At least some embodiments relate to apparatuses, methods and non-transitory storage media for selecting a transmission method, e.g., an RRC (Radio Resource Control) protocol method, for SDT (Small Data Transmission). For example, at least some embodiments relate to narrow band (NB)-Internet of Things (IoT) and SDT in RRC inactive state.
A cellular communication system, e.g. a 5G NR system, enables small data transmissions (SDTs) when a UE is in an RRC inactive state.
For example, RRC-less SDT is currently limited for use in the same cell, which is the last serving cell for a UE in state “RRC Connected” before transitioning to state “RRC Inactive”, or for Configured Grant (CG) based SDT. Hence, RRC-less SDT may not be applied whenever the UE initiates an SDT procedure to a different cell than the last serving cell.
NR Cell Global Identifier (NCGI): used to identify NR cells globally. The NCGI is constructed from the PLMN identity the cell belongs to and the NR Cell Identity (NCI) of the cell.
gNB Identifier (gNB ID): used to identify gNBs within a PLMN. The gNB ID is contained within the NCI of its cells.
Global gNB ID: used to identify gNBs globally. The Global gNB ID is constructed from the PLMN identity the gNB belongs to and the gNB ID. The MCC and MNC are the same as included in the NCGI.
Global gNB ID=PLMN ID+gNB ID
Full I-RNTI: A full I-RNTI which has a length of 40 bits which can be included within a 64 bit RRCResumeRequest1 message over Common Control Channel 1
Short I-RNTI: A short I-RNTI which has a length of 24 bits which can be included within a 48 bit RRCResumeRequest message Common Control Channel
Last serving NG-RAN: node that stores the Inactive UE Context.
At least some example embodiments aim at enabling a UE to perform a dynamic selection between SDT transmission methods, e.g., an RRC-less SDT procedure and an RRC-based SDT procedure, in RRC Inactive, depending on a cell in which the UE is initiating such procedure, e.g. based on network assistance.
At least some example embodiments enable a smooth switching of a UE between transmission methods for an SDT procedure, e.g., RRC-less SDT and RRC-based SDT approaches, depending on the cell in which the UE initiates the SDT procedure.
According to at last some example embodiments, the UE is enabled to determine whether it is initiating an SDT procedure in the last serving gNB or not. According to at least some example embodiments, the last serving gNB is a node that stores a context of a UE that is in inactive state. As a result, RRC-less SDT can be applied not only to SDT procedures initiated in the last serving cell, but also in all the cells controlled by the UE's last serving CU-UP in the same gNB.
First, at least some example embodiments enable provisioning of cells/RAN areas to the UE where one or more properties of SDT transmissions may differ. Examples of such properties include the use of RRC-based vs. RRC-less method for SDT, or the application of UP IP.
Secondly, at least some example embodiments enable a dynamic switch at the UE between RRC-less and RRC-based SDT depending on the serving cell as well as based on other triggers (e.g. RRC-based selection triggered by a key change), resulting in extending the use of the RRC-less method, and in turn in decreasing Uu signaling overhead.
Moreover, at last some example embodiments work well with both basic routing and enhanced routing.
In the following, example embodiments will be described with reference to the accompanying drawings.
At least some example embodiments are concerned with enhancements associated with Small Data Transmission (SDT) in RRC Inactive.
UE in RRC Inactive
An Inactive-RNTI (I-RNTI) identifier is allocated by the last serving gNB (also called anchor gNB in the following) to a UE that is being moved to an RRC Inactive state. The I-RNTI identifier is configured as part of an RRC release message with SuspendConfiguration, and the UE transmits it within an RRC resume request message. The I-RNTI includes means to identify both the UE and the last serving gNB, so it has to include a UE ID part and gNB ID part. The algorithm used to construct the I-RNTI by the network is specific to a network vendor and this includes decision on the position within the I-RNTI and number of bits used for UE ID and gNB ID parts. In fact, the 3GPP specifications do not specify the number of bits which should be used to identify the gNB and the number of bits which should be used to identify the UE within the total I-RNTI bits, nor the position of UE ID and anchor gNB ID parts within the I-RNTI.
While in RRC Inactive, the UE can move within a pre-defined RAN Notification Area (RNA), composed of one or more cells, without notifying the network. If the UE enters a cell not included in the RNA, it needs to send an RNA update (RNAU), e.g. as illustrated in
Small Data Transmission in RRC INACTIVE State
According to NR small data transmission in INACTIVE state, three procedures for enabling Small Data Transmission (SDT) in the Uplink in a 5G NR system are considered as illustrated in
In
Instead, the RRC-less approach assumes that the RRC layer need not be involved and the necessary information, such as UE identity and UE authentication token, can be provided by the UE e.g. in the MAC header or as a MAC CE.
Network Identities in 5G NR
In 5G NR, the following network identities are defined that are relevant according to at least some example embodiments:
Security Aspects Relevant According to at Least Some Example Embodiments
When the UE attempts resuming, the RRCResumeRequest message shall include the I-RNTI for context identification and a MAC-I (i.e. the ResumeMAC-I/shortResumeMAC-I). The latter is a 16-bit message authentication token that the UE shall calculate using the integrity algorithm (NIA or EIA) in the stored AS security context, which was negotiated between the UE and the last serving gNB/ng-eNB, and the current KRRCint with certain known inputs:
KEY: it shall be set to current KRRCint;
BEARER: all its bits shall be set to 1;
DIRECTION: its bit shall be set to 1;
COUNT: all its bits shall be set to 1;
MESSAGE: it shall be set to VarResumeMAC-Input/VarShortInactiveMAC-Input as defined in 3GPP TS 38.331 for gNB and in 3GPP TS 36.331 for ng-eNB with following inputs:
Handling of the security keys at gNB and UE at the RRC state transitions from RRC Connected to Inactive is as per Section 6.8.2.1.2 of 3GPP TS 33.501.
Handling of the security keys at gNB and UE at the RRC state transitions to RRC Connected from RRC Inactive is as per Section 6.8.2.1.3 of 3GPP TS 33.501.
CU-DU Split Architecture
A RAN architecture split into centralized baseband units and distributed radio units has gained traction and has proven to be effective in commercial (3G/LTE) deployments over the past years. Such centralized architecture has both performance benefits (e.g. due to improved inter-cell coordination at the centralised baseband) and cost benefits (e.g. due to increased hardware/software pooling, reduced site rental and management costs). With the challenging and diverse requirements for NR systems, the need for such split RAN architecture has become ever more important. The NG-RAN architectures defined in NR are shown in
Assumptions Related to a UE in RRC INACTIVE in CU-DU Split Architecture
In the CU/DU split architecture, the following assumptions can be made for the gNB and cell that moves the UE to RRC Inactive state:
PDCP Security Context
Based on 3GPP Working Group SA3 input for UE in RRC_INACTIVE using the SDT mechanism, summarized in Table 1 below, the UE can use the stored PDCP security context (for data integrity protection, UE verification, and network verification), and it does not need an update of security parameters (such as ciphering keys or Next Chained Counter (NCC)) after an SDT procedure as long as the UE context is available (stored) and the PDCP entity is not relocated, i.e. case (1) and (2) in Table 1.
These conditions are valid whenever the gNB-CU-CP (hosting the RRC layer that stores the UE AS context) and the gNB-CU-UP (hosting the PDCP layer that stores the security context of the UE) have not changed for the UE. This means that—from a security perspective—the UE could initiate an RRC-less SDT in any cell which belongs to a DU controlled by the UE's last serving CU-CP and last serving CU-UP (i.e. in which the UE was in RRC Connected mode before transitioning to RRC Inactive).
However, currently the UE is unaware of the gNB (and gNB-CU-CP or gNB-CU-UP) to which a cell, broadcasting a certain 36-bit NR Cell Identity (NCI), belongs to/is associated with. This is because, the UE cannot discriminate between the gNB ID and Cell ID parts contained in the NCI since it does not know their lengths, as described above. Similarly, it is not aware of gNB-CU identifiers. Therefore, the UE is not capable to determine whether it is initiating a SDT procedure in the last serving gNB or not. As a result, with this limitation in place, the RRC-less SDT solution can be applied only to SDT procedures initiated in the last serving cell rather than the cells controlled by the UE's last serving CU-UP in the same gNB, which is a strong limitation.
Furthermore, it is not clear whether and how mobile UEs that could in principle perform SDT in a different cell, at one point or another, can make use of the RRC-less method as long as they are within the same serving gNB.
An additional observation, in light of Table 1, is that the UE authorization is needed even when initiating SDT in the same cell (1) or in a different cell without PDCP relocation (2). In Rel-15, such UE authorization, at a connection resume of an RRC Inactive UE, is based on a 16-bit MAC-I that is sent in the RRC Resume Request message, as described above. However, it is not useful to apply such authorization method for RRC-less SDT since it requires RRC involvement at both transmitter and receiver side, contradicting the aim of the RRC-less approach. Therefore, according to at least some example embodiments, it is assumed that the user plane integrity protection (UP IP) functionality is adopted for the RRC-less method. UP IP is an optional functionality of 5G NR, which is employed at PDCP layer (in CU-UP) as defined in 3GPP TS 33.501. A message authentication code (MAC-I/NAS-MAC) is generated using the integrity algorithm NIA and the message authentication code is then appended to the message when sent. UP Integrity protection is currently configured by RRC and is applicable to all PDUs of a DRB configured with UP IP. This means that currently, UP IP would have to be applied to all packets of a DRB configured with SDT irrespective of whether RRC-less SDT or RRC-based SDT approach is selected for the SDT transmission. However, using UP IP together with the RRC-based SDT approach would increase the Uu signaling overhead (i.e. two MAC-Is would have to be sent), which is undesired for small data use cases.
RRC-Based SDT in CU-DU Split Architecture
As illustrated in
Upon the reception of the RRCResumeRequest message (S502), the CU-CP verifies the identity of the UE, provides the appropriate TEIDs to the DU (S503) (via the message UE CONTEXT SETUP REQUEST), and sends the stored UE context to the CU-UP (S504-S506, see 3GPP TS 38.473) if the CU-UP does not store the UE context or a CU-UP change has taken place.
The DU then tunnels the data PDU to the CU-UP using the provided TEIDs (S507).
The CU-UP deciphers the message and forwards it to a UPF.
In step S508, the DU sends a message RRC Release with a Suspend Indication to the UE, upon which the UE enters the RRC Inactive state.
At least some example embodiments adopt the approach illustrated in
It is noted that it requires that the UE context is set up at the gNB-DU before the routing of the SDT UL payload can be made irrespective of which of RRC methods is adopted.
RRC-Less SDT in CU-DU Split Architecture
In S601, UE 60 is in RRC_Connected state.
In S602, last serving CU-CP 61, which has served the UE 60 in RRC_Connected, transmits a message “RRC Release” with field “SuspendConfig” including SDT-Configuration.
In S603, UE 60 has transitioned to RRC_Inactive state.
In S604, new payload appears in a buffer of UE 60 and SDT procedure is triggered.
In S605, the UE 60 performs SDT and transmits UL payload with UP IP and I-RNTI to a DU 62 of last serving gNB, according to an RRC-less SDT procedure.
In S606, the DU 62 identifies CU-UP 63 based on I-RNTI and routes the UL payload accordingly. That is, in S607, the DU 62 transmits UL payload of first DRB (SDT-DRB) with UP IP MAC-I to the last serving CU-UP 63.
In S608, the last serving CU-UP 63 processes the UL payload, including UP IP validation, payload deciphering and forwarding to UPF.
In S609, the last serving CU-UP 63 transmits an UE authorization acknowledgment to the DU 62.
In S610, DU 62 sends a response to UE 60 that may include an acknowledgment or suspend indication.
In S611, the UE 60 has entered RRC_Inactive state.
As described above, routing the UL payload is done without involvement of the CU-CP 61 and without storing of UE 60 context at DU 62, but simply routing the UL payload and the I-RNTI to the CU-UP 63 identified based on the I-RNTI. The approach is illustrated in
Such approach is used to complement at least some of the example embodiments as an alternative to the “baseline routing” in RAN split scenarios described above.
In the following, example embodiments will be described by referring to
According to at least some example embodiments, process 1 is performed by a user equipment for use in a cellular communication system. According to at least some example embodiments, the user equipment comprises at least one processor and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the user equipment at least to perform process 1.
In step S701 of
Otherwise, if Yes in step S701, process 1 proceeds to step S703 in which it is determined whether or not a small data transmission is to be performed by the user equipment. If No in step S703, process 1 ends.
According to at least some example embodiments, in step S703 triggering of the small data transmission is determined according to e.g. any combination of data amount present in a buffer of the user equipment, an RSRP level, and other validity conditions that may apply.
Otherwise, if Yes in step S703, process 1 proceeds to step S705 in which a first transmission method or a second transmission method is selected for performing the small data transmission, at least based on a cell of the cellular communication system in which the small data transmission is to be performed by the user equipment. Then, process 1 proceeds to step S707.
In step S707, the small data transmission is performed using the selected first or second transmission method. Then process 1 ends.
According to at least some example embodiments, the first transmission method is based on the RRC protocol and the second transmission method is not based on the RRC protocol, i.e., without the RRC message carrying the payload.
According to at least some example embodiments, the second transmission method comprises stateless routing between a distributed unit and a centralized unit of a serving node of an access network of the cellular communication system, which controls the cell.
According to at least some example embodiments, also the first transmission method comprises stateless routing between a distributed unit and a centralized unit of a serving node of an access network of the cellular communication system, which controls the cell. In some examples, this is used depending on whether the UP IP is enabled for the first transmission method.
According to at least some example embodiments, in step S705 it is detected whether or not the cell in which the small data transmission is to be performed by the user equipment is controlled by a last serving node, wherein the last serving node is a node of an access network of the cellular communication system, which served the user equipment before it transited to the inactive state. In case the cell is controlled by the last serving node, the second transmission method is selected, and in case the cell is not controlled by the last serving node, the first transmission method is selected.
According to at least some example embodiments, in step S705 it is determined whether the cell in which the small data transmission is to be performed by the user equipment allows to use the second transmission method.
According to at least some example embodiments, information (e.g. a list, to be described in more detail later on with respect to embodiments 1 and 2) of cells or areas of the cellular communication system is acquired, wherein the information indicates that, for the small data transmission, the first or second transmission method is to be applied in the cells or areas, and in step S705 it is referred to the information for selecting the first or second transmission method.
According to at least some example embodiments, in step S705 it is detected whether or not the cell in which the small data transmission is to be performed by the user equipment is comprised in the information on areas acquired by the user equipment. In case the cell is comprised in the information of areas, the second transmission method is selected, and in case the cell is not comprised in the information on areas acquired by the user equipment, the first transmission method is selected.
According to at least some example embodiments, the information is acquired from at least one of the cellular communication system, the access network of the cellular communication system, and the last serving node.
According to at least some example embodiments, the information is acquired based on at least one of signaling related to RAN notification area provisioning, acquiring a configuration of the small data transmission, acquiring an RRC release message, acquiring a suspend configuration, and acquiring a broadcast message from the cell selected to perform the small data transmission.
Now reference is made to
According to at least some example embodiments, process 2 is performed by an apparatus for use in a cellular communication system.
According to at least some example embodiments, the apparatus comprises at least one processor and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus at least to perform process 2.
According to at least some example embodiments, the apparatus is part of an access network of the cellular communication system, and/or is a last serving node of a user equipment.
In step S801, information of cells or areas of the cellular communication system are provided, wherein the information indicates that, for a small data transmission to be performed by a user equipment in case the user equipment is in an inactive state, a first or second transmission method is to be applied in the cells or areas. Then process 2 ends.
According to at least some example embodiments, the information indicates the cells or areas of the cellular communication system, which are controlled by the last serving node.
According to at least some example embodiments, the information is provided based on at least one of signaling related to RAN notification area provisioning, acquiring a configuration of the small data transmission, acquiring an RRC release message and acquiring a suspend configuration.
According to at least some example embodiments, the information comprises at least one of cells or areas of the cellular communication system out of RAN notification areas configured in the user equipment, cell identifiers, area identifiers, RAN area code identifiers, tracking area identifiers, and closed area group identifiers.
Further, as a modification or supplement of
According to at least some example embodiments, the deciding whether or not to use the protection function (e.g. user plane integrity protection function) also is based on an instruction acquired from the cellular communication system.
Further, as another modification or supplement of
Alternatively or in addition, the second transmission method is switched to the first transmission method for performing the small data transmission after performing a predetermined number of small data transmissions by the second transmission method, and, in response to the switching, a request is provided from the cellular communication network to change a key used by the protection function, wherein the request is based on the first transmission method.
For example, the predetermined number is defined in specifications. Alternatively or in addition, the predetermined number is provided by the network.
According to at least some example implementations of embodiment 1, a UE is configured to select and use the RRC-less SDT method as the second transmission method for SDT transmissions of an “SDT-DRB”, which is a DRB allowed to use SDT, to be initiated to any serving cell controlled by the last (i.e. same) gNB-CU-CP and same gNB-CU-UP (e.g. same gNB). It is noted that the data entitled to use SDT could be defined also on a different granularity/basis than DRB, such as QoS flow or alike.
It is noted that, according to at least some example implementations of embodiment 1, RRC-less SDT is applied while using either RACH-based SDT or CG-based SDT illustrated in
UE Determination of Same Last Serving qNB Based on Network Assistance:
Option 1
The UE is provided by the network with a list of cells in which the RRC-less method should be applied. The network basically includes in this list the cells that belong to the same last serving gNB, in which it is feasible to apply RRC-less SDT.
Option 2
The provisioning of the list is implemented by extending signaling related to legacy RAN Notification Area (RNA) provisioning. For example, information is added to the cells/RANACs (RAN Area Codes) in the RNA, where the information is indicative of whether the RRC-less method should be applied or not in a cell/RANAC present in the RNA.
Basically, the UE is already configured with an RNA which is essentially a list of one or more RANAC IDs in the typical form. In this alternative, the UE is provided a list of RANAC IDs where the UE could perform RRC-less SDT.
For example, the cells eligible for RRC-less SDT form a subset of the UE's RNA.
In an example implementation, one bit in the RANAC ID indicates if it is eligible for RRC-less SDT.
Alternatively, a bitmap is added to the RNA configuration including the indices within the current RNA list of cells/RANACs that support the RRC-less SDT approach.
In another example implementation, two RNAs are configured to the UE, where the additional RNA, on top of the legacy RNA, includes the cells/RANACs that support the RRC-less SDT approach.
According to at least some example embodiments, the RANAC ID of a cell, enabling the UE to determine whether it can perform RRC-based SDT or RRC-less SDT, is broadcasted in the SIB of the cell, and this is read by INACTIVE UEs (e.g. UEs in RCC_Inactive state) for RNA updates (see also
For example, one RANAC ID is represented by all cells of a DU (cloud deployment) or a gNB (classical deployment).
Option 3
The UE is provided by the network with a list of area identifiers which identifies the area within the RNA where it should use the RRC-less method. This can be a list of RANAC IDs, a list of Tracking Area IDs or a list of CAG IDs. Rationale for CAG IDs is that DU would typically connect to CU UPs associated with same slice in case of isolation.
Option 4
Any combination of the above options 1 to 3. To identify the area within the RNA where RRC-less can be used by the UE, the UE can be provided with a list of one of more RANAC ID(s), CAG ID(s), Tracking Area IDs, and cell IDs.
UP Integrity Protection (IP) Function at PDCP Transmitter for RRC-Less SDT
In one option, the UE is configured to enable UP IP for a PDU of an SDT-DRB, which is a DRB allowed to use SDT, if RRC-less SDT method is selected for transmitting the PDU and otherwise to disable UP IP (i.e. when RRC-based SDT method selected). To enable this option, two alternatives are proposed:
Alternative 1
The RRC layer of the UE sends an indication to the PDCP layer in the UE dynamically (e.g. on a per payload/PDU basis when SDT is triggered) relating to the selection of the RRC-less method, e.g. via an “IP UP enabled” indication.
Based on such indication, the PDCP UP IP function is applied accordingly when processing the PDU.
Alternative 2
Two paired DRBs are associated to an “SDT-DRB” (a DRB allowed to use SDT): a DRB1 configured without IP UP for RRC-based SDT method and a DRB2 configured with UP IP for RRC-less SDT.
The RRC layer of the UE sends an indication to e.g. the upper layer or the PDCP layer, to send a payload to the PDCP instance of DRB1 or DRB2 dynamically (e.g. on a per payload basis when SDT is triggered), based on the selection of the RRC method. If no indication, a default setting can be used (e.g. DRB2, UP IP enabled).
According to at least some example implementations of embodiment 1, the same UP IP setting is used to any UL SDT transmissions made within a given SDT procedure (e.g. in a multi-shot UL SDT procedure, which includes more than one UL SDT transmission).
According to at least some example implementations of embodiment 2, a UE is configured to fallback to select the RRC-based SDT method for SDT transmissions of the SDT-DRB to be initiated in a serving cell that belongs to a different gNB-CU-CP and/or different gNB-CU-UP (e.g. different gNB).
UE Determination of Different Serving qNB:
The UE determines a different serving gNB similar to the above options 1-4 of embodiment 1.
UP Integrity Protection (IP) Function at PDCP Transmitter for RRC-Based SDT
Similar as with embodiment 1, it is assumed that the UE is configured to enable UP IP for a PDU of the SDT-DRB if RRC-less SDT method is selected for transmitting the PDU and otherwise to disable UP IP (i.e. when RRC-based SDT method selected).
Alternative 1
The UE is configured with disabling the user-plane integrity protection (UP IP) for a PDU of the SDT-DRB if RRC-based SDT method is selected for transmitting the PDU.
The RRC layer of the UE sends an indication to the PDCP layer in the UE dynamically (e.g. on a per payload basis when SDT is triggered) relating to the selection of the RRC-based method, e.g. via an “IP UP disabled” indication.
Based on such indication, the PDCP UP IP function is disabled accordingly when processing the PDU.
Alternative 2
Alternative 2 of embodiment 2 is similar to alternative 2 of embodiment 1.
Further Option
The UE is configured to enable UP IP for the PDUs of the SDT-DRB for both RRC-less SDT and RRC-based SDT method, when both methods are used dynamically in the network. The RRC-less SDT solution brings dual performance benefits, namely signaling optimization and faster SDT packet delivery to PDCP at the receiver side, without the need of communication with the CU-CP. According to this further option, then also the RRC-based SDT solution is enhanced, using UP IP as well, which allows to avoid setting up a UE context at the gNB-DU before routing the PDU to PDCP (CU-UP) if stateless routing is performed by the DU as described later. In turn, it allows to obtain a faster SDT packet delivery to PDCP at the receiver side, without the need of communication with the CU-CP, similarly to the RRC-less method.
The key change is a network decision based on different factors including change of PDCP anchor point and number of packets (PDCP count). According to at least some example implementations of embodiment 3, the network side decides to assign new UP-IP and IP-Integration keys (e.g. KintUP) after a maximum number of SDT transmissions that re-used the same key. For this case, in response to an RRC-less-SDT uplink transmission, the gNB can indicate the UE to use a new key. For example, the gNB does this by sending NH (Next-Chain Hopping) count (NCC) value via e.g. an RRC message.
Alternative 1
According to alternative 1, in response to an RRC-less SDT transmission, the network sends an RRC message configuring the key change to be used for subsequent RRC-less SDTs. According to an example implementation, a message such as Msg4 as shown in procedure (a) in
Alternative 2
According to alternative 2, the UE is configured to switch to RRC-based SDT after performing N SDT transmissions or N SDT transactions, which enables the network to configure the key change via an RRC message. For example, the UE is configured to enable UP IP also for this RRC-based SDT transmission as the UL payload is to be processed by the same CU-UP (same PDCP instance), which is configured to perform UP IP validation, which will be described in more detail with reference to
In S901, UE 90 is in RRC_Connected state.
In S903, last serving gNB 92, which has served the UE 90 in RRC_Connected, transmits a message “RRC Release” with field “SuspendConfig” including SDT configuration. The SDT configuration includes information about a transmission method for SDT, e.g. an RRC method. For example, the information includes a list of cells allowed with RRC-less SDT method.
In S905, in response to step S903, the UE 90 has transitioned to RRC_Inactive state.
In S907, new payload appears in a buffer of UE 90 for an SDT-DRB and SDT procedure is triggered. RRC-less method is selected based on the serving cell and “UP IP enabled” indication is sent to PDCP.
In S909, the UE 90 performs SDT and transmits UL payload of the SDT-DRB with UP IP to the last serving gNB 92, according to the RRC-less SDT procedure.
As shown by S911, UP IP validation is enabled and performed at PDCP.
Besides, the last serving gNB 92 processes the UL payload, including UP IP validation, payload deciphering and forwarding to UPF.
In S913, the last serving gNB 92 sends an acknowledgment or suspend indication to UE 90.
In reaction to the suspend indication, in S915, the UE 90 has entered RRC_Inactive state.
In S917, the UE enters a new serving cell.
In S919, new payload appears in the buffer of UE 90 for the SDT-DRB and SDT procedure is triggered. RRC-based method is selected based on the serving cell and “UP IP disabled” indication is sent to PDCP.
In S921, the UE 90 performs SDT with an RRC Resume Request and UL payload of the SDT-DRB without UP IP to a new serving gNB 94, according to the RRC-based SDT procedure.
In steps S923 and S925, the new serving gNB 94 retrieves the UE context from the last serving gNB 92.
As shown by S927, no UP IP validation is enabled or performed at PDCP.
In step S929, the new serving gNB 94 sends a message RRC release with suspend indication, including fresh I-RNTI and NCC.
In response to receiving this message, in step S931 the UE 90 switches into RRC_Inactive state.
When RAN split architecture is considered, according to at least some example embodiments:
According to DU routing, assuming the above routing strategy, upon SDT transmission reception, the DU checks whether the RRC-less or RRC-based SDT method has been used by inspecting a received MAC PDU.
If the MAC PDU does not contain the RRCResumeRequest message (or alike RRC message for SDT), the DU extracts the PDCP PDU and tunnels it to the CU-UP by applying enhanced stateless routing (i.e. without establishing the UE context in the DU but simply routing the user plane part to CU UP directly (e.g. identifying the CU-UP using certain bits of the UE ID part of the I-RNTI).
If the MAC PDU does contain the RRCResumeRequest message (or alike RRC message for SDT), the DU extracts both the PDCP PDU and RRC message (the latter is sent to the CU-CP). The DU tunnels the PDCP PDU to the CU-UP using the baseline routing (i.e. establishing the UE context in the DU first, see
For example, for the case of embodiment 3, option 2, where RRC-based SDT is applied for security reasons despite the CU-UP being the same, the enhanced routing is applied also to such transmission. The CU-CP can instruct the DU to perform enhanced routing in its response to the DU.
With respect to UP Integrity protection (IP) verification function at the PDCP receiver side, the PDCP receiver is required to be aware of whether UP IP is enabled or not for a UE's DRB to properly configure the associated PDCP entity and process the PDUs. However, whether UP IP is applied or not at the PDCP instance corresponding to the UE's DRB in a given CU-UP is assumed to be a static setting here. Such setting can be configured by the RRC (CU-CP) to the PDCP (CP-UP) and can be based on the adopted RRC method to be used towards such CU-UP since the RRC-less SDT method implies UP IP, whereas the RRC-based SDT method implies no UP IP. In turn, such static setting on UP IP can be associated to the routing method used for routing the PDUs of the UE's DRB. It is noted that for a given CU-UP (PDCP) only one routing type can be used for a UE. Specifically, UP IP verification is applied for the UE's DRB at the last serving CU-UP of the UE, which uses stateless routing; on the contrary, no UP IP validation is configured for the UE's DRB in a newly established CU-UP for the UE, where the baseline routing is applied. We note also that after the current SDT procedure involving a new CU-UP is complete, such CU-UP becomes the last serving CU-UP and the next SDT procedure of the UE in the same CU-UP will be able to use the RRC-less SDT procedure, the stateless routing, and the UP IP validation. For the latter, after the current SDT procedure is complete, the new CU-UP needs to update the UP IP setting for the UE's DRB (i.e. to enable UP IP). This may need a PDCP re-establishment e.g. triggered by the CU-CP. Alternatively or additionally, the CU-CP indicates to the DU during F1 setup whether UP IP is enabled or not for a given UE.
Then, if UP IP validation is applied, the PDCP in the CU-UP performs deciphering and integrity verification of the PDCP Data PDU, and then forwards it to the UPF. Otherwise (if UP IP validation is not applied), the PDCP performs deciphering of the PDCP Data PDU, and then forwards it to the UPF.
As an additional aspect, the network configures the UE on whether UP IP is applied or not to a DL SDT transmission that is performed subsequently to the first UL SDT transmission.
Now reference is made to
The control unit 10 comprises processing resources (e.g. processing circuitry) 11, memory resources (e.g. memory circuitry) 12 and interfaces (e.g. interface circuitry) 13, which are coupled via a wired or wireless connection 14.
According to an example implementation, the memory resources 12 are of any type suitable to the local technical environment and are implemented using any suitable data storage technology, such as semiconductor based memory devices, magnetic memory devices and systems, optical memory devices and systems, fixed memory and removable memory. The processing resources 11 are of any type suitable to the local technical environment, and include one or more of general purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs) and processors based on a multi core processor architecture, as non limiting examples.
According to an implementation example, the memory resources 12 comprise one or more non-transitory computer-readable storage media which store one or more programs that when executed by the processing resources 11 cause the control unit 10 to execute process 1 or 2.
Further, as used in this application, the term “circuitry” refers to one or more or all of the following:
This definition of “circuitry” applies to all uses of this term in this application, including in any claims. As a further example, as used in this application, the term “circuitry” would also cover an implementation of merely a processor (or multiple processors) or portion of a processor and its (or their) accompanying software and/or firmware. The term “circuitry” would also cover, for example and if applicable to the particular claim element, a baseband integrated circuit or applications processor integrated circuit for a mobile phone or a similar integrated circuit in server, a cellular network device, or other network device.
In general, user equipments comprise, but are not limited to, mobile stations, cellular telephones, personal digital assistants (PDAs) having wireless communication capabilities, portable computers having wireless communication capabilities, image capture devices such as digital cameras having wireless communication capabilities, gaming devices having wireless communication capabilities, music storage and playback appliances having wireless communication capabilities, Internet appliances permitting wireless Internet access and browsing, as well as portable units or terminals that incorporate combinations of such functions.
According to at least some example embodiments, a user equipment for use in a cellular communication system is provided. The user equipment comprises means for determining a triggering of a small data transmission in an inactive state of the user equipment, means for selecting a first transmission method or a second transmission method for performing the small data transmission at least based on a cell of the cellular communication system in which the small data transmission is to be performed by the user equipment, and means for performing the small data transmission using the selected first or second transmission method.
According to at least some example embodiments, the first transmission method is based on a radio resource control, RRC, protocol and the second transmission method is not based on the RRC protocol.
According to at least some example embodiments, the means for selecting comprises means for detecting whether or not the cell in which the small data transmission is to be performed by the user equipment is controlled by a last serving node, wherein the last serving node is a node of an access network of the cellular communication system, which served the user equipment before it transited to the inactive state, and means for, in case the cell is controlled by the last serving node, selecting the second transmission method, and in case the cell is not controlled by the last serving node, selecting the first transmission method.
According to at least some example embodiments, the use equipment further comprises means for acquiring information of cells or areas of the cellular communication system, wherein the information indicates that, for the small data transmission, the first or second transmission method is to be applied in the cells or areas, and means for referring to the information for selecting the first or second transmission method.
According to at least some example embodiments, the information indicates the cells or areas of the cellular communication system, which are controlled by a last serving node, wherein the last serving node is a node of an access network of the cellular communication system, which served the user equipment before it transited to the inactive state.
According to at least some example embodiments, the means for acquiring comprises at least one out of the following:
According to at least some example embodiments, at least one out of the following applies:
According to at least some example embodiments, the means for selecting comprises means for detecting whether or not the cell in which the small data transmission is to be performed by the user equipment is comprised in the information on areas acquired by the user equipment, and means for, in case the cell is comprised in the information of areas, selecting the second transmission method, and in case the cell is not comprised in the information on areas acquired by the user equipment, selecting the first transmission method.
According to at least some example embodiments, the user equipment further comprises means for deciding, at least based on the selected first or second transmission method, whether or not to use a protection function which protects data integrity for a data radio bearer associated with the small data transmission.
According to at least some example embodiments, the means for deciding comprises means for deciding also based on an instruction acquired from the cellular communication system, whether or not to use the protection function.
According to at least some example embodiments, the user equipment further comprises means for sending an indication from a radio resource control, RRC, protocol layer of the user equipment to a packet data convergence protocol, PDCP, layer of the user equipment, to apply or not apply the protection function based on a decision whether or not to use the protection function.
According to at least some example embodiments, the user equipment further comprises means for, based on a decision whether or not to use the protection function,
According to at least some example embodiments, the means for sending comprises:
According to at least some example embodiments, the means for deciding comprises at least one of the following:
According to at least some example embodiments, the user equipment further comprises:
According to at least some example embodiments, an apparatus for use in a cellular communication system is provided. The apparatus comprises means for providing information of cells or areas of the cellular communication system, wherein the information indicates that, for a small data transmission to be performed by a user equipment in case the user equipment is in an inactive state, a first or second transmission method is to be applied in the cells or areas.
According to at least some example embodiments, the apparatus is a serving node of an access network of the cellular communication system, which controls the cell.
According to at least some example embodiments, the apparatus comprises a distributed unit and a centralized unit.
According to at least some example embodiments, the second transmission method comprises stateless routing between the distributed unit and the centralized unit.
According to at least some example embodiments, the means for providing comprises at least one of the following:
According to at least some example embodiments, at least one out of the following applies:
According to at least some example embodiments, the apparatus further comprises means for providing an instruction to the user equipment whether or not to use a protection function which protects data integrity for a data radio bearer associated with the small data transmission.
According to at least some example embodiments, the instruction is associated with the first or second transmission method which is to be applied in the cells or areas.
According to at least some example embodiments, the apparatus further comprises:
It is to be understood that the above description is illustrative of the invention and is not to be construed as limiting the invention. Various modifications and applications may occur to those skilled in the art without departing from the true spirit and scope of the invention as defined by the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
202041046087 | Oct 2020 | IN | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2021/068797 | 7/7/2021 | WO |