The disclosure relates generally to wireless communications, including but not limited to systems and methods for mobile node inter-CU migration.
In the 5th Generation (5G) New Radio (NR) mobile networks, a user equipment (UE) can communicate with or access one or more nodes (e.g., access nodes) within a network. The UE can access the access node via a respective access link. At least one node among various access nodes may include a wired connection to a core network. The UE may connect directly to the node with a wired connection for fiber transport. The UE may connect and transmit data to an access node, where the access node can forward the data to a donor node via a wireless backhaul link. The donor node can include the wired connection to the core network for data communication.
The example embodiments disclosed herein are directed to solving the issues relating to one or more of the problems presented in the prior art, as well as providing additional features that will become readily apparent by reference to the following detailed description when taken in conjunction with the accompany drawings. In accordance with various embodiments, example systems, methods, devices and computer program products are disclosed herein. It is understood, however, that these embodiments are presented by way of example and are not limiting, and it will be apparent to those of ordinary skill in the art who read the present disclosure that various modifications to the disclosed embodiments can be made while remaining within the scope of this disclosure.
At least one aspect is directed to a system, method, apparatus, or a computer-readable medium. A first network node can send configuration information to a second network node. The configuration information can be associated with a mobile node transitioning from a source node to a target node.
In some implementations, the first network node can include the source node, and the second network node can include the target node. In some cases, the first network node may include the target node, and the second network node may include the source node. In some cases, the first network node can include the mobile node, and the second network node can include the source node or the target node. In some other cases, the first network node may include the source node or the target node, and the second network node may include the mobile node.
In some implementations, the source node may send, to the target node, at least one of: an identity (ID) of the mobile node, an indication of the mobile node that is to access the target node, a speed of the mobile node, a capability of the mobile node to support maintaining a F1 control plane (F1-C) connection of the mobile node at a particular network node that is different from that at which a F1 user plane (F1-U) tunnel of the mobile node is being maintained, or an indication that the F1-C connection of the mobile node is to be maintained at a centralized unit control plane (CU-CP) of the source node or a previous node, and a F1-U tunnel of the mobile node is to be maintained at a centralized unit user plane (CU-UP) of the target node, when the mobile node transitions from the source node to access the target node.
In some cases, the source node may receive, from the mobile node, at least one of: at least one of: a transport layer address for F1 or non-F1 traffic communication, at least one of: a downlink transport layer address, or a downlink tunnel endpoint identifier (TEID) associated with each general packet radio service (GPRS) tunneling protocol (GTP) tunnel, or at least one of: an IP security (IP-SEC) transport layer address, or a GTP transport layer address associated with the IP-SEC transport layer address. In some cases, the source node may receive an indication of successful access of the target node by the mobile node from the target node.
In some implementations, the source node may send an Xn application protocol (XnAP) message comprising first information to the target node. In some cases, the first information may include at least one of: an identity (ID) of the mobile node, an indication that the mobile node is able to move, an identity of a user equipment (UE), a list of protocol data unit (PDU) session resources to be setup, a downlink transport layer address, a downlink tunnel endpoint identifier (TEID) associated to each general packet radio service (GPRS) tunneling protocol (GTP) tunnel, a capability of the mobile node to support maintaining a F1 control plane (F1-C) connection of the mobile node at a particular network node that is different from that at which a F1 user plane (F1-U) tunnel of the mobile node is being maintained, or an indication that the F1-C connection of the mobile node is to be maintained at a centralized unit control plane (CU-CP) of the source node or a previous node, and a F1-U tunnel of the mobile node is to be maintained at a centralized unit user plane (CU-UP) of the target node, when the mobile node transitions from the source node to access the target node.
In some implementations, a centralized unit control plane (CU-CP) of the target node may send, to a centralized unit user plane (CU-UP) of the target node, at least one of: an identity (ID) of the mobile node, an indication that the mobile node is able to move, a capability of the mobile node to support maintaining a F1 control plane (F1-C) connection of the mobile node at a particular network node that is different from that at which a F1 user plane (F1-U) tunnel of the mobile node is being maintained, or an indication that the F1-C connection of the mobile node is to be maintained at the CU-CP of the source node or a previous node, and the F1-U tunnel of the mobile node is to be maintained at the CU-UP of the target node, when the mobile node transitions from the source node to access the target node. In some cases, the particular network node may include: the source node, the target node, or a previous node.
In some implementations, the source node may receive, from the target node, at least one of: an identity (ID) of the mobile node, an ID of a user equipment (UE), at least one of: data radio bearer (DRB) information, information on flows mapped to DRB, or uplink transport network layer (TNL) information of each F1 user plane (F1-U) tunnel, at least one of: a list of protocol data unit (PDU) session resources to be switched in downlink, a PDU session ID, a downlink next generation (NG) user plane interface (NG-U) user plane (UP) TNL information, or a list of quality-of-service (QOS) flow accepted, or an ID of a centralized unit user plane (CU-UP) of the target node.
In some implementations, the source node can send, to a network function or entity of a core network, at least one of: an identity (ID) of the mobile node, an indication that the mobile node is able to move, an ID of a user equipment (UE), at least one of: a list of protocol data unit (PDU) session resources to be switched in downlink, a PDU session ID, a downlink next generation (NG) user plane interface (NG-U) user plane (UP) TNL information, or a list of quality-of-service (QOS) flow accepted, an indication that a F1 control plane (F1-C) connection of the mobile node is to be maintained at a centralized unit control plane (CU-CP) of the source node or a previous node, and a F1-U tunnel of the mobile node is to be maintained at a centralized unit user plane (CU-UP) of the target node, when the mobile node transitions from the source node to access the target node, or an ID of the CU-UP of the target node.
In some cases, the CU-CP of the target node may send to the CU-UP of the target node at least one of: an identity (ID) of the mobile node, an ID of a user equipment (UE), at least one of: downlink transport layer address, or a tunnel endpoint identifier (TEID) associated to each general packet radio service (GPRS) tunneling protocol (GTP) tunnel, a protocol data unit (PDU) session ID, or an uplink next generation (NG) user plane interface (NG-U) user plane (UP) TNL information. In some cases, the source node may send an identity of a node that the mobile node initially accessed, or an identity of a node at which a F1 control plane interface (F1-C) of the mobile node is terminated to the target node. In some cases, the node may receive an indication of successful access of the target node by the mobile node from the target node.
In some implementations, the source node can receive an Xn application protocol (XnAP) message to release context related to the mobile node or a wireless communication device from a previous node. The previous node may include a node that the mobile node initially accessed, or a node at which a F1 control plane interface (F1-C) of the mobile node is terminated. In some cases, the target node may send to the source node to release the context related to the mobile node or a wireless communication device.
In some implementations, the source node may send to a previous node at least one of: an indication that the mobile node has accessed the target node, or an identity of the target node. The previous node may include a node that the mobile node initially accessed, or a node at which a F1 control plane interface (F1-C) of the mobile node is terminated.
At least one aspect is directed to a system, method, apparatus, or a computer-readable medium. A second network node can receive configuration information from a first network node. The configuration information may be associated with a mobile node transitioning from a source node to a target node.
At least one aspect is directed to a system, method, apparatus, or a computer-readable medium. A first network node can send information to a second network node. The information may include a capability of the first network node to support maintaining a F1 control plane (F1-C) connection of a third node at a fourth network node that is different from that at which a F1 user plane (F1-U) tunnel of the third node is being maintained.
In some cases, at least one of: the first network node may include a centralized unit user plane (CU-UP) of a radio access network (RAN) node, and the second network node may include a centralized unit control plane (CU-CP) of the RAN node, the first network node may include a CU-CP of the RAN node, and the second network node may include a network function or entity of a core network, the third node may include a mobile node, fourth node may include the first network node or the second network node, or fourth node may be different from the first network node and the second network node.
In some implementations, the first or second node can receive a first capability of the third network node from the third network node. In some cases, the first capability can include a capability to support maintaining a F1 control plane (F1-C) tunnel of the third node at a particular network node that is different from that at which a F1 user plane (F1-U) tunnel of the third node is being maintained. In some implementations, receiving the first capability of the third node can include receiving the first capability via a radio resource control (RRC) message or a F1 application protocol (F1AP) message.
Various example embodiments of the present solution are described in detail below with reference to the following figures or drawings. The drawings are provided for purposes of illustration only and merely depict example embodiments of the present solution to facilitate the reader's understanding of the present solution. Therefore, the drawings should not be considered limiting of the breadth, scope, or applicability of the present solution. It should be noted that for clarity and ease of illustration, these drawings are not necessarily drawn to scale.
For example, the BS 102 may operate at an allocated channel transmission bandwidth to provide adequate coverage to the UE 104. The BS 102 and the UE 104 may communicate via a downlink radio frame 118, and an uplink radio frame 124 respectively. Each radio frame 118/124 may be further divided into sub-frames 120/127 which may include data symbols 122/128. In the present disclosure, the BS 102 and UE 104 are described herein as non-limiting examples of “communication nodes,” generally, which can practice the methods disclosed herein. Such communication nodes may be capable of wireless and/or wired communications, in accordance with various embodiments of the present solution.
System 200 generally includes a base station 202 (hereinafter “BS 202”) and a user equipment device 204 (hereinafter “UE 204”). The BS 202 includes a BS (base station) transceiver module 210, a BS antenna 212, a BS processor module 214, a BS memory module 216, and a network communication module 218, each module being coupled and interconnected with one another as necessary via a data communication bus 220. The UE 204 includes a UE (user equipment) transceiver module 230, a UE antenna 232, a UE memory module 234, and a UE processor module 236, each module being coupled and interconnected with one another as necessary via a data communication bus 240. The BS 202 communicates with the UE 204 via a communication channel 250, which can be any wireless channel or other medium suitable for transmission of data as described herein.
As would be understood by persons of ordinary skill in the art, system 200 may further include any number of modules other than the modules shown in
In accordance with some embodiments, the UE transceiver 230 may be referred to herein as an “uplink” transceiver 230 that includes a radio frequency (RF) transmitter and a RF receiver each comprising circuitry that is coupled to the antenna 232. A duplex switch (not shown) may alternatively couple the uplink transmitter or receiver to the uplink antenna in time duplex fashion. Similarly, in accordance with some embodiments, the BS transceiver 210 may be referred to herein as a “downlink” transceiver 210 that includes a RF transmitter and a RF receiver each comprising circuitry that is coupled to the antenna 212. A downlink duplex switch may alternatively couple the downlink transmitter or receiver to the downlink antenna 212 in time duplex fashion. The operations of the two transceiver modules 210 and 230 may be coordinated in time such that the uplink receiver circuitry is coupled to the uplink antenna 232 for reception of transmissions over the wireless transmission link 250 at the same time that the downlink transmitter is coupled to the downlink antenna 212. Conversely, the operations of the two transceivers 210 and 230 may be coordinated in time such that the downlink receiver is coupled to the downlink antenna 212 for reception of transmissions over the wireless transmission link 250 at the same time that the uplink transmitter is coupled to the uplink antenna 232. In some embodiments, there is close time synchronization with a minimal guard time between changes in duplex direction.
The UE transceiver 230 and the base station transceiver 210 are configured to communicate via the wireless data communication link 250, and cooperate with a suitably configured RF antenna arrangement 212/232 that can support a particular wireless communication protocol and modulation scheme. In some illustrative embodiments, the UE transceiver 210 and the base station transceiver 210 are configured to support industry standards such as the Long Term Evolution (LTE) and emerging 5G standards, and the like. It is understood, however, that the present disclosure is not necessarily limited in application to a particular standard and associated protocols. Rather, the UE transceiver 230 and the base station transceiver 210 may be configured to support alternate, or additional, wireless data communication protocols, including future standards or variations thereof.
In accordance with various embodiments, the BS 202 may be an evolved node B (eNB), a serving eNB, a target eNB, a femto station, or a pico station, for example. In some embodiments, the UE 204 may be embodied in various types of user devices such as a mobile phone, a smart phone, a personal digital assistant (PDA), tablet, laptop computer, wearable computing device, etc. The processor modules 214 and 236 may be implemented, or realized, with a general purpose processor, a content addressable memory, a digital signal processor, an application specific integrated circuit, a field programmable gate array, any suitable programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof, designed to perform the functions described herein. In this manner, a processor may be realized as a microprocessor, a controller, a microcontroller, a state machine, or the like. A processor may also be implemented as a combination of computing devices, e.g., a combination of a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a digital signal processor core, or any other such configuration.
Furthermore, the steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in firmware, in a software module executed by processor modules 214 and 236, respectively, or in any practical combination thereof. The memory modules 216 and 234 may be realized as RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, a hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. In this regard, memory modules 216 and 234 may be coupled to the processor modules 210 and 230, respectively, such that the processors modules 210 and 230 can read information from, and write information to, memory modules 216 and 234, respectively. The memory modules 216 and 234 may also be integrated into their respective processor modules 210 and 230. In some embodiments, the memory modules 216 and 234 may each include a cache memory for storing temporary variables or other intermediate information during execution of instructions to be executed by processor modules 210 and 230, respectively. Memory modules 216 and 234 may also each include non-volatile memory for storing instructions to be executed by the processor modules 210 and 230, respectively.
The network communication module 218 generally represents the hardware, software, firmware, processing logic, and/or other components of the base station 202 that enable bi-directional communication between base station transceiver 210 and other network components and communication nodes configured to communication with the base station 202. For example, network communication module 218 may be configured to support internet or WiMAX traffic. In a typical deployment, without limitation, network communication module 218 provides an 802.3 Ethernet interface such that base station transceiver 210 can communicate with a conventional Ethernet based computer network. In this manner, the network communication module 218 may include a physical interface for connection to the computer network (e.g., Mobile Switching Center (MSC)). The terms “configured for,” “configured to” and conjugations thereof, as used herein with respect to a specified operation or function, refer to a device, component, circuit, structure, machine, signal, etc., that is physically constructed, programmed, formatted and/or arranged to perform the specified operation or function.
The Open Systems Interconnection (OSI) Model (referred to herein as, “open system interconnection model”) is a conceptual and logical layout that defines network communication used by systems (e.g., wireless communication device, wireless communication node) open to interconnection and communication with other systems. The model is broken into seven subcomponents, or layers, each of which represents a conceptual collection of services provided to the layers above and below it. The OSI Model also defines a logical network and effectively describes computer packet transfer by using different layer protocols. The OSI Model may also be referred to as the seven-layer OSI Model or the seven-layer model. In some embodiments, a first layer may be a physical layer. In some embodiments, a second layer may be a Medium Access Control (MAC) layer. In some embodiments, a third layer may be a Radio Link Control (RLC) layer. In some embodiments, a fourth layer may be a Packet Data Convergence Protocol (PDCP) layer. In some embodiments, a fifth layer may be a Radio Resource Control (RRC) layer. In some embodiments, a sixth layer may be a Non Access Stratum (NAS) layer or an Internet Protocol (IP) layer, and the seventh layer being the other layer.
Various example embodiments of the present solution are described below with reference to the accompanying figures to enable a person of ordinary skill in the art to make and use the present solution. As would be apparent to those of ordinary skill in the art, after reading the present disclosure, various changes or modifications to the examples described herein can be made without departing from the scope of the present solution. Thus, the present solution is not limited to the example embodiments and applications described and illustrated herein. Additionally, the specific order or hierarchy of steps in the methods disclosed herein are merely example approaches. Based upon design preferences, the specific order or hierarchy of steps of the disclosed methods or processes can be re-arranged while remaining within the scope of the present solution. Thus, those of ordinary skill in the art will understand that the methods and techniques disclosed herein present various steps or acts in a sample order, and the present solution is not limited to the specific order or hierarchy presented unless expressly stated otherwise.
In certain systems (e.g., 5G new radio (NR), Next Generation (NG) systems, 3GPP systems, and/or other systems), such as in comparison to long-term evolution (LTE), NR may include/have a larger available bandwidth. The utilization of massive multiple-input/multiple-output (MIMO) and multi-beam facilitates and enables the research and application/integration/adoption of integrated access and backhaul links (IAB). The use of backhaul links and/or relay links can increase/enhance/improve the flexibility of dense NR cell networks deployment, without a need or requirement to increase the dense deployment of transmission networks.
Referring to
In this example, a wired connection may be provided/included/implemented between the access node A (e.g., node 302A) and a core network, and the access nodes B and C may not include or be implemented with a wired connection with the core network element. In this case, the access node that supports the wireless access of the UE 104 and/or transmits data/information wirelessly may include, correspond to, or be referred to as an IAB node. The access node providing the wireless backhaul feature/function for the IAB node, such that the UE 104 can connect to and/or communicate with the core network (e.g., via fiber transport), may be called/referred to as an IAB donor (e.g., sometimes referred to generally as donor node or network node). In this example, access node A may be a donor node providing access to the core network to one or more UEs 104 accessing access nodes A or B.
The UE 104 can transmit data between the access nodes (e.g., node B to node A or node C to node A) through the wireless backhaul link. For example, the access node B may provide/transmit/send the data/information received/obtained/acquired from the UE 104 to the access node A through a wireless backhaul link (e.g., a first wireless backhaul link). The access node A, responsive to receiving the data from the access node B, can send/transmit the UE data to the core network element via fiber transport or the wired connection. For the downlink, the core network element may send the UE data packet (e.g., response packet or downlink packet) to the access node A. The access node A may receive the UE data from the core network. Responsive to the reception, the access node A can transmit the UE data to the access node B coupled to the UE 104 via/through the wireless backhaul link. Accordingly, the access node B can provide/send/transmit the UE data through the access link to the respective UE 104.
In certain systems, it may be challenging to satisfy/meet/accomplish the increasing demand for improvement in 5G cellular coverage, such as in outdoor and mobility scenarios. For example, in certain environments, the vehicles or mobile platforms may be equipped with mobile BS relays. The mobile platform may follow a certain known/predictable/predetermined/fixed itinerary/route/positioning (e.g., buses, trains, etc.), and/or situated in convenient/accessible locations (e.g., outside stadiums, hot-spot areas, or emergency sites, among others). Hence, the availability of the mobile platform equipped with the mobile BS relays can provide a boost in cellular coverage, capacity, and/or bandwidth at locations/positions or during a predetermined timeframe desired/needed.
The relays, such as using wireless backhaul toward the macro network, may offer improved network coverage and connectivity to neighboring UEs 104. The IAB-node (e.g., network node) can forward/transmit/send data by using wireless backhaul toward the macro network. Hence, mobile-IAB (or VMR-nodes), e.g., mounted on one or more mobile platforms, can be utilized/leveraged/implemented/adopted to provide coverage/capacity enhancement to onboard (e.g., the mobile platform) and/or surrounding UEs 104. Accordingly, the systems and methods of the technical solution discussed herein can provide one or more features, functionalities, operations, and/or mechanisms to enable mobile-IAB migration between donor-centralized units (CUs). The systems and methods can include IAB topology as described herein, such as in conjunction with at least
Referring to
Further,
Referring to
Referring now to
In some cases, the mobile IAB-node may report/share/provide/send its capabilities to the CU on the CU-UP sharing migration via radio resource control (RRC) message or F1 application protocol (F1AP) message. The IAB-donor CU-UP may indicate/provide/send to the IAB-donor CU-CP its capability (or the capability of the mobile IAB-node) on the CU-UP sharing migration over E1 interface. The IAB-donor CU-CP can send CU-UP sharing migration capability to a network function or entity of a core network.
At step 1, the mobile IAB-MT (e.g., similar to UE 104, sometimes referred to as mobile MT) can send a MeasurementReport message to the source parent node IAB-DU (e.g., source node DU). The report can be based on a measurement configuration that the mobile MT previously/historically received from the IAB-donor-CU 1. In some cases, the source node can include or correspond to a previous or most recent node connected by the mobile node. In some implementations, the IAB-node 1 may be a source node that the mobile node migrated from. At step 2, the source parent node IAB-DU may send a UL RRC message transfer message to the IAB-donor-CU 1 to convey the received MeasurementReport.
At step 3, the source IAB-donor-CU (e.g., the CU portion of the source node) can send/transmit/provide/indicate an XnAP message to the target IAB-donor-CU (e.g., CU portion of a target node). The target node can refer to the node that the mobile node is establishing/connecting to. The XnAP message may include at least one of an identity (ID) of the mobile node, itinerary (e.g., route, path, navigation, etc.) and/or speed (e.g., velocity, acceleration, etc.) of the mobile node (e.g., or the mobile platform including the mobile node), an indication that the mobile node is able to move/traverse/change position (e.g., indicated in the specification), CU-UP share indication, and/or IP address request for each usage for the mobile node.
The identity of the mobile node can be used to indicate/determine/identify the target donor-CU to be established/connected/accessed by the mobile node. The CU-UP shared indication can be used to indicate target IAB-donor CU that the F1-C connection is kept/maintained/established at source donor CU-CP and the F1-U tunnel is terminated/established/maintained at target donor CU-UP. The individual usages for the mobile node indicated/defined/provided can include or correspond to all traffic, F1-U, F1-C, and/or non-F1. Each usage of IP address request may include the number of requested IP address(es) and/or the type of requested IP address(es) (e.g., IPv4, IPv6/IPV6 prefix). In some cases, the IP address or IP prefix of the mobile IAB-node may be allocated by the source IAB-donor-CU.
At step 4, the target IAB-donor-CU may send/transmit/provide/indicate a UE CONTEXT SETUP REQUEST message to the target parent node IAB-DU to create the UE context for the migrating/switching/transferring IAB-MT and set up one or more bearers. The one or more bearers can be used by the migrating IAB-MT for its own signaling. In some cases, the one or more bearers can be used for the data traffic.
At step 5, the target parent node IAB-DU can respond to the target IAB-donor-CU (e.g., CU-CP) with a UE CONTEXT SETUP RESPONSE message. At step 6, the target IAB-donor-CU can perform/initiate/execute an admission control and provide/send/transmit a new RRC configuration as part of the XnAP message. Target donor-CU can send the XnAP message to source donor-CU, which may include a list of cells served by the BS 102 (e.g., gNB or wireless communication node), such as NR-PCI and/or NR CGI of each cell.
At step 7, the source IAB-donor-CU may send a UE CONTEXT MODIFICATION REQUEST message to the source parent node IAB-DU. This message may include/contain the received RRCReconfiguration message from the target IAB-donor-CU.
At step 8, the source parent node IAB-DU (e.g., DU of IAB-node 1) may forward/transmit/provide the received RRCReconfiguration message to the mobile IAB-MT (e.g., MT portion of the mobile node). Responsive to or subsequent to receiving the RRCReconfiguration message, the mobile IAB-node may report information to the source IAB-donor-CU. The information may include at least one of: F1-C and/or non-F1 IP address(es) (e.g., the IP address(es) may be used at the mobile node), DL transport layer address and/or DL tunnel endpoint identifier (TEID) associated to each general packet radio service (GPRS) tunneling protocol (GTP)-tunnel, and/or IP-Sec transport layer address and/or the associated GTP transport layer address (e.g., if IPsec is used).
At step 9, the source parent node IAB-DU can respond to the source IAB-donor-CU with the UE CONTEXT MODIFICATION RESPONSE message. At step 10, the mobile IAB-MT can perform a random access procedure. At step 11, the mobile IAB-MT can respond to the target parent node IAB-DU with an RRCReconfigurationComplete message.
At step 12, the target parent node IAB-DU may send a UL RRC MESSAGE TRANSFER message to the target IAB-donor-CU to convey/indicate/notify/alert the received RRCReconfigurationComplete message. Responsive to receiving the RRCReconfigurationComplete message, target CU-CP (e.g., CU-CP portion of the target node) may send an indication to source CU-CP (e.g., CU-CP portion of the source node). The indication can be used to inform the source CU-CP of the successful access of mobile IAB-node (e.g., the indication of successful access of the target node by the mobile node).
At step 13, the source IAB-donor-CU can send an XnAP message to the target IAB-donor-CU. The message can include, be, or correspond to a UE-associated message or a non-UE-associated message. The message can include information including at least one of: mobile node identity, UE identity, protocol data unit (PDU) session resources (e.g., a list of session resources) to be set up, DL transport layer address, DL TEID associated with each GTP-tunnel, and/or a CU-UP share indication. The CU-UP share indication can be used to indicate target IAB-donor CU that the F1-C connection is kept/maintained/established at source donor CU-CP and the F1-U tunnel is terminated/maintained at target donor CU-UP.
At step 14, the target CU-CP (e.g., CU-CP of the target node) can request the target CU-UP (e.g., CU-UP of the target node) to set up context for the one or more UEs 104 accessed/connected/coupled to the mobile node over the E1 interface. For example, the target CU-CP may send/indicate to the target CU-UP at least one of: an ID of the mobile node, an indication that the mobile node is able to move, a capability of the mobile node to support maintaining an F1-C connection of the mobile node at a particular network node that is different from that at which an F1-U tunnel of the mobile node is being maintained, and/or an indication that the F1-C connection of the mobile node is to be maintained at the CU-CP of the source node or a previous node, and the F1-U tunnel of the mobile node is to be maintained at the CU-UP of the target node, when the mobile node transitions from the source node to access the target node. For example, the F1-U tunnel of the mobile node is being maintained at a third node, the particular node may include or correspond to one of at least a first node, a second node, a fourth node, etc. The target CU-UP may respond to the target CU-CP to confirm the setup of the requested bearer context over the E1 interface.
At step 15, the target CU-CP can send an XnAP message to source CU-CP. The XnAP message can include at least one of a UE identity, mobile node identity, at least one of: data radio bearer (DRB) information, information on flows mapped to DRB, and/or UL transport network layer (TNL) information of each F1-U tunnel, at least one of: a list of protocol data unit (PDU) session resource(s) to be switched/migrated in DL, PDU session ID, DL next generation (NG) user plane interface (NG-U) user plane (UP) TNL Information, and/or a list of quality-of-service (QOS) flow accepted, and/or an ID of a centralized unit user plane (CU-UP) of the target node.
At step 16, the target IAB-donor-CU may configure backhaul (BH) RLC channels and backhaul adaptation protocol (BAP)-sublayer routing entries on the target path between the target parent IAB-node and target IAB-donor-DU and/or DL mappings on the target IAB-donor-DU for migrating IAB-node's target path. At step 17, the F1-C connections may be switched to use the new TNL address(es) of the mobile node.
At step 18, source IAB-donor-CU can send/transmit/provide UE CONTEXT MODIFICATION REQUEST message(s) to mobile node to update the UL BH information, UL TNL address, and/or in some cases, tunnel endpoint identifier (TEID) associated with each GTP-tunnel. One or more (or all) F1-U tunnels can be switched to utilize the mobile IAB-node's new TNL address(es). In some cases, the mobile IAB-node may update the DL transport layer address and/or DL TEID associated with each GTP-tunnel. The mobile node may report DL transport layer address and/or DL TEID associated with each GTP-tunnel to the source donor CU-CP.
At step 19, the source IAB-donor-CU may send a new generation application protocol (NGAP) message to 5GC (e.g., a network function or entity of a core network). The message may include at least one of: an identity (ID) or indication of the mobile node, UE ID, an indication that the mobile node is able to move, at least one of: a list of protocol data unit (PDU) session resources to be switched in downlink, a PDU session ID, a DL NG user plane interface (NG-U) user plane (UP) TNL information, and/or a list of QoS flow accepted, an indication that an F1 control plane (F1-C) connection of the mobile node is to be maintained/kept at a centralized unit control plane (CU-CP) of the source node or a previous node (e.g., most recent node) (e.g., source donor CU-CP), and/or an F1-U tunnel of the mobile node is to be maintained/terminated at a CU-UP of the target node (e.g., target donor CU-UP), when the mobile node transitions from the source node to access the target node, and/or an ID of the CU-UP of the target node.
At step 20, the 5GC can respond to source CU-CP with an NGAP message. The NGAP message may include at least one of: mobile node ID, UE ID, PDU session ID, and/or UL NG-U UP TNL information, among others. At step 21, the source CU-CP may send DL transport layer address and/or DL TEID associated with each GTP-tunnel to the target CU-CP over Xn interface. In some cases, the source CU-CP may send the information (e.g., NGAP message information) from 5GC to the target CU-CP over.
At step 22, the target CU-CP may send/provide/transmit, to the target CU-UP over E1 interface, at least one of: an ID of the mobile node, UE ID, at least one of: downlink transport layer address, and/or TEID associated with each GTP tunnel, PDU session ID, and/or UL NG-U UP TNL information. At step 23, a bearer context release procedure may be performed by the source node (e.g., source donor CU or between CU-CP and CU-UP portions of the source node) to release UE context at source CU-UPs. The source IAB-donor-CU may release BH RLC channels and/or BAP-sublayer routing entries on the source path between source parent IAB-node and source IAB-donor-DU.
In some implementations,
In some implementations, as described in conjunction with
The one or more steps/process/procedures/operations discussed herein (e.g., steps of implementation 3) for migrating the mobile node (e.g., mobile IAB-node) to one or more donors may be similar to one or more steps of implementation 2, as described in conjunction with
At step 3, IAB-donor-CU 2 can send an XnAP message to the IAB-donor-CU 3. In this case, the XnAP message may include at least one of: mobile node indication/identity (ID), itinerary and/or speed of the mobile node, IP address request for each usage for the mobile node, and/or the ID of the IAB-donor-CU (e.g., a first donor) that the mobile IAB-MT (e.g., mobile node) first accessed, or the F1-C of the mobile IAB-MT terminated to.
At step 4, the IAB-donor-CU 3 can send/provide/transmit a UE CONTEXT SETUP REQUEST message to the target parent node IAB-DU (e.g., IAB-DU 3), such as to create the UE context for the migrating IAB-MT and set up one or more bearers. At step 5, the target parent node IAB-DU may respond to the IAB-donor-CU 3 with a UE CONTEXT SETUP RESPONSE message. At step 6, the IAB-donor-CU 3 may perform/execute an admission control and provide the new RRC configuration as part of the XnAP message. Donor-CU 3 may send the XnAP message to donor-CU 2.
At step 7, the IAB-donor-CU 2 may send a UE CONTEXT MODIFICATION REQUEST message to the source parent node IAB-DU. This message may include the received RRCReconfiguration message from the IAB-donor-CU 3. At step 8, the source parent node IAB-DU can forward the received RRCReconfiguration message to the mobile IAB-MT. Responsive to receiving the RRCReconfiguration message, the mobile IAB-node may report to the IAB-donor-CU 1 at least one information of the one or more information similar to step 8, such as described in implementation 2.
At step 9, the source parent node IAB-DU can respond to the IAB-donor-CU 2 with the UE CONTEXT MODIFICATION RESPONSE message. Steps 10-11 may include one or more features or operations similar to steps 10-11 as described in conjunction with
At step 13, the IAB-donor-CU 1 may provide/send an XnAP message to the IAB-donor-CU 3. The message may include one or more information (or a subset of information) similar to the XnAP message of step 13 described in conjunction with
At step 14, the IAB-donor 3 CU-CP can request its CU-UP to set up context for the UEs accessed to the mobile IAB-node over E1 interface. The mobile IAB-node identity may be sent, such as along with the request. Responsive to sending the request and/or the mobile node ID, the CU-UP can respond to the IAB-donor 3 CU-CP to confirm the setup of the requested bearer context over E1 interface. This step may include one or more operations, procedures, or information similar to or as described in step 14 in conjunction with
At step 15, the IAB-donor 3 CU-CP can send an XnAP message to the IAB-donor 1 CU-CP. In this case, the XnAP message may include at least one information of the information described in step 15 in conjunction with
At step 18, the IAB-donor-CU 1 can perform one or more features, processes, or operations similar to step 18 as described in conjunction with
At step 20, the 5GC may respond to the IAB-donor 1 CU-CP with an NGAP message, including at least one of: mobile node indication, UE ID, PDU Session ID, and/or UL NG-U UP TNL information. At step 21, the IAB-donor 1 CU-CP may send DL transport layer address and/or DL TEID associated with each GTP-tunnel, and in some cases, the information from 5GC (e.g., from step 20), to IAB-donor 3 CU-CP over Xn interface.
At step 22, the IAB-donor 3 CU-CP may send, to its CU-UP over E1 interface, at least one of the information similar to information of step 22 described in conjunction with
In some implementations, as described in conjunction with
The one or more steps/process/procedures/operations discussed herein (e.g., steps of implementation 3) for migrating the mobile node (e.g., mobile IAB-node) to one or more donors may be similar to one or more steps of at least one of implementation 2, as described in conjunction with
At step 3, IAB-donor-CU 2 can send an XnAP message to the IAB-donor-CU 3. In this case, the XnAP message may include at least one of: mobile node indication/identity (ID), itinerary and/or speed of the mobile node, IP address request for each usage for the mobile node, and/or the IP address or IP prefix of the mobile node allocated by the source IAB-donor-CU, the ID of the IAB-donor-CU (e.g., a first donor) that the mobile IAB-MT (e.g., mobile node) first accessed, or the F1-C of the mobile IAB-MT terminated to, and/or an indication used to indicate IAB-donor-CU 3 that the IAB-donor-CU 2 is not the IAB-donor-CU that the mobile IAB-MT first accessed and/or the F1-C of the mobile IAB-MT terminated/maintained to.
At step 4, the IAB-donor-CU 3 can send a UE CONTEXT SETUP REQUEST message to the target parent node IAB-DU, similar to step 4 of implementation 2. Steps 5 and 6 can be performed similar to steps 5 and 6 of implementation 3, respectively, for example. Steps 7-11 can be executed/performed similarly to steps 8-12 of implementation 3, respectively.
At step 12, responsive to or subsequent to receiving/obtaining/acquiring the RRCReconfigurationComplete message, the IAB-donor 3 CU-CP (e.g., source node) can send/transmit/provide at least one of an indication that the mobile node has accessed the target node (e.g., success access of mobile node) and/or an identity of the target node to the IAB-donor 2 CU-CP (e.g., previous node). The IAB-donor 2 CU-CP may inform donor 1 CU-CP that the mobile node migrated/transferred/switched to another donor-CU. The IAB-donor 2 CU-CP may inform the identity of the donor-CU 3 (e.g., target node) to donor 1 CU-CP.
At step 13, the IAB-donor-CU 2 can perform similar operations of IAB-donor-CU 1, as described in implementation 3. At step 14, the IAB-donor 3 CU-CP can request the IAB-donor 3 CU-UP to set up context for the UEs 104 accessed to the mobile IAB-node over E1 interface. The mobile node ID may be sent along with the request. At step 15, the IAB-donor 3 CU-UP may respond to the IAB-donor 3 CU-CP to confirm the setup of the requested bearer context over the E1 interface. At step 16, the IAB-donor 3 CU-CP can send an XnAP message to the IAB-donor 2 CU-CP. The information of the XnAP message may include or be similar to information of the XnAP message described in step 15 of implementation 3. Subsequently or responsive to sending the XnAP message, the IAB-donor 2 CU-CP can forward at least one of the information of the XnAP message to donor 1 CU-CP. In some cases, the IAB-donor 2 CU-CP can indicate the target donor-CU ID to donor 1 CU-CP.
At step 17, the target IAB-donor-CU may configure BH RLC channels and BAP-sublayer routing entries on the target path between the target parent IAB-node and target IAB-donor-DU. The target IAB-donor-CU may configure DL mappings on the target IAB-donor-DU for the mobile IAB-node's target path.
At step 18, F1-C connections can be switched to use the mobile IAB-node's new TNL address(es). Source IAB-donor-CU may send UE CONTEXT MODIFICATION REQUEST messages to the mobile node to update the UL BH information. In some cases, the source IAB-donor-CU may send the UE CONTEXT MODIFICATION REQUEST messages to update UL FTEID associated with each GTP-tunnel. One or more (or all) F1-U tunnels may be switched to utilize the mobile node's new TNL address(es). In some cases, the mobile IAB-node may update DL FTEID associated with each GTP-tunnel. The mobile node may report DL transport layer address and/or DL TEID associated with each GTP-tunnel to source donor CU-CP.
At step 19, the IAB-donor-CU 1 may send a first NGAP message (e.g., NGAP message 1 to 5GC, including at least one of the information described in conjunction with step 19 of implementation 2 and/or implementation 3. At step 20, 5GC may respond to donor 1 CU-CP with a second NGAP message (e.g., NGAP message 2), including at least one of the information similar to step 20 of implementation 2 and/or implementation 3. At step 21, the donor 1 CU-CP may send DL Transport Layer Address and/or DL TEID associated with each GTP-tunnel to donor 2 (or donor 3) CU-CP over Xn interface. In some cases, the donor 1 CU-CP may send information from 5GC (e.g., from step 20) to the donor 2 (or donor 3) CU-CP over the Xn interface. Accordingly, donor 2 can forward/transmit/direct the received configuration to donor 3 CU-CP.
At step 22, the target CU-CP may send, to target CU-UP over E1 interface, at least one of the information described in step 22 of implementation 2 and/or implementation 3. Step 23 may be performed/executed similarly to step 23 of implementation 3.
Referring to
At operation (802), a first network node can send configuration information to a second network node. The configuration information may be associated with a mobile node (e.g., mobile IAB-node) transitioning from a source node to a target node (e.g., target/new IAB-donor). The configuration information may include/indicate/provide a capability/configuration information to support maintaining an F1 control plane (F1-C) connection of a mobile node at a centralized unit control plane (CU-CP) of the source IAB-donor, such as when the mobile node transitions from the source donor to access the target donor. At operation (804), the second network node can receive the configuration from the first network node. The configuration information can include the capability of the sender, such as the first network node capability.
In some implementations, the first network node can include or correspond to the source node, and the second network node can include or correspond to the target node. In some cases, the first network node may include the target node, and the second network node may include the source node. In some cases, the first network node can include the mobile node, and the second network node can include the source node or the target node. In some other cases, the first network node can include the source node or the target node, and the second network node can include the mobile node.
In some cases, the source node may send at least one information to the target node. For instance, the source node may send at least one of an identity (ID) of the mobile node, an indication of the mobile node that is to access the target node, a speed of the mobile node (e.g., speed of the mobile platform that includes the mobile node), a capability of the mobile node to support maintaining an F1 control plane (F1-C) connection (sometimes referred to generally as a connection) of the mobile node at a particular network node that is different from that at which an F1 user plane (F1-U) tunnel (sometimes referred to generally as a tunnel) of the mobile node is being maintained, and/or an indication that the F1-C connection of the mobile node is to be maintained at a centralized unit control plane (CU-CP) of the source node or a previous node, and an F1-U tunnel of the mobile node is to be maintained at a centralized unit user plane (CU-UP) of the target node, when the mobile node transitions from the source node to access the target node. In some cases, the connection (e.g., F1-C) and the tunnel (e.g., F1-U) may be the same in one or more aspects. In some other cases, the connection and the tunnel may be different in one or more aspects.
In some implementations, the source node can receive, from the mobile node, at least one of: at least one of: a transport layer address for F1 or non-F1 traffic communication, at least one of: a downlink (DL) transport layer address, or a downlink tunnel endpoint identifier (TEID) associated with each general packet radio service (GPRS) tunneling protocol (GTP) tunnel, and/or at least one of: an IP security (IP-SEC) transport layer address, or a GTP transport layer address associated with the IP-SEC transport layer address. In some cases, the source node may receive an indication of successful access of the target node by the mobile node from the target node.
In some implementations, the source node may send/transmit/provide an Xn application protocol (XnAP) message comprising first information to the target node. The first information comprises at least one of: an identity (ID) of the mobile node, an indication that the mobile node is able to move, an identity of a user equipment (UE), a list of protocol data unit (PDU) session resources to be setup, a downlink transport layer address, a downlink tunnel endpoint identifier (TEID) associated to each general packet radio service (GPRS) tunneling protocol (GTP) tunnel, a capability of the mobile node to support maintaining a F1 control plane (F1-C) connection of the mobile node at a particular network node that is different from that at which a F1 user plane (F1-U) tunnel of the mobile node is being maintained, and/or an indication that the F1-C connection of the mobile node is to be maintained at a centralized unit control plane (CU-CP) of the source node or a previous node, and a F1-U tunnel of the mobile node is to be maintained at a centralized unit user plane (CU-UP) of the target node, when the mobile node transitions from the source node to access the target node.
In some implementations, a centralized unit control plane (CU-CP) of the target node may send to a centralized unit user plane (CU-UP) of the target node at least one of: an ID of the mobile node, an indication that the mobile node is able to move, a capability of the mobile node to support maintaining an F1-C connection of the mobile node at a particular network node that is different from that at which an F1-U tunnel of the mobile node is being maintained, and/or an indication that the F1-C connection of the mobile node is to be maintained at the CU-CP of the source node or a previous node, and the F1-U tunnel of the mobile node is to be maintained at the CU-UP of the target node, when the mobile node transitions from the source node to access the target node. In some cases, the particular network node may include at least one of the source node, the target node, and/or a previous node.
In some implementations, the source node may receive from the target node at least one of: a mobile node ID, a UE ID (e.g., ID of the UE), at least one of: data radio bearer (DRB) information, information on flows mapped to DRB, or uplink transport network layer (TNL) information of each F1-U tunnel, at least one of: a list of protocol data unit (PDU) session resources to be switched in downlink, a PDU session ID, a downlink next generation (NG) user plane interface (NG-U) user plane (UP) TNL information, or a list of quality-of-service (QOS) flow accepted, and/or an ID of a centralized unit user plane (CU-UP) of the target node.
In some implementations, the source node may send to a network function or entity of a core network at least one of: a mobile node ID, an indication that the mobile node is able to move, a UE ID, at least one of: a list of PDU session resources to be switched in downlink, a PDU session ID, a downlink NG-U UP TNL information, or a list of QoS flow accepted, an indication that an F1-C connection of the mobile node is to be maintained at a CU-CP of the source node or a previous node, and an F1-U tunnel of the mobile node is to be maintained at a CU-UP of the target node, when the mobile node transitions from the source node to access the target node, and/or an ID of the CU-UP of the target node.
In some cases, the CU-CP of the target node can send to the CU-UP of the target node at least one of: a mobile device ID, a UE ID, at least one of: downlink transport layer address, or a tunnel endpoint identifier (TEID) associated to/with each general packet radio service (GPRS) tunneling protocol (GTP) tunnel, PDU session ID, and/or an uplink NG-U UP TNL information. In some cases, the source node (e.g., a second donor or donor 2) may send, to the target node (e.g., a third donor or donor 3), an identity of a node (e.g., donor 1 or a first donor) that the mobile node initially accessed, or an identity of a node at which an F1-C of the mobile node (e.g., mobile IAB-MT) is terminated/maintained.
In certain cases, the node may receive an indication of successful access of the target node by the mobile node from the target node. In some implementations, the source node may receive an Xn application protocol (XnAP) message to release context related to the mobile node or a wireless communication device from a previous node (e.g., donor 1). The previous node may include a node that the mobile node initially accessed, or a node at which a F1-C interface of the mobile node (e.g., IAB-MT) is terminated/maintained/connected (e.g., at an endpoint of a connection).
In some implementations, the target node can send to the source node to release the context related to the mobile node and/or a wireless communication device (e.g., UE). In some implementations, the source node may send to a previous node at least one of: an indication that the mobile node has accessed the target node, and/or an identity of the target node. The previous node may include a node that the mobile node initially/originally accessed, or a node at which an F1-C of the mobile node is terminated/maintained.
At operation (902), a first network node can send information to a second network node. The information may include a capability of the first network node to support maintaining an F1 control plane (F1-C) connection of a third node at a fourth network node that is different from that at which an F1 user plane (F1-U) tunnel of the third node is being maintained/established/terminated. At operation (904), the second network node can receive the information sent from the first network node.
In some implementations, the first network node may include or correspond to a centralized unit user plane (CU-UP) of a radio access network (RAN) node, and the second network node may include a centralized unit control plane (CU-CP) of the RAN node. In some cases, the first network node can include a CU-CP of the RAN node, and the second network node can include a network function or entity of a core network. In some cases, the third node can include a mobile node. In certain cases, the fourth node may include the first network node or the second network node. In some implementations, the fourth node may be different from the first network node and/or the second network node.
In certain implementations, the first or the second node from or corresponding to the third network node may receive a first capability of the third network node. In some cases, the first capability may include/indicate a capability to support maintaining an F1-C of the third node at a particular network node that is different from that at which an F1-U tunnel of the third node is being maintained/established. In this case, the particular network node can include or correspond to one of at least the first node, the second node, or the fourth node, for example. In some implementations, receiving the first capability of the third node may include receiving the first capability via an RRC message or a F1 application protocol (F1AP) message.
While various embodiments of the present solution have been described above, it should be understood that they have been presented by way of example only, and not by way of limitation. Likewise, the various diagrams may depict an example architectural or configuration, which are provided to enable persons of ordinary skill in the art to understand example features and functions of the present solution. Such persons would understand, however, that the solution is not restricted to the illustrated example architectures or configurations, but can be implemented using a variety of alternative architectures and configurations. Additionally, as would be understood by persons of ordinary skill in the art, one or more features of one embodiment can be combined with one or more features of another embodiment described herein. Thus, the breadth and scope of the present disclosure should not be limited by any of the above-described illustrative embodiments.
It is also understood that any reference to an element herein using a designation such as “first,” “second,” and so forth does not generally limit the quantity or order of those elements. Rather, these designations can be used herein as a convenient means of distinguishing between two or more elements or instances of an element. Thus, a reference to first and second elements does not mean that only two elements can be employed, or that the first element must precede the second element in some manner.
Additionally, a person having ordinary skill in the art would understand that information and signals can be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information, signals, bits and symbols, for example, which may be referenced in the above description can be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.
A person of ordinary skill in the art would further appreciate that any of the various illustrative logical blocks, modules, processors, means, circuits, methods and functions described in connection with the aspects disclosed herein can be implemented by electronic hardware (e.g., a digital implementation, an analog implementation, or a combination of the two), firmware, various forms of program or design code incorporating instructions (which can be referred to herein, for convenience, as “software” or a “software module), or any combination of these techniques. To clearly illustrate this interchangeability of hardware, firmware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware, firmware or software, or a combination of these techniques, depends upon the particular application and design constraints imposed on the overall system. Skilled artisans can implement the described functionality in various ways for each particular application, but such implementation decisions do not cause a departure from the scope of the present disclosure.
Furthermore, a person of ordinary skill in the art would understand that various illustrative logical blocks, modules, devices, components and circuits described herein can be implemented within or performed by an integrated circuit (IC) that can include a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, or any combination thereof. The logical blocks, modules, and circuits can further include antennas and/or transceivers to communicate with various components within the network or within the device. A general purpose processor can be a microprocessor, but in the alternative, the processor can be any conventional processor, controller, or state machine. A processor can also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other suitable configuration to perform the functions described herein.
If implemented in software, the functions can be stored as one or more instructions or code on a computer-readable medium. Thus, the steps of a method or algorithm disclosed herein can be implemented as software stored on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that can be enabled to transfer a computer program or code from one place to another. A storage media can be any available media that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store desired program code in the form of instructions or data structures and that can be accessed by a computer.
In this document, the term “module” as used herein, refers to software, firmware, hardware, and any combination of these elements for performing the associated functions described herein. Additionally, for purpose of discussion, the various modules are described as discrete modules; however, as would be apparent to one of ordinary skill in the art, two or more modules may be combined to form a single module that performs the associated functions according embodiments of the present solution.
Additionally, memory or other storage, as well as communication components, may be employed in embodiments of the present solution. It will be appreciated that, for clarity purposes, the above description has described embodiments of the present solution with reference to different functional units and processors. However, it will be apparent that any suitable distribution of functionality between different functional units, processing logic elements or domains may be used without detracting from the present solution. For example, functionality illustrated to be performed by separate processing logic elements, or controllers, may be performed by the same processing logic element, or controller. Hence, references to specific functional units are only references to a suitable means for providing the described functionality, rather than indicative of a strict logical or physical structure or organization.
Various modifications to the embodiments described in this disclosure will be readily apparent to those skilled in the art, and the general principles defined herein can be applied to other embodiments without departing from the scope of this disclosure. Thus, the disclosure is not intended to be limited to the embodiments shown herein, but is to be accorded the widest scope consistent with the novel features and principles disclosed herein, as recited in the claims below.
This application claims the benefit of priority under 35 U.S.C. § 120 as a continuation of International Patent Application No. PCT/CN2022/071284, filed on Jan. 11, 2022, the disclosure of which is incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/CN2022/071284 | Jan 2022 | WO |
Child | 18765752 | US |