifth RBS 14 receives the request for a mitigation strategy in step S201, the fifth RBS 14 will acquire the radio traffic capacity utilization metrics from the third RBS 13 and the fourth RBS 14 in steps S202a and S202b (as previously performed by the OSS 20 in steps S101a and S101b, respectively), as well as the mitigation strategies of the third RBS 12 and the fourth RBS 14 in steps S203a, S204a and steps S204a, S204b (as previously performed by the OSS 20 in steps S103a, S104a and S103b, S104b, respectively) as indicated in the NRT.
Further, the fifth RBS 14 determines in step S205 its own mitigation strategy.
Thereafter, the fifth RBS 14 determines in step S206 which mitigation strategy is most preferred—i.e. strategy2—based on the radio traffic capacity utilization metrics of each cell. The preferred mitigation strategy may further be communicated to the OSS 20 in step S207, which may verify that the preferred mitigation strategy is suitable (based on the previously reported radio traffic capacity utilization metrics) in step S208 and inform the fifth RBS 14 accordingly which finally applies the preferred mitigation strategy in step S209. It may alternatively be envisaged that the preferred mitigation strategy is applied in step S209 without having the OSS 20 verify that it is suitable.
In an alternative embodiment, instead of having the fifth RBS 14 determine which preferred strategy to apply, the RBSs 12, 13, 14 share the mitigation strategies among each other along with the radio traffic capacity utilization metrics of each cell 17, 18, 19. Thereafter, each RBS votes for a preferred strategy, and the mitigation strategy receiving most votes is selected as the preferred strategy to be applied by the fifth RBS 14 for the fifth cell 19.
Advantageously, with the embodiments discussed, mitigation strategies of neighbouring RBSs are taken into to determine the best strategy for dealing with a current or prospective data traffic overload issue of a particular cell. Instead of unilaterally enforcing a local overload mitigation strategy that may negatively affect neighbouring cells and incur service degradation and/or great costs, a mechanism is proposed which collects and assesses strategies of a group of RBSs in order to enforce a collectively optimal strategy. This can be achieved either upon an OSS encountering an overload event, or by the OSS pre-emptively triggering a preparation for a predicted future overload event. In addition, allowing the RBSs to propose a strategy provides for a decentralized approach.
In a further embodiment, with reference to
In line with previous embodiments, the OSS 20 may determine that strategy2 is the preferred strategy and in step S302 instruct the fifth RBS 14 to apply strategy2 in the fifth cell 19. This may be acknowledged by the fifth RBS 14 in step S303, or may indeed determine that a new strategy, e.g. strategy4 is the best strategy to apply in which case the OSS 20 instructs the fifth RBS 14 to apply strategy4 in step S302.
The aspects of the present disclosure have mainly been described above with reference to a few embodiments and examples thereof. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the invention, as defined by the appended patent claims.
Thus, while various aspects and embodiments have been disclosed herein, other aspects and embodiments will be apparent to those skilled in the art. The various aspects and embodiments disclosed herein are for purposes of illustration and are not intended to be limiting, with the true scope and spirit being indicated by the following claims.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/SE2020/050652 | 6/24/2020 | WO |