Embodiments of the disclosure relate to communications networks, and particularly to methods, apparatus and computer-readable media for user plane function selection in a communications network.
The 3GPP standardization organization has defined standards for a 5G New Radio (NR) radio interface and a 5G core network supporting communications to 5G capable wireless devices (in 3GPP called user equipments or UEs).
As part of this work, different logical nodes (or functions) are defined, including radio base stations (ng-eNBs, also known as gNBs), core network control plane nodes such as e.g. Access and Mobility Function (AMF), Session Management Function (SMF) as well as User Plane Functions (UPFs). These nodes perform certain functionality and communicate with other nodes over standardized interfaces. By defining these nodes, it is possible for vendors to build products which implement their functionality, such that operator networks support multi-vendor deployments.
The internal functional blocks as well as other details of the implementation of these nodes are left to each vendor. Similarly, it is up to each vendor if they want to implement the nodes using software components only which run on generic data center hardware or if they want to implement certain functions in dedicated hardware (or both).
In addition to logical network nodes and interfaces, 3GPP also defines signaling flows for different events occurring in 3GPP defined cellular networks. One such event is when the UE moves from one radio base station to another (e.g. handover or mobility). In this situation, the initial base station is called the “source” base station, while the new base station is called the “target” base station. When this happens there is a need to inform the UPF that the UE is now served by the target base station to ensure that the UPF sends data to the correct base station. An example signaling flow for this is shown in
In this call flow the handover signaling is performed between the source and target radio access network (RAN) nodes (e.g., base stations, eNBs, gNBs and the like). Once the actual handover has occurred the target RAN node updates the AMF (see transmission of N2 Path Switch Request message), which in turn updates the SMF (see transmission of Nsmf_PDUSession_Update message), which in turn updates the UPF (see transmission of N4 Session Modification Request message). The UPF switches the downlink data to the target RAN node and also sends one or more user plane end marker packets. The source RAN node forwards the end marker packets to the target RAN node. After handover but prior to transmission of the user plane end marker packets, the source RAN node forwards any downlink data packets received from the UPF to the target RAN node for onwards transmission to the UE. The reception of the end marker packets by the target RAN node constitutes an indication that any new downlink data packets received from the UPF on the downlink path can be forwarded to the UE, and that no more data packets will be received from the source RAN node.
In the call flow shown in
The call flow shown in
Thus there is a considerable delay in the handling of uplink data packets when a new UPF is selected following mobility of a UE from a source RAN node to a target RAN node. Until the new UPF (in the context of
Embodiments of the disclosure seek to address these and other technical problems.
In a first aspect there is provided a method performed by a radio access network node in a telecommunications network. The method comprises: responsive to detection of a trigger event associated with a wireless device having a connection to the telecommunications network via the radio access network node or seeking to establish or resume a connection to the telecommunications network via the radio access network node, selecting a core network user plane function for the connection to the telecommunications network; and initiating establishment of a user-plane tunnel for the connection between the radio access network node and the selected core network user plane function.
Apparatus and computer-readable media for performing the method of the first aspect are also provided. For example, in one embodiment the disclosure provides a radio access network node for a telecommunications network. The radio access network node comprises processing circuitry and a non-transitory computer-readable medium storing instructions, which, when executed by the processing circuitry, cause the radio access network node to: responsive to detection of a trigger event associated with a wireless device having a connection to the telecommunications network via the radio access network node or seeking to establish or resume a connection to the telecommunications network via the radio access network node, select a core network user plane function for the connection to the telecommunications network; and initiate establishment of a user-plane tunnel for the connection between the radio access network node and the selected core network user plane function.
In a second aspect there is provided a method performed by a radio access network node acting as a source radio access network node for handover of a wireless device to a target radio access node. The method comprises: transmitting a handover request message to the target radio access node, the handover request message comprising an indication of a tunnel endpoint identifier for an anchor core network user plane function associated with a session for the wireless device.
Apparatus and computer-readable media for performing the method of the second aspect are also provided. For example, in one embodiment the disclosure provides a radio access network node for a telecommunications network. The radio access network node comprises processing circuitry and a non-transitory computer-readable medium storing instructions, which, when executed by the processing circuitry, cause the radio access network node to, while acting as a source radio access network node for handover of a wireless device to a target radio access node: transmit a handover request message to the target radio access node, the handover request message comprising an indication of a tunnel endpoint identifier for an anchor core network user plane function associated with a session for the wireless device.
Embodiments of the disclosure seek to address the problems noted above by introducing a UPF selection mechanism in a RAN node, such as the target RAN node involved in handover. Thus, responsive to detection of a trigger event, the RAN node selects a user plane function for a connection associated with a wireless device to the telecommunications network, and initiates establishment of a user-plane tunnel for the connection between the radio access network node and the selected user plane function. The trigger event may be associated with the wireless device having a connection to the telecommunications network via the RAN node or seeking to establish or resume a connection to the telecommunications network via the RAN node.
The trigger event may be associated with handover of the wireless device or other events (such as state transition, radio resource control (RRC) connection re-establishment after RRC connection failure). Selection of the UPF may be based on one or more policies, wireless device information, and/or other information. For example, the RAN node may first determine whether it is necessary to select a new UPF responsive to detection of the trigger event and, if so, determine which UPF to select.
By introducing a UPF selection mechanism into a RAN node, the latency of uplink communications by the wireless device can be reduced, particularly on protocol data unit (PDU) session establishment. In particular, the RAN node need no longer wait for selection of the UPF by the SMF, but may instead forward uplink data directly to the selected UPF. In addition, according to some embodiments of the disclosure, control plane signaling between the RAN and the SMF can be reduced.
A further aspect of the disclosure relates particularly to handover, and provides a method in the source RAN node of such a handover procedure. According to this method, the source RAN node provides, to the target RAN node, tunnel endpoint information for an anchor UPF for the connection of the wireless device. For example, the tunnel endpoint information may be contained in a handover request message from the source RAN node to the target RAN node.
These and other aspects of the disclosure are described in more detail below.
According to some embodiments of the disclosure, selection of a UPF for a connection may be made according to one or more UPF selection policies. Accordingly, the method begins in step 300 with an optional step of obtaining one or more UPF selection policies.
The one or more UPF policies may be received from a core network node, such as the SMF, the Policy Control Function (PCF), the AMF or any other core network node. For example, the UPF policies may be signaled to the RAN node from a core network node during establishment of a Protocol Data Unit (PDU) session for a wireless device.
In the particular illustrated example, PDU session establishment is initiated by the UE, i.e., through transmission of a PDU Session Establishment Request message to the AMF in step 1. The principles disclosed herein are not so limited to UE-initiated PDU session establishment, however, and may straightforwardly be applied to RAN or core network initiated PDU session establishment for example. Returning to
The process shown in
As an alternative to the embodiment shown in
In other embodiments, the one or more UPF selection policies may be provided to the RAN node from one or more other RAN nodes (e.g., during handover of the wireless device from a source RAN node to the target RAN node, or during context retrieval by a target RAN node for a wireless device which resumes a connection to the network through the target RAN node), or configured in the RAN node, e.g. by a core network node or during deployment of the network.
In yet further embodiments, one or more of these different mechanisms for informing the RAN node of the UPF selection policies may be combined, such that different mechanisms are used for indicating different types of UPF selection policy, or for indicating UPF selection policies during different procedures. In one embodiment, UPF selection policies which are static, or which are expected to remain static, may be directly configured in the RAN node at the time of its deployment in the network. For example, the RAN node may be configured to select from one or more local UPFs that are configured for local breakout of traffic. UPF selection policies which are dynamic, or expected to be dynamic, may be signaled to the RAN node by another RAN node (e.g., the source RAN node during handover of the wireless device to the RAN node performing the method) or a core network node (e.g., as described above during PDU session establishment and/or following a transition of the wireless device to an active or connected RRC state).
The one or more UPF selection policies may be indicated (e.g., by the other RAN node or core network node) by providing the full UPF selection information itself, or by an index or some other pointer to a predefined UPF selection policy or policies. The latter embodiment may be especially useful for UPF selection policies which are signaled by a source RAN node during handover, by reducing the amount of signaled bits and so providing a more efficient interface between RAN nodes. The predefined UPF selection policy or policies may be stored in the RAN node itself, or retrieved from another node such as a core network entity.
The one or more UPF selection policies may be based on one or more of the following for the wireless device: subscription information, mobility history, traffic history, network slice information, service information etc. For example, any of the subscription information, network slice information and service information may specify a particular quality of service (QoS) which is to be met by the connection. The RAN node may thus preferentially select a UPF which is able to meet the specified QoS. The mobility history of the wireless device may be used to select a UPF based on UPFs which have previously handled connections for wireless devices attached to the cells listed in the mobility history, while the traffic history may be used to select a UPF which has suitable bandwidth to meet the likely traffic demands of the connection.
The one or more UPF selection policies may comprise a rule for selection of a UPF based on the proximity of the RAN node to UPFs. For example, the RAN node may be configured to select, or to preferentially select, UPFs which are closer to the RAN node (e.g., geographically, or in terms of number of hops in the network) so as to reduce latency in the connection. The one or more UPF selection policies may comprise a rule for selecting a UPF based on previous use of UPFs for performing services associated with particular trigger events. For example, if a UPF has been used for a connection prior to handover of the wireless device to the RAN node (i.e., the trigger event is mobility of the wireless device to the RAN node), the RAN node may preferentially select that UPF for the connection. The one or more UPF selection policies may comprise a rule for selecting a UPF based on performance considerations, for the wireless device and/or the network. In the former case, the one or more UPF selection policies may comprise a rule which preferentially selects UPFs associated with relatively low latency traffic (e.g., as measured or reported previously). In the latter case, the one or more UPF selection policies may comprise a rule which selects UPFs based on load sharing (e.g., hash-based load sharing) between multiple UPFs.
Those skilled in the art will appreciate that any one or more of these UPF selection policies may be combined, and moreover may interact with each other when combined. For example, a UPF selection policy which requires the RAN node to select or preferentially select UPFs which are closer to the RAN node may introduce other conditions to be taken into consideration when selecting the UPF. For instance, if the service requires a latency below some threshold, a UPF selection policy could be introduced to select a UPF which is as close as possible to the RAN node (rather than a UPF which only just fulfils the latency requirement). In this case, the UPF selection policy based on proximity interacts with a UPF selection policy based on the cost of utilizing the UPF. Typically, the more distributed the UPF, the higher the cost. Thus the cost-based UPF selection policy interacts with the latency-based UPF selection policy to create an overall policy that selects the closest possible UPF to the RAN node. Of course, further UPF selection policies may be combined to change the overall UPF selection again.
As part of step 300, the RAN node may additionally receive information identifying those UPFs in the network which are accessible by the RAN node and/or available. The information may include, for example, logical network addresses or a range of logical network addresses for the UPFs (e.g., IP addresses or a range of IP addresses). This information may be provided to the RAN node via a domain name system (DNS) server or other database-related mechanism, or it can be signaled from the AMF, the SMF or another core network function.
Returning to a description of
In step 304, responsive to detection of the trigger event in step 302, the RAN node selects a UPF for the connection of the wireless device. Where the RAN node received one or more UPF selection policies, e.g., in step 300 described above, the selection of the UPF may be made according to the one or more UPF selection policies. The UPF selection may be based additionally on the UPFs which are available and/or accessible to the RAN node.
In step 306, the RAN node initiates establishment of a user plane (UP) tunnel for the connection to the UPF selected in step 304.
In one embodiment, the RAN node initiates establishment of the UP tunnel conventionally, by transmitting a control signal to the AMF, which in turn transmits a message to the SMF, which in turn transmits a message to the UPF as a reaction to the change signalled by the RAN node. This process is shown in
In another embodiment, the RAN node initiates establishment of a UP tunnel for the connection to the selected UPF by transmitting an uplink packet directly to the selected UPF. The uplink packet may comprise a user data uplink packet, comprising user data or dummy data for the purposes of initiating the UP tunnel (e.g., a packet containing no payload, or a payload of filler bits), or a special signalling message which is nonetheless transmitted over the user plane. The transmitted packet may comprise an identifier for the PDU session (such as a tunnel endpoint identity for the wireless device for the session), to enable the selected UPF to retrieve the context for the session and trigger a mobility update for the wireless device and/or to complete the relocation of the UPF for the session from the previous UPF to the newly selected UPF.
This embodiment may utilize a new implementation architecture for logical network nodes referred to as “stateless” implementation. According to this architecture, the functions of the node are divided into “state-less” worker modules and a “stateful” data storage layer. In such an architecture the worker modules, which handle packet processing for instance, will only maintain a context for each packet processing flow temporarily, while they are working with that flow. The context can be discarded when the worker module is no longer working with that flow. Any information which needs to be maintained for future processing is instead stored in the data storage layer, which is shared between multiple worker modules.
Possible advantages with such an architecture include:
The architecture may further utilize a load balancing function, which assigns transactions (i.e. different processing tasks) to the worker modules. In addition to balancing the load between the plurality of worker modules, the load balancing function may seek to assign the same worker module to the same packet processing flow where possible and as long as that flow exists, such that redistribution of flows only happens when needed. In this way a worker module may not need to fetch the flow context every time a new packet arrives.
In the context of the present disclosure, the different UPFs in the network may be implemented by stateless worker modules which have access to a shared data storage layer.
The identifier for the context of the session may be assigned by the original UPF for the session or connection, with the data storage layer ensuring that the identifier is unique amongst the identifiers stored within the particular data storage layer. For example, the UPF may generate a random identifier for the session, and check with the data storage layer whether that identifier is available (i.e., not used to identify any other session with a context stored in the data storage layer). If the identifier is available, the context can be stored in the data storage layer and associated with the identifier; if the identifier is not available, a further random identifier for the session is generated by the UPF. Those skilled in the art will appreciate that various alternatives to this process exist. For example, a UPF may generate an identifier in a structured way, designed to reduce the likelihood of collision between identifiers. Each UPF may be pre-assigned a respective range of values, from which to select identifiers. In a further alternative, a UPF may pre-register a range of values with the data storage layer, guaranteed to be unique at the data storage layer. In this case the UPF need not check with the data storage layer that a particular identifier value is available before its assignment to a session, and this can reduce latency when assigning identifiers for a newly established PDU session. When pre-registering the range of values, however, the UPF may follow a similar process as described above, by generating one or more identifiers (e.g., randomly) and checking with the data storage layer when those identifiers are available.
Thus the selected UPF receives the uplink packet transmitted in step 306, and is able to retrieve the context of the PDU session or the connection from the data storage layer that it shares with the UPF which handled the PDU session or the connection previously.
Those skilled in the art will appreciate that the order of the steps described with respect to
The preceding disclosure thus describes a method for selecting a UPF for a connection, performed by a RAN node.
The following assumptions are used as an example (it being noted that none of the assumptions is a pre-requisite for the methods described herein to function effectively):
These policies are examples of UPF selection policies which may be statically configured in the RAN node.
The wireless device (UE), source RAN node (Source gNB) and target RAN node (Target gNB) prepare and execute handover of the wireless device from the source RAN node to the target RAN node. This process may be largely conventional, with the handover being triggered by the UE or the network, based on radio measurement reports or other data.
Handover execution may comprise transmission of a Handover Request message from the source RAN node to the target RAN node. According to embodiments of the disclosure, this message may comprise an indication of a tunnel endpoint identifier for the anchor UPF associated with the connection of the wireless device prior to handover. In this context, the term “anchor UPF” is taken to mean the final UPF, furthest from the wireless device, in a series or chain of one or more UPFs configured for a connection or a session. For example, where the wireless device is configured with an intermediate UPF or ULCL for a connection or session (as shown in
The different steps are described below:
In step 1, the target RAN node performs UPF selection according to the method described above with respect to
In step 2, the target RAN node forwards the packet to the Anchor UPF (IP address) using its downlink tunnel endpoint address as source and using the unique UL TEID as tunnel identifier.
The Anchor UPF receives the UL packet sent by the target RAN node. The Anchor UPF may not have any packet handling rules locally cached and thus optionally, in step 3, it may fetch packet handling rules from the shared data storage layer using UL TEID.
In step 4, the Anchor UPF infers the change in context from the information in the received UL packet (i.e., the UL TEID is previously associated with a different downlink TEID). In step 4a, the Anchor UPF prepares and sends an end marker to the source RAN node on the old downlink path. In step 4b (which may be simultaneous with step 4a), the Anchor UPF makes changes to the context stored in the shared data storage layer, including updating the downlink IP address to the Target RAN node and the downlink TEID.
Optionally, in step 5, the Anchor UPF may send a message (e.g., N4 session modification request) to the SMF, notifying it about the new downlink tunnel attributes (e.g., so that the SMF can decide on possible new packet handling rules).
In the context of mobility into an LBO area, the UPF selection policy discussed above will impose the selection of an ULCL to connect to. Thus in step 1, where the target RAN node selects a UPF, a ULCL within the LBO area is selected. The UL packet is prepared by the Target RAN node in a similar way as described above with respect to
The ULCL is thus informed that it should act as an intermediate UPF for this session, and is also provided with the rules and information necessary to reach the Anchor UPF for the session (Step 4). It will be noted here that, if Session and Service Continuity (SSC) Mode 1 applies and there are no dynamic packet handling rules to apply, then the ULCL could also be informed implicitly of the need to act as an I-UPF by the fact that there is already an Anchor UPF present and also infer its IP address from an UL packet sent towards the Gi interface. A further alternative is that the ULCL is pre-configured with the Anchor UPF address. These alternatives do not require that the UPFs, i.e., ULCL and Anchor UPF share the same data layer.
In step 5, the ULCL forwards the received UL packet to the Anchor UPF using its own IP address as the source address. The Anchor UPF receives the packet, fetches the context from the shared data storage layer (not shown in
The signaling shown in
The scenario where mobility occurs between RAN nodes within the same LBO area, but a new ULCL is selected by the target RAN node (e.g., because the source ULCL is unreachable), is similar to the case where there is mobility between different LBO areas, i.e., the source RAN node is in a first LBO area and the target RAN node is in a second, different LBO area. See
This case is similar to the case of mobility into an LBO area (see
In this scenario the UE moves out of an LBO area, so there will be no ULCL for the target RAN node to select. However, the UPF received in the handover request message may comprise only the ULCL in the LBO area from which the wireless device has come. Thus there may be no information in the target RAN node allowing the Anchor UPF for this PDU session to be identified. In this case, the Target RAN node may select a UPF randomly, or according to different UPF selection policies. Thus the selected UPF may not be the Anchor UPF, and this scenario is shown in
Note that the cases of mobility outside the LBO areas (e.g., as described above with respect to
In other embodiments, as noted above, the handover request message may comprise an indication of the tunnel endpoint identifier for the Anchor UPF. In this case, based on this tunnel endpoint identifier, the target RAN node can select the Anchor UPF directly, if it is reachable, and initiate connectivity to the Anchor UPF as described above with respect to step 306.
The node 900 comprises processing circuitry 902 (such as one or more processors, digital signal processors, general purpose processing units, etc), a computer-readable medium (e.g., memory such as read-only memory (ROM), random-access memory, cache memory, flash memory devices, optical storage devices, etc) 904 and one or more interfaces 906. The components are illustrated coupled together in series; however, those skilled in the art will appreciate that the components may be coupled together in any suitable manner (e.g., via a system bus or suchlike).
According to embodiments of the disclosure, the computer-readable medium 904 stores instructions which, when executed by the processing circuitry 902, cause the node 900 to: responsive to detection of a trigger event associated with a wireless device having a connection to the telecommunications network via the radio access network node or seeking to establish or resume a connection to the telecommunications network via the radio access network node, select a core network user plane function for the connection to the telecommunications network; and initiate establishment of a user-plane tunnel for the connection between the radio access network node and the selected core network user plane function.
In further embodiments of the disclosure, the node 900 may comprise power circuitry (not illustrated). The power circuitry may comprise, or be coupled to, power management circuitry and is configured to supply the components of node 900 with power for performing the functionality described herein. Power circuitry may receive power from a power source. The power source and/or power circuitry may be configured to provide power to the various components of node 900 in a form suitable for the respective components (e.g., at a voltage and current level needed for each respective component). The power source may either be included in, or external to, the power circuitry and/or the node 900. For example, the node 900 may be connectable to an external power source (e.g., an electricity outlet) via an input circuitry or interface such as an electrical cable, whereby the external power source supplies power to the power circuitry. As a further example, the power source may comprise a source of power in the form of a battery or battery pack which is connected to, or integrated in, the power circuitry. The battery may provide backup power should the external power source fail. Other types of power sources, such as photovoltaic devices, may also be used.
The node 1000 comprises a selecting unit 1002 and an initiating unit 1004. The selecting unit 1002 is configured to, responsive to detection of a trigger event associated with a wireless device having a connection to the telecommunications network via the radio access network node or seeking to establish or resume a connection to the telecommunications network via the radio access network node, select a core network user plane function for the connection to the telecommunications network. The initiating unit 1004 is configured to initiate establishment of a user-plane tunnel for the connection between the radio access network node and the selected core network user plane function.
The disclosure thus provides methods for selecting a UPF for a session or connection of a wireless device, performed by a RAN node providing that session or connection. By providing a mechanism for UPF selection in the RAN node, a new UPF can be selected for a wireless device without involving control plane signaling. This makes mobility handling for LBO scenarios simpler (as discussed above). The selection of intermediate UPFs and related functionality in the control plane can also be simplified.
A further advantage is that it separates the UP handling from the AMF/SMF functionality, which could have several advantages. It becomes possible to handle the case where the target RAN node has no connectivity to the source UPF, e.g. the request will be routed to a new UPF that may have connectivity to the anchor UPF. This may mean that an “N2 Handover” might not be needed and Xn Handover can be the only solution.
Some embodiments provide for the forwarding of packets in the uplink from the RAN node immediately to the newly selected UPF, or at least in parallel with control plane signaling, significantly reducing latency in the transmissions and thus better supporting URLLC and mission critical use cases.
A further aspect of the disclosure, described above, relates to a method performed by a source RAN node involved in handover of a wireless device to a target RAN node. In this aspect, the source RAN node provides an indication of tunnel endpoint information (such as a tunnel endpoint identifier) for an anchor UPF associated with its connection or session to the target RAN node. Such an indication may be provided in a handover message, such as a handover request message. As noted in the description above, with respect to
It will be understood that the method shown in
The method begins in step 1102, in which the source RAN node transmits a handover request message to the target RAN node. The handover request message comprises an indication of a tunnel endpoint identifier for a UPF acting as the anchor UPF for the session (e.g., the PDU session) of the wireless device. The tunnel endpoint identifier may comprise a GPRS Tunnelling Protocol (GTP) tunnel endpoint identifier (TEID). Optionally, the handover request message may also comprise an indication of tunnel endpoint identifiers for any intermediate UPFs that the wireless device is configured with. As noted above, this information enables the target RAN node to select the anchor UPF for the connection or session of the wireless device after handover has been completed.
In step 1104, the RAN node receives a handover request acknowledgement message from the target RAN node.
In step 1106, the RAN node executes handover of the wireless device to the target RAN node. This step may be essentially conventional, and will not be described in significant detail herein. Those skilled in the art will appreciate that step 1106 may comprise the transmission of an RRC connection reconfiguration message to the wireless device, instructing the wireless device to handover to the target RAN node (e.g., to perform random access to establish a connection to the target RAN node).
The node 1200 comprises processing circuitry 1202 (such as one or more processors, digital signal processors, general purpose processing units, etc), a computer-readable medium (e.g., memory such as read-only memory (ROM), random-access memory, cache memory, flash memory devices, optical storage devices, etc) 1204 and one or more interfaces 1206. The components are illustrated coupled together in series; however, those skilled in the art will appreciate that the components may be coupled together in any suitable manner (e.g., via a system bus or suchlike).
The radio access network node may act as a source radio access network node for handover of a wireless device to a target radio access node. According to embodiments of the disclosure, the computer-readable medium 1204 stores instructions which, when executed by the processing circuitry 1202, cause the node 1200 to: transmit a handover request message to the target radio access node, the handover request message comprising an indication of a tunnel endpoint identifier for an anchor user plane function associated with a session for the wireless device.
In further embodiments of the disclosure, the node 1200 may comprise power circuitry (not illustrated). The power circuitry may comprise, or be coupled to, power management circuitry and is configured to supply the components of node 1200 with power for performing the functionality described herein. Power circuitry may receive power from a power source. The power source and/or power circuitry may be configured to provide power to the various components of node 1200 in a form suitable for the respective components (e.g., at a voltage and current level needed for each respective component). The power source may either be included in, or external to, the power circuitry and/or the node 1200. For example, the node 1200 may be connectable to an external power source (e.g., an electricity outlet) via an input circuitry or interface such as an electrical cable, whereby the external power source supplies power to the power circuitry. As a further example, the power source may comprise a source of power in the form of a battery or battery pack which is connected to, or integrated in, the power circuitry. The battery may provide backup power should the external power source fail. Other types of power sources, such as photovoltaic devices, may also be used.
The radio access network node may act as a source radio access network node for handover of a wireless device to a target radio access node. The node 1300 comprises a transmitting unit 1302. The transmitting unit 1302 is configured to transmit a handover request message to the target radio access node, the handover request message comprising an indication of a tunnel endpoint identifier for an anchor user plane function associated with a session for the wireless device.
The disclosure thus also provides methods and apparatus in a source RAN node during handover of a wireless device, which enable a target RAN node to select an anchor UPF for the connection of the wireless device even after handover.
References in the present disclosure to “one embodiment”, “an embodiment” and so on, indicate that the embodiment described may include a particular feature, structure, or characteristic, but it is not necessary that every embodiment includes the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to implement such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
It should be understood that, although the terms “first”, “second” and so on may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and similarly, a second element could be termed a first element, without departing from the scope of the disclosure. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed terms.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to limit the present disclosure. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises”, “comprising”, “has”, “having”, “includes” and/or “including”, when used herein, specify the presence of stated features, elements, and/or components, but do not preclude the presence or addition of one or more other features, elements, components and/or combinations thereof. The terms “connect”, “connects”, “connecting” and/or “connected” used herein cover the direct and/or indirect connection between two elements.
The present disclosure includes any novel feature or combination of features disclosed herein either explicitly or any generalization thereof. Various modifications and adaptations to the foregoing exemplary embodiments of this disclosure may become apparent to those skilled in the relevant arts in view of the foregoing description, when read in conjunction with the accompanying drawings. However, any and all modifications will still fall within the scope of the non-limiting and exemplary embodiments of this disclosure.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2020/053040 | 2/6/2020 | WO |