Wireless communication networks provide wireless data services to wireless user devices. Exemplary wireless data services include machine-control, internet-access, media-streaming, and social-networking. Exemplary wireless user devices comprise phones, computers, vehicles, robots, and sensors. The wireless user devices execute user applications that use the wireless data services. For example, a smartphone may execute a social-networking application that communicates with a content server over a wireless communication network.
The wireless communication networks have wireless access nodes which exchange wireless signals with the wireless user devices over radio frequency bands. The wireless signals use wireless network protocols like Fifth Generation New Radio (5GNR), Long Term Evolution (LTE), Institute of Electrical and Electronic Engineers (IEEE) 802.11 (WIFI), and Low-Power Wide Area Network (LP-WAN). The wireless access nodes exchange network signaling and user data with network elements that are often clustered together into network data centers. The network elements comprise Access and Mobility Management Functions (AMFs), Session Management Functions (SMFs), User Plane Functions (UPFs), Application Server Function (ASFs), and the like.
Some network elements like UPFs are used to form wireless network slices that deliver specific data services like low-latency augmented-reality or high-bandwidth media-streaming. A wireless user device hosts user applications that consume the data services and are served by the wireless network slices that correspond to the user applications. For example, a wireless user device may execute an augmented-reality application and responsively request a low-latency wireless network slice that features a local augmented-reality server. Another wireless user device may execute a movie application and responsively request a high-bandwidth wireless network slice that features a content-delivery server.
Several different types of wireless access nodes and wireless network slices are being deployed. The amount of different slice types is also proliferating rapidly. Unfortunately, some wireless access nodes cannot effectively serve some wireless network slices. Moreover, the wireless user devices inefficiently attach to the wireless access nodes in response to the user applications and the wireless network slices that are currently in use.
In some examples, a method comprises the following operations. Wirelessly receive slice information that was broadcast from a source wireless access node and that indicates wireless network slices that are served by other wireless network nodes. Execute a user application that uses one of the wireless network slices, and in response, select one of the other wireless access nodes that serves the one of the wireless network slices based on wireless signal strength and the slice information. Wirelessly exchange slice data for the user application with the selected one of the other wireless access nodes.
In some examples, one or more non-transitory computer readable storage media stores program instructions that direct a computing system to perform the following operations. Wirelessly receive slice information that was broadcast from a source wireless access node and that indicates wireless network slices that are served by other wireless network nodes. Execute a user application that uses one of the wireless network slices, and in response, select one of the other wireless access nodes that serves the one of the wireless network slices based on wireless signal strength and the slice information. Wirelessly exchange slice data for the user application with the selected one of the other wireless access nodes.
In some examples, a User Equipment (UE) comprises a radio and circuitry. The radio wirelessly receives slice information that was broadcast from a source wireless access node and that indicates wireless network slices that are served by other wireless network nodes. The circuitry executes a user application that uses one of the wireless network slices, and in response, selects one of the other wireless access nodes that serves the one of the wireless network slices based on wireless signal strength and the slice information. The radio wirelessly exchanges slice data for the user application with the selected one of the other wireless access nodes. The selected one of the other wireless access nodes exchanges the slice data with the one of the wireless network slices.
Various examples of network operation and configuration are described herein. In some examples, wireless access node 112 wirelessly broadcasts information which indicates that wireless access node 113 serves wireless network slice 114 but that wireless access nodes 111-112 do not serve wireless network slice 114. UE 101 wirelessly receives the information from source wireless access node 112. When wireless access nodes 111-112 do not support wireless network slice 114 and wireless access node 113 does support wireless network slice 114, UE 101 re-selects wireless access node 113. UE 101 wirelessly attaches to wireless access node 113 and requests wireless network slice 114. UE 101 and wireless access node 113 wirelessly exchange user data for wireless network slice 114. Wireless access node 113 wirelessly exchanges the user data with UE 101 and exchanges the user data with wireless network slice 114. Wireless network slice 114 exchanges the user data with wireless access node 113. Advantageously, wireless access node 113 effectively serves wireless network slice 114. Moreover, UE 101 efficiently attaches to wireless access node 113 when user application 102 and wireless network slice 114 are used.
In some examples, the broadcast information comprises a System Information Block One (SIB 1) which indicates that wireless access node 113 serves slice 114. The SIB 1 may indicate (alternatively or in addition) that wireless access nodes 111-112 do not serve slice 114. Wireless access nodes 111 and 113 may transfer X2 signaling to source wireless access node 112 that indicates that when nodes 111 and 113 do serve wireless network slice 114 and/or do not serve wireless network slice 114. Source wireless access node 112 modifies its broadcast information in response to the X2 signaling to reflect any changes to the list of wireless access nodes that presently serve wireless network slice 114. For example, wireless access node 111 may transfer X2 signaling to source wireless access node 112 to indicate that node 111 is overloaded on slice 114, so source wireless access node 112 modifies its broadcast information in response to the X2 signaling to indicate that wireless access node 111 is not serving wireless network slice 114. Likewise, wireless access node 113 may recover from an overload and transfer X2 signaling to source wireless access node 112 which indicates that node 113 can again serve slice 114, so source wireless access node 112 modifies its broadcast information in response to the X2 signaling to indicate that wireless access node 113 now serves wireless network slice 114. Based on the broadcast information, UE 101 may re-select wireless access node 113 in response to idling on source wireless access node 112 and launching user application 102 that uses wireless network slice 114. Based on the broadcast information, UE 101 may re-select and connect to wireless access node 113 in response to executing user application 102 that uses wireless network slice 114 while attempting a re-select from source wireless access node 112.
Wireless network slice 114 comprises network elements like User-Plane Function (UPF) and Application Server Function (ASF). UE 101 communicates with wireless access nodes 111-113 over technologies like Fifth Generation New Radio (5GNR), Long Term Evolution (LTE), Institute of Electrical and Electronic Engineers (IEEE) 802.11 (WIFI), Bluetooth, or some other wireless communication protocol. The various communication links in wireless communication network 100 are represented by dotted lines in
While in idle mode, UE 101 executes user application 102 which uses wireless network slice 114. In response, UE 101 re-selects wireless access node 113 based on the broadcast information that indicates slice support for nodes 111-113. UE 101 wirelessly exchanges attachment signaling with wireless access node 113 and requests wireless network slice 114. UE 101 and wireless access node 113 wirelessly exchange user data for wireless network slice 114. Wireless access node 113 and wireless network slice 114 exchange the user data. In this example, wireless network slice 114 exchanges the user data with external systems.
Wireless network cells A-H are formed by combinations of RUs 411-418, DUs 421-424, and CUs 431-432. For example, a combination of components in CU 431, DU 421, and RU 411 form network cell A. Another combination of components in CU 431, DU 421, RU 412 form network cell B. In this example, RUs 411-418 respectively correspond to a network cells A-H. CUs 431-432 drive RUs 411-418 to wirelessly broadcast System Information Blocks (SIBs) for cells A-H. The broadcast SIBs comprise a SIB 1 that indicates cell IDs A-H and the served ones of wireless network slices 441-443 for each of the cell IDs A-H. The broadcast SIB 1 may also indicate slice load and other status information for the cell/slice pairs.
In CUs 431-432, cells A-H exchange X2 signaling that indicates cell IDs, served slice IDs for each cell ID, and possibly slice status over the cell for cell/slice pairs. In CUs 431-432, cells A-H process the X2 signaling to modify their SIB 1 broadcasts. For example, cell A may become overloaded on slice 442 and indicate to cells B-H to stop indicating that cell A serves slice 442 to mitigate the overload. When the overload subsides, cell A indicates to cells B-H to restart indicating that cell A serves slice 442.
Initially, UE 401 is idle on RU 414 of cell D. UE 401 receives SIB 1 from RU 414. The SIB 1 indicates which individual cells A-H serve which individual slices 441-443. While idle, UE 401 launches user application 473 that communicates with slice 443. UE 401 wirelessly receives SIB 1 from RU 414 for cell D. The SIB 1 indicates that cells B, C, F, and G serve slice 443 but not cell D. In response, UE 401 re-selects cell G based on the SIB 1 and other factors like cell signal strength and cell slice load. UE 401 initiates a re-selection procedure from cell D to cell G. UE 401 requests wireless network slice 443—AMF 461 has already authenticated UE 401 and authorized slice 443 for UE 401. SMF 462 drives UPF 453 in slice 443 for UE 401. User application 473 in UE 401 communicates with ASF 454 in wireless network slice 443 over UPF 453 and cell G (RU 417, DU 424, and CU 432). ASF 454 communicates with an external system like a remote Application Server (AS).
While in idle mode on RU 414 of cell D, UE 401 launches APP 473 that uses wireless network slice 443. Based on the SIB 1 from RU 414 of cell D, the RRC in UE 401 determines that cell D does not serve wireless network slice 443 and that cells B, C, F, and G do serve slice 443. In response, the RRC in UE 401 re-selects cell G based on SIB 1 and other factors like RU strength and slice load. To perform the re-selection to cell G, the RRC in UE 401 and the RRC for cell G in 5G APPs 822 in CU 432 exchange RRC attachment signaling, and the RRC for cell G and AMF 461 exchange set-up signaling. The discussion proceeds to
The RRC in 5G APPs 831 for cell G in CU 432 receives slice status data over X2 signaling from the RRCs for cells A-C and E-H that indicates their current support for individual slices 441-443. In response to the X2 signaling, the RRC in 5G APPs 831 for cell G in CU 432 removes overloaded cell/slice combinations from its SIB 1 broadcast to mitigate the overload. The RRC in 5G APPs 831 for cell G in CU 432 adds recovered cell/slice combinations back to the SIB 1 broadcasts to improve capacity. The RRC in APPs 831 for cell G in CU 432 drives RU 417 to wirelessly broadcast the SIB 1 that indicates the individual cell IDs A-H and the individual slice IDs 441-443 that are currently served by each cell ID. UE 401 now receives SIB 1 from RU 417.
The wireless data network circuitry described above comprises computer hardware and software that form special-purpose networking circuitry to serve UEs over wireless network slices. The computer hardware comprises processing circuitry like CPUs, DSPs, GPUs, transceivers, bus circuitry, and memory. To form these computer hardware structures, semiconductors like silicon or germanium are positively and negatively doped to form transistors. The doping comprises ions like boron or phosphorus that are embedded within the semiconductor material. The transistors and other electronic structures like capacitors and resistors are arranged and metallically connected within the semiconductor to form devices like logic circuitry and storage registers. The logic circuitry and storage registers are arranged to form larger structures like control units, logic units, and Random-Access Memory (RAM). In turn, the control units, logic units, and RAM are metallically connected to form CPUs, DSPs, GPUs, transceivers, bus circuitry, and memory.
In the computer hardware, the control units drive data between the RAM and the logic units, and the logic units operate on the data. The control units also drive interactions with external memory like flash drives, disk drives, and the like. The computer hardware executes machine-level software to control and move data by driving machine-level inputs like voltages and currents to the control units, logic units, and RAM. The machine-level software is typically compiled from higher-level software programs. The higher-level software programs comprise operating systems, utilities, user applications, and the like. Both the higher-level software programs and their compiled machine-level software are stored in memory and retrieved for compilation and execution. On power-up, the computer hardware automatically executes physically-embedded machine-level software that drives the compilation and execution of the other computer software components which then assert control. Due to this automated execution, the presence of the higher-level software in memory physically changes the structure of the computer hardware machines into special-purpose networking circuitry to serve UEs over wireless network slices.
The above description and associated figures teach the best mode of the invention. The following claims specify the scope of the invention. Note that some aspects of the best mode may not fall within the scope of the invention as specified by the claims. Those skilled in the art will appreciate that the features described above can be combined in various ways to form multiple variations of the invention. Thus, the invention is not limited to the specific embodiments described above, but only by the following claims and their equivalents.
This United States patent application is a continuation of U.S. patent application Ser. No. 17/406,336 that was filed on Aug. 19, 2021 and is entitled “WIRELESS ACCESS NODE SELECTION BASED ON WIRELESS NETWORK SLICE SUPPORT.” U.S. patent application Ser. No. 17/406,336 is hereby incorporated by reference into this United States patent application.
Number | Date | Country | |
---|---|---|---|
Parent | 17406336 | Aug 2021 | US |
Child | 18739895 | US |